-
Asynchronous Remote Key Generation (ARKG) and its Applications.
Invited talk. SKECH 2024: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2024
-
Selected Topics in Private Data Processing.
Invited lectures. Privacy Computing Course @ Graduate Summer School, Shandong University, Virtual/ China, 18.07.2023
-
Asynchronous Remote Key Generation and its Applications.
Invited talk. ASSURED Scientific Workshop, TU Darmstadt, Germany, 26.04.2023
-
Asynchronous Remote Key Generation for Account Recovery and Delegation in WebAuthn.
Invited talk. Codes and Cryptography Seminar, Paderborn University, Germany, 16.12.2022
-
On Account Recovery and Delegation in WebAuthn.
Future of Personal Identification (FoPI) 2021 @ IEEE EuroS&P 2021, Virtual / Vienna, Austria, 06.09.2021
-
Security Challenges for Satellite Constellations and Communications.
Invited speaker and panelist. CYSAT 2021, Virtual / Davos, CH, 18.03.2021 [YouTube]
-
Security in Future Technologies: Core Capabilities and Threats.
Invited panelist. EIT Digital Tech Networking Event, London, UK, 03.10.2019
-
Reputation and Privacy in Gig.
Invited talk. NCSC Annual ACE-CSR Conference, Stratford-upon-Avon, UK, 26.06.2019
-
Authentication with Privacy for Connected Cars: A research perspective.
Invited talk. Cyber Security Focus Day @ Connected Cars'16, London, UK, 27.06.2016
-
Blind Password Registration for Verifier-based PAKE.
ACM AsiaPKC 2016 @ ACM ASIACCS 2016, Xian, China, 30.05.2016
-
A Modular Framework for Multi-Factor Authentication and Key Exchange.
1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014
-
Secure Modular Password Authentication for the Web using Channel Bindings.
1st International Conference on Research in Security Standardisation (SSR 2014), Egham, UK, 17.12.2014
-
Cryptography and Passwords.
Invited talk. SafeNet Crypto Club, London, UK, 05.12.2014
-
Cryptographic Password Authentication with TLS Channel Bindings.
Invited talk. SnT research seminar, University of Luxembourg, 20.11.2014
-
Zero-Knowledge Policy Checks for Passwords and Verifier-Based PAKE.
Invited talk. SKECH@BiCi: Secure Key Exchange and Channel Protocols, Bertinoro, Italy, 05.06.2014
-
Oblivious Password Authentication for the Web.
Invited talk. Number Theory and Cryptography, Darmstadt, Germany, 22.11.2013
-
A Framework for Multi-Factor Authentication.
CryptoForma Network, 9th Meeting, Guildford, UK, 29.11.2012
-
Relationships among Privacy Notions for Signatures.
Dagstuhl-Seminar "Privacy-Oriented Cryptography", Dagstuhl, Germany, 20.09.2012
-
Publicly Verifiable Ciphertexts.
8th International Conference on Security and Cryptography for Networks (SCN 2012), Amalfi, Italy, 06.09.2012
-
Forward-Secure Hierarchical Predicate Encryption.
5th International Conference on Pairing-Based Cryptography (Pairing 2012), Cologne, Germany, 17.05.2012
-
Pseudorandom Signatures.
CryptoForma Network, 7th Meeting, Edinburgh, UK, 01.03.2012
-
Group Signature with Constant Revocation Costs for Signers and Verifiers.
10th International Conference on Cryptology and Network Security 2011, Sanya, China, 11.12.2011
-
Non-Interactive and Re-Usable UC String Commitments with Adaptive Security.
ASIACRYPT 2011, Seoul, Korea, 07.12.2011 [PDF]
Invited talk. Crypto Seminar, IBM Research T.J. Watson, NY, USA, 01.12.2011
-
Social Authentication with Privacy.
Invited talk. Royal Holloway, University of London, UK, 23.06.2011
-
Privacy-Oriented Cryptography for Social Clouds.
Invited talk. LACS Seminar, University of Luxembourg, 19.05.2011
-
Cryptographic Approach to Private Social Clouds.
Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France, 06.05.2011
-
Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation.
ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, 24.03.2011
[PDF]
-
Cryptographic Treatment of Private User Profiles.
15th International Conference on Financial Cryptography and Data Security (FC 2011), RLCPS, St. Lucia, 04.03.2011
[PDF]
-
Affiliation-Hiding Authentication.
Invited talk. Royal Holloway, University of London, UK 21.10.2010
-
Privacy via Group Authentication.
Invited talk. Goethe University of Frankfurt, Germany 01.09.2010
-
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, 23.06.2010
[PDF]
-
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
AFRICACRYPT 2010, Stellenbosch, South Africa, 05.05.2010
[PDF]
-
Privacy-Preserving Admission to Mobile Peer-to-Peer Groups.
8th IEEE Intl. Conference on Pervasive Computing and Communications, MP2P Workshop, Mannheim, Germany, 02.04.2010
[PDF]
-
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
8th International Conference on Cryptology and Network Security, Kanazawa, Ishikawa, Japan, 14.12.2009
[PDF]
-
Parameterwahl für sichere zeitgemäße Verschlüsselung.
Invited talk. CAST e.V. Workshop "Datenschutz", Darmstadt, Germany, 29.10.2009
[PDF]
-
Securing Roaming Access Inside Wireless Mesh Networks.
10th International Workshop on Information Security Applications, Busan, South Korea, 27.08.2009
[PDF]
-
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
7th International Conference on Applied Cryptography and Network Security, Paris-Rocquencourt, France, 02.06.2009
[PDF]
-
Non-Interactive Computation of Pairwise Keys in Group Diffie-Hellman Protocols.
Invited talk. Workshop on Cryptographic Protocols and Public-Key Cryptography, BiCi, University Residential Center, Bertinoro (Forlì-Cesena), Italy, 26.05.2009
-
Authenticated Wireless Roaming via Tunnels.
Invited talk. GI/HGI Wireless Security 2009, Bochum, Germany, 13.03.2009
[PDF]
-
The Concept of Wireless Roaming via Tunnels: Authentication and Key Establishment Issues.
Invited talk. BCRYPT PhD Day, Leuven, Belgium, 13.10.2008
-
Fully Robust Group Key Exchange in the Presence of Opening Attacks.
Invited talk. ACAC Seminar, Centre for Advanced Computing - Algorithms and Cryptography, Macquarie University, Sydney, Australia, 11.07.2008
-
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
13th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 07.07.2008
-
Provably Secure Browser-Based User-Aware Mutual Authentication over TLS.
ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 20.03.2008
-
Securing Group Key Exchange against Strong Corruptions.
ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 19.03.2008
-
On Security Models and Compilers for Group Key Exchange Protocols.
2nd International Workshop on Security, Nara, Japan, 30.10.2007
-
Provably Secure Framework for Information Aggregation in Sensor Networks.
7th International Conference on Computational Science and Applications, Kuala Lumpur, Malaysia, 27.08.2007
-
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust.
4th International Conference on Autonomic and Trusted Computing, Hong Kong, China, 13.07.2007
-
Browser-based Authentication Protocols for Naive Users.
Western European Workshop on Research in Cryptology, Bochum, Germany, 06.07.2007
-
Security-Enhancing Compilers for Group Key Exchange Protocols.
Invited talk. UCL Crypto Group Seminar, Louvain-la-Neuve, Belgium, 20.06.2007
-
Strong Corruptions in Group Key Exchange.
Invited talk. Workshop on Cryptographic Protocols,
BiCi, University Residential Center, Bertinoro (Forli-Cesena), Italy 08.03.2007
-
Kryptographie und Datensicherheit.
Invited tutorial. Im Rahmen
des Weiterbildungsstudiums "IT-Sicherheit- Administration und
Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität
Bochum, 10.02.2007
-
A Security Model for Group Key Exchange.
ECRYPT-PROVILAB Meeting,
Horst Görtz Institute for IT Security, Bochum, Germany 05.10.2006
-
Group Signatures for Federated Systems.
Invited talk. Séminaire de Cryptographie, CELAR/Université de Rennes 1, Rennes, France 02.06.2006
-
New Paradigms for Group Signatures in Federated Systems.
4. Kryptotag, Horst Görtz Institute for IT Security, Bochum, Germany 11.05.2006 [PDF]
-
Property-Based Taming of Lying Mobile Nodes.
IEEE International Workshop on Trusted and Autonomic Computing Systems, Vienna, Austria, 19.04.2006
-
Linkable Democratic Group Signatures.
2nd Information Security Practice and Experience Conference, Hangzhou, China, 13.04.2006
-
Democratic Group Signatures.
ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 21.03.2006
-
Kryptographie und Datensicherheit.
Invited tutorial. Weiterbildungsstudium "IT-Sicherheit- Administration und
Sicherheit von IT-Systemen und -Netzwerken", Ruhr-Universität
Bochum, 17/02/2006
-
CGKA Protocols, Revisited for Mobile Ad-Hoc Groups.
International Workshop on Wireless and Sensor Networks Security, Washington, USA, 07.11.2005
-
Key Agreement for Heterogeneous Mobile Ad-Hoc Groups.
International Workshop on Security in Networks and Distributed Systems, Fukuoka, Japan, 21.07.2005
-
Binary Trees in Group Communication Security.
Invited talk. PG seminar "Algebra and Geometry", Chair for Algebra and Geometry, Ruhr University Bochum, Germany, 17.12.2005
-
Pseudonym Generation Scheme for Ad-Hoc Group Communication.
European Workshop on Security in Ad-Hoc and Sensor Networks, Heidelberg, Germany, 05.08.2004