国際論文編集委員

  1. Special Issue on Cloud Computing Security and Privacy: Standards and Regulations. Computer Standards & Interfaces (CSI)
  2. Special Issue on Cryptography in Computer System Security, International Journal of Information and Computer Security (IJICS), 2007
  3. Special Issue on Cryptography in Networks, International Journal of Networks and Security (IJNS), 2006

国際会議プログラム委員長

  1. 2017 IEEE Global Communications Conference (Globecom'17 - CISS)
  2. The 15th International Conference on Applied Cryptography andNetwork Security (ACNS 2017)
  3. The 9th International Conference on Provable Security(ProvSec 2015)
  4. The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
  5. The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair

国際会議プログラム委員

  1. The 16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
  2. The 20th Conference on Cryptographic Hardware and Embedded Systems (CHES 2018)
  3. The 16th IMA International Conference on Cryptography and Coding
  4. 2017 IEEE Global Communications Conference (Globecom'17 - CISS)
  5. The 12th China International Conference on Information Security and Cryptology (Inscrypt 2016)
  6. The 11th International Workshop on Data Privacy Management(DPM 2016)
  7. 2016 IEEE Global Communications Conference (Globecom'16 - CISS)
  8. The 19th Annual International Conference on Information Security and Cryptology (ICISC 2016)
  9. The 3rd International Conference on Research in Security Standardisation (SSR 2016)
  10. The 15th International Conference on Cryptology and Network Security (CANS 2016)
  11. The 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2016)
  12. The 10th International Conference on Provable Security (ProvSec 2016)
  13. The 3rd International Conference on Future Data and Security Engineering 2016 (FDSE 2016)
  14. International Conference on Advanced Computing and Applications 2016 (ACOMP 2016)
  15. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016)
  16. The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
  17. The 17th International Conference on Information and Communication Security (ICICS2015)
  18. The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)
  19. The 2nd International Conference on Research in Security Standardisation (SSR 2015)
  20. The 15th IMA International Conference on Cryptography and Coding (IMACC 2015)
  21. International Conference on Advanced Computing and Applications 2015 (ACOMP 2015)
  22. The 12th International Conference on Security and Cryptography (SECRYPT 2015)
  23. The 13th Annual Conference on Privacy, Security and Trust (PST 2015)
  24. The 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
  25. The 10th China International Conference on Information Security and Cryptology (Inscrypt 2014)
  26. The 17th Annual International Conference on Information Security and Cryptology (ICISC 2014)
  27. The 1st International Conference on Research in Security Standardisation (SSR 2014)
  28. The conference Future Data and Security Engineering (FDSE 2014)
  29. The 14th IEEE International Conference on Computer and Information Technology (CIT 2014)
  30. ProvSec 2014 (8th International Conference on Provable Security)
  31. The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
  32. The 19th Australasian Conference on Information Security and Privacy (ACISP2014)
  33. 12th International Conference on Applied Cryptography and Network Security(ACNS 2014)
  34. The 16th Information Security Conference(ISC 2013)
  35. The 9th China International Conference on Information Security and Cryptology (Inscrypt 2013)
  36. The 6th International Conference on Pairing-Based Cryptography (Pairing 2013)
  37. The 15th International Conference on Information and Communications Security (ICICS 13)
  38. The 16th International Conference on Information Security and Cryptology (ICISC 2013)
  39. The 18th Australasian Conference on Information Security and Privacy (ACISP2013)
  40. The 18th European Symposium on Research in Computer Security(ESORICS 2013)
  41. The 2013 Asian Conference on Availability, Reliability and Security(AsiaARES 2013)
  42. The 9th Information Security Practice and Experience Conference (ISPEC 2013)
  43. The 17th Financial Cryptography and Data Security (FC 2013)
  44. The 13th Cryptographers' Track of the RSA Conference 2013 (CT-RSA 2013)
  45. The 15th International Conference on Information Security and Cryptology (ICISC 2012)
  46. The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012)
  47. The 11th International Conference on Cryptology and Network Security (CANS 2012)
  48. The 15th Information Security Conference (ISC 2012)
  49. The 13th International Workshop on Information Security Applications (WISA 2012)
  50. The International Conference on Security and Cryptography (SECRYPT 2012)
  51. The 5th International Conference on Pairing-Based Cryptography (Pairing 2012)
  52. The 17th European Symposium on Research in Computer Security (ESORICS 2012)
  53. The 6th International Conference on Provable Security (ProvSec 2012)
  54. The 17th Australasian Conference on Information Security and Privacy (ACISP 2012)
  55. The 10th International Conference on Applied Cryptography and Network Security (ANCS 2012)
  56. The 8th Information Security Practice and Experience - 8th International Conference (ISPEC 2012)
  57. The 7th China International Conference on Information Security and Cryptology (Inscrypt 2011)
  58. The 14th International Conference on Information Security and Cryptology (ICISC 2011)
  59. The 12th workshop of InformationSecurity Applications (WISA2011)
  60. The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011)
  61. The 10th International Conference on Cryptology and Network Security (CANS 2011)
  62. The 14th Information Security Conference (ISC 2011)
  63. The 16th Australasian Conference on Information Security and Privacy (ACISP 2011)
  64. The 2011 Workshop on RFID Security (RFIDsec'11 Asia)
  65. The 7th Information Security Practice and Experience Conference (ISPEC 2011)
  66. The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
  67. The 13th International Conference on Information Security and Cryptology (ICISC 2010)
  68. The 11th International Workshop on Information Security Applications (WISA 2010)
  69. The 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010)
  70. The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
  71. The 15th Australasian Conference on Information Security and Privacy (ACISP 2010)
  72. The 6th Information Security Practice and Experience Conference (ISPEC2010)
  73. The 8th International Conference on Applied Cryptography and Network Security (ACNS2010)
  74. The 4th International Conference on Pervasive Computing and Applications (ICPCA2009)
  75. The 12th International Conference on Information Security and Cryptology (ICISC 2009)
  76. The 10th International Workshop on Information Security Applications (WISA2009)
  77. International Conference on Security and Cryptography 2009 (SECRYPT 2009)
  78. The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair
  79. International Workshop on Security 2009 (IWSEC 2009)
  80. The 4th International Conference on Pervasive Computing and Applications(ICPCA09)
  81. The 2009 International Workshop on Computer Graphics, Multimedia andSecurity (CGMS-09)
  82. The 14th Australasian Conference on Information Security and Privacy (ACISP 2009)
  83. The 5th Information Security Practice and Experience Conference (ISPEC 2009)
  84. The 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
  85. The 11th International Conference on Information Security and Cryptology (ICISC) 2008
  86. International Conference on Security and Cryptography (SECRYPT) 2008
  87. 11th International Security Conference 2008 (ISC08)
  88. International Workshop on Security 2008 (IWSEC2008)
  89. Africacrypt 2008
  90. The 4th Information Security Practice and Experience Conference (ISPEC 2008)
  91. EUROCRYPT 2008
  92. The 2007 International Conference on Intelligent Pervasive Computing (IPC-07)
  93. ICISC 2007
  94. IASTED International Conference on Communication, Network, and Information Security (CNIS 2007)
  95. International Conference on Security and Cryptography (SECRYPT) 2007
  96. Information Security Conference (ISC'07)
  97. International Workshop on Security 2007 (IWSEC 2007), Co-Program chair
  98. International Conference on Provable Security 2007 (ProvSec 2007)
  99. Pairing-based Cryptography 2007
  100. Security and Cryptography for Networks (SCN) 2006
  101. IASTED International Conference on CNIS 2006
  102. International Conference on CRYPTOLOGY AND NETWORK SECURITY (CANS '06)
  103. IFIP International Conference on EUC'2006
  104. International Workshop on Security 2006 (IWSEC 2006), Award chair
  105. EUROCRYPT 2006
  106. ACISP 2006
  107. ICISC 2006
  108. International Conference on Security and Cryptography (SECRYPT 2006)
  109. ACNS 2005
  110. WISA 2005
  111. IASTED CCN 2005
  112. ICISC 2005
  113. ASIACRYPT 2004
  114. ISITA 2004
  115. ISITA 2000 秘書
  116. IASTED 2003
  117. ACNS 2003
  118. ICISC 2002
  119. ACISP 2002
  120. ICISC 2001
  121. The 23th Annual International Conference on Information Security and Cryptology (ICISC 2020)
  122. The 22th International Conference on Information and Communications Security(ICICS 2020)
  123. The 4th IEEE International Workshop on Big Data and IoT Security in Smart Computing
  124. The 22th Conference on Cryptographic Hardware and Embedded Systems (CHES 2020)
  125. The 17th International Conference on Privacy, Security and Trust (PST 2019)
  126. The 21th Conference on Cryptographic Hardware and Embedded Systems (CHES 2019)
  127. The 20th International Conference on Information and Communications Security(ICICS 2018)
  128. The 5th International Conference on Future Data and Security Engineering 2018(FDSE 2018)
  129. The 16th International Conference on Privacy, Security and Trust (PST 2018)
  130. The 21st Information Security Conference(ISC 2018)
Top