Some Professional Activities
I am/was affiliated with the following Journal
- Special Issue on Cloud Computing Security and Privacy: Standards and Regulations. Computer Standards & Interfaces (CSI)
- Special Issue on Cryptography in Computer System Security, International Journal of Information and Computer Security (IJICS), 2007
- Special Issue on Cryptography in Networks, International Journal of Networks and Security (IJNS), 2006
I am/was Program Chair of the following Conferences
- The 15th International Conference on Applied Cryptography andNetwork Security (ACNS 2017)
- The 9th International Conference on Provable Security(ProvSec 2015)
- The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
- The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair
I am/was affiliated with the following Conferences
- The 16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
- The 20th Conference on Cryptographic Hardware and Embedded Systems (CHES 2018)
- The 16th IMA International Conference on Cryptography and Coding
- 2017 IEEE Global Communications Conference (Globecom'17 - CISS)
- The 15th International Conference on Applied Cryptography andNetwork Security (ACNS 2016)
- The 12th China International Conference on Information Security and Cryptology (Inscrypt 2016)
- The 11th International Workshop on Data Privacy Management(DPM 2016)
- 2016 IEEE Global Communications Conference (Globecom'16 - CISS)
- The 19th Annual International Conference on Information Security and Cryptology (ICISC 2016)
- The 3rd International Conference on Research in Security Standardisation (SSR 2016)
- The 15th International Conference on Cryptology and Network Security (CANS 2016)
- The 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2016)
- The 10th International Conference on Provable Security (ProvSec 2016)
- The 3rd International Conference on Future Data and Security Engineering 2016 (FDSE 2016)
- International Conference on Advanced Computing and Applications 2016 (ACOMP 2016)
- The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016)
- The 9th International Conference on Provable Security(ProvSec 2015)
- The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
- The 17th International Conference on Information and Communication Security (ICICS2015)
- The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)
- The 2nd International Conference on Research in Security Standardisation (SSR 2015)
- The 15th IMA International Conference on Cryptography and Coding (IMACC 2015)
- International Conference on Advanced Computing and Applications 2015 (ACOMP 2015)
- The 12th International Conference on Security and Cryptography (SECRYPT 2015)
- The 13th Annual Conference on Privacy, Security and Trust (PST 2015)
- The 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
- The 10th China International Conference on Information Security and Cryptology (Inscrypt 2014)
- The 17th Annual International Conference on Information Security and Cryptology (ICISC 2014)
- The 1st International Conference on Research in Security Standardisation (SSR 2014)
- The conference Future Data and Security Engineering (FDSE 2014)
- The 14th IEEE International Conference on Computer and Information Technology (CIT 2014)
- The 8th International Conference on Provable Security (ProvSec 2014)
- The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
- The 19th Australasian Conference on Information Security and Privacy (ACISP2014)
- 12th International Conference on Applied Cryptography and Network Security(ACNS 2014)
- The 16th Information Security Conference(ISC 2013)
- The 9th China International Conference on Information Security and Cryptology (Inscrypt 2013)
- The 6th International Conference on Pairing-Based Cryptography (Pairing 2013)
- The 15th International Conference on Information and Communications Security (ICICS 13)
- The 16th International Conference on Information Security and Cryptology (ICISC 2013)
- The 18th Australasian Conference on Information Security and Privacy (ACISP2013)
- The 18th European Symposium on Research in Computer Security(ESORICS 2013)
- The 2013 Asian Conference on Availability, Reliability and Security(AsiaARES 2013)
- The 9th Information Security Practice and Experience Conference (ISPEC 2013)
- The 17th Financial Cryptography and Data Security (FC 2013)
- The 13th Cryptographers' Track of the RSA Conference 2013 (CT-RSA 2013)
- The 15th International Conference on Information Security and Cryptology (ICISC 2012)
- The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012)
- The 13th International Workshop on Information Security Applications (WISA 2012)
- The International Conference on Security and Cryptography (SECRYPT 2012)
- The 5th International Conference on Pairing-Based Cryptography (Pairing 2012)
- The 17th European Symposium on Research in Computer Security (ESORICS 2012)
- The 11th International Conference on Cryptology and Network Security (CANS 2012)
- The 15th Information Security Conference (ISC 2012)
- The 6th International Conference on Provable Security (ProvSec 2012)
- The 16th Australasian Conference on Information Security and Privacy (ACISP 2012)
- The 10th International Conference on Applied Cryptography and Network Security (ANCS 2012)
- The 8th Information Security Practice and Experience - 7th International Conference (ISPEC 2012)
- The 7th China International Conference on Information Security and Cryptology (Inscrypt 2011)
- The 14th International Conference on Information Security and Cryptology (ICISC 2011)
- The 12th workshop of InformationSecurity Applications (WISA2011)
- The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011)
- The 10th International Conference on Cryptology and Network Security (CANS 2011)
- The 14th Information Security Conference (ISC 2011)
- The 16th Australasian Conference on Information Security and Privacy (ACISP 2011)
- The 2011 Workshop on RFID Security (RFIDsec'11 Asia)
- The 7th Information Security Practice and Experience Conference (ISPEC 2011)
- The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
- The 13th International Conference on Information Security and Cryptology (ICISC 2010)
- The 11th International Workshop on Information Security Applications (WISA 2010)
- The 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010)
- The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
- The 15th Australasian Conference on Information Security and Privacy (ACISP 2010)
- The 8th Information Security Practice and Experience Conference (ISPEC2012)
- The 8th International Conference on Applied Cryptography and Network Security (ACNS2010)
- The 4th International Conference on Pervasive Computing and Applications (ICPCA2009)
- The 12th International Conference on Information Security and Cryptology (ICISC 2009)
- The 10th International Workshop on Information Security Applications (WISA2009)
- International Conference on Security and Cryptography 2009 (SECRYPT 2009)
- The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair
- International Workshop on Security 2009 (IWSEC 2009)
- The 4th International Conference on Pervasive Computing and Applications(ICPCA09)
- The 2009 International Workshop on Computer Graphics, Multimedia andSecurity (CGMS-09)
- The 14th Australasian Conference on Information Security and Privacy (ACISP 2009)
- The 5th Information Security Practice and Experience Conference (ISPEC 2009)
- The 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
- The 11th International Conference on Information Security and Cryptology (ICISC) 2008
- International Conference on Security and Cryptography (SECRYPT) 2008
- 11th International Security Conference 2008 (ISC08)
- International Workshop on Security 2008 (IWSEC2008)
- Africacrypt 2008
- The 4th Information Security Practice and Experience Conference (ISPEC 2008)
- EUROCRYPT 2008
- The 2007 International Conference on Intelligent Pervasive Computing (IPC-07)
- ICISC 2007
- IASTED International Conference on Communication, Network, and Information Security (CNIS 2007)
- International Conference on Security and Cryptography (SECRYPT 2007)
- Information Security Conference (ISC'07)
- International Workshop on Security 2007 (IWSEC 2007), Co-Program chair
- International Conference on Provable Security 2007 (ProvSec 2007)
- Pairing-based Cryptography 2007
- Security and Cryptography for Networks (SCN) 2006
- IASTED International Conference on CNIS 2006
- International Conference on CRYPTOLOGY AND NETWORK SECURITY (CANS '06)
- IFIP International Conference on EUC'2006
- International Workshop on Security 2006 (IWSEC 2006), Award chair
- EUROCRYPT 2006
- ACISP 2006
- ICISC 2006
- International Conference on Security and Cryptography (SECRYPT 2006)
- ACNS 2005
- WISA 2005
- IASTED CCN 2005
- ICISC 2005
- ASIACRYPT 2004
- ISITA 2004
- ISITA 2000, Secretary
- IASTED 2003
- ACNS 2003
- ICISC 2002
- ACISP 2002
- ICISC 2001
- The 23th Annual International Conference on Information Security and Cryptology (ICISC 2020)
- The 22th International Conference on Information and Communications Security(ICICS 2020)
- The 4th IEEE International Workshop on Big Data and IoT Security in Smart Computing
- The 22th Conference on Cryptographic Hardware and Embedded Systems (CHES 2020)
- The 17th International Conference on Privacy, Security and Trust (PST 2019)
- The 21th Conference on Cryptographic Hardware and Embedded Systems (CHES 2019)
- The 20th International Conference on Information and Communications Security(ICICS 2018)
- The 5th International Conference on Future Data and Security Engineering 2018(FDSE 2018)
- The 16th International Conference on Privacy, Security and Trust (PST 2018)
- The 21st Information Security Conference(ISC 2018)