Some Professional Activities

I am/was affiliated with the following Journal

  1. Special Issue on Cloud Computing Security and Privacy: Standards and Regulations. Computer Standards & Interfaces (CSI)
  2. Special Issue on Cryptography in Computer System Security, International Journal of Information and Computer Security (IJICS), 2007
  3. Special Issue on Cryptography in Networks, International Journal of Networks and Security (IJNS), 2006

I am/was Program Chair of the following Conferences

  1. The 15th International Conference on Applied Cryptography andNetwork Security (ACNS 2017)
  2. The 9th International Conference on Provable Security(ProvSec 2015)
  3. The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
  4. The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair

I am/was affiliated with the following Conferences

  1. The 16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
  2. The 20th Conference on Cryptographic Hardware and Embedded Systems (CHES 2018)
  3. The 16th IMA International Conference on Cryptography and Coding
  4. 2017 IEEE Global Communications Conference (Globecom'17 - CISS)
  5. The 15th International Conference on Applied Cryptography andNetwork Security (ACNS 2016)
  6. The 12th China International Conference on Information Security and Cryptology (Inscrypt 2016)
  7. The 11th International Workshop on Data Privacy Management(DPM 2016)
  8. 2016 IEEE Global Communications Conference (Globecom'16 - CISS)
  9. The 19th Annual International Conference on Information Security and Cryptology (ICISC 2016)
  10. The 3rd International Conference on Research in Security Standardisation (SSR 2016)
  11. The 15th International Conference on Cryptology and Network Security (CANS 2016)
  12. The 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2016)
  13. The 10th International Conference on Provable Security (ProvSec 2016)
  14. The 3rd International Conference on Future Data and Security Engineering 2016 (FDSE 2016)
  15. International Conference on Advanced Computing and Applications 2016 (ACOMP 2016)
  16. The 14th International Conference on Applied Cryptography and Network Security (ACNS 2016)
  17. The 9th International Conference on Provable Security(ProvSec 2015)
  18. The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
  19. The 17th International Conference on Information and Communication Security (ICICS2015)
  20. The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)
  21. The 2nd International Conference on Research in Security Standardisation (SSR 2015)
  22. The 15th IMA International Conference on Cryptography and Coding (IMACC 2015)
  23. International Conference on Advanced Computing and Applications 2015 (ACOMP 2015)
  24. The 12th International Conference on Security and Cryptography (SECRYPT 2015)
  25. The 13th Annual Conference on Privacy, Security and Trust (PST 2015)
  26. The 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
  27. The 10th China International Conference on Information Security and Cryptology (Inscrypt 2014)
  28. The 17th Annual International Conference on Information Security and Cryptology (ICISC 2014)
  29. The 1st International Conference on Research in Security Standardisation (SSR 2014)
  30. The conference Future Data and Security Engineering (FDSE 2014)
  31. The 14th IEEE International Conference on Computer and Information Technology (CIT 2014)
  32. The 8th International Conference on Provable Security (ProvSec 2014)
  33. The 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014)
  34. The 19th Australasian Conference on Information Security and Privacy (ACISP2014)
  35. 12th International Conference on Applied Cryptography and Network Security(ACNS 2014)
  36. The 16th Information Security Conference(ISC 2013)
  37. The 9th China International Conference on Information Security and Cryptology (Inscrypt 2013)
  38. The 6th International Conference on Pairing-Based Cryptography (Pairing 2013)
  39. The 15th International Conference on Information and Communications Security (ICICS 13)
  40. The 16th International Conference on Information Security and Cryptology (ICISC 2013)
  41. The 18th Australasian Conference on Information Security and Privacy (ACISP2013)
  42. The 18th European Symposium on Research in Computer Security(ESORICS 2013)
  43. The 2013 Asian Conference on Availability, Reliability and Security(AsiaARES 2013)
  44. The 9th Information Security Practice and Experience Conference (ISPEC 2013)
  45. The 17th Financial Cryptography and Data Security (FC 2013)
  46. The 13th Cryptographers' Track of the RSA Conference 2013 (CT-RSA 2013)
  47. The 15th International Conference on Information Security and Cryptology (ICISC 2012)
  48. The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012)
  49. The 13th International Workshop on Information Security Applications (WISA 2012)
  50. The International Conference on Security and Cryptography (SECRYPT 2012)
  51. The 5th International Conference on Pairing-Based Cryptography (Pairing 2012)
  52. The 17th European Symposium on Research in Computer Security (ESORICS 2012)
  53. The 11th International Conference on Cryptology and Network Security (CANS 2012)
  54. The 15th Information Security Conference (ISC 2012)
  55. The 6th International Conference on Provable Security (ProvSec 2012)
  56. The 16th Australasian Conference on Information Security and Privacy (ACISP 2012)
  57. The 10th International Conference on Applied Cryptography and Network Security (ANCS 2012)
  58. The 8th Information Security Practice and Experience - 7th International Conference (ISPEC 2012)
  59. The 7th China International Conference on Information Security and Cryptology (Inscrypt 2011)
  60. The 14th International Conference on Information Security and Cryptology (ICISC 2011)
  61. The 12th workshop of InformationSecurity Applications (WISA2011)
  62. The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011)
  63. The 10th International Conference on Cryptology and Network Security (CANS 2011)
  64. The 14th Information Security Conference (ISC 2011)
  65. The 16th Australasian Conference on Information Security and Privacy (ACISP 2011)
  66. The 2011 Workshop on RFID Security (RFIDsec'11 Asia)
  67. The 7th Information Security Practice and Experience Conference (ISPEC 2011)
  68. The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010)
  69. The 13th International Conference on Information Security and Cryptology (ICISC 2010)
  70. The 11th International Workshop on Information Security Applications (WISA 2010)
  71. The 4th International Conference on Trusted Cloud Infrastructure (ICTCI 2010)
  72. The 4th International Conference on Pairing-based Cryptography (Pairing 2010), Co-Program chair
  73. The 15th Australasian Conference on Information Security and Privacy (ACISP 2010)
  74. The 8th Information Security Practice and Experience Conference (ISPEC2012)
  75. The 8th International Conference on Applied Cryptography and Network Security (ACNS2010)
  76. The 4th International Conference on Pervasive Computing and Applications (ICPCA2009)
  77. The 12th International Conference on Information Security and Cryptology (ICISC 2009)
  78. The 10th International Workshop on Information Security Applications (WISA2009)
  79. International Conference on Security and Cryptography 2009 (SECRYPT 2009)
  80. The 8th International Conference on Cryptology and Network Security (CANS 2009), Co-Program chair
  81. International Workshop on Security 2009 (IWSEC 2009)
  82. The 4th International Conference on Pervasive Computing and Applications(ICPCA09)
  83. The 2009 International Workshop on Computer Graphics, Multimedia andSecurity (CGMS-09)
  84. The 14th Australasian Conference on Information Security and Privacy (ACISP 2009)
  85. The 5th Information Security Practice and Experience Conference (ISPEC 2009)
  86. The 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS'09)
  87. The 11th International Conference on Information Security and Cryptology (ICISC) 2008
  88. International Conference on Security and Cryptography (SECRYPT) 2008
  89. 11th International Security Conference 2008 (ISC08)
  90. International Workshop on Security 2008 (IWSEC2008)
  91. Africacrypt 2008
  92. The 4th Information Security Practice and Experience Conference (ISPEC 2008)
  93. EUROCRYPT 2008
  94. The 2007 International Conference on Intelligent Pervasive Computing (IPC-07)
  95. ICISC 2007
  96. IASTED International Conference on Communication, Network, and Information Security (CNIS 2007)
  97. International Conference on Security and Cryptography (SECRYPT 2007)
  98. Information Security Conference (ISC'07)
  99. International Workshop on Security 2007 (IWSEC 2007), Co-Program chair
  100. International Conference on Provable Security 2007 (ProvSec 2007)
  101. Pairing-based Cryptography 2007
  102. Security and Cryptography for Networks (SCN) 2006
  103. IASTED International Conference on CNIS 2006
  104. International Conference on CRYPTOLOGY AND NETWORK SECURITY (CANS '06)
  105. IFIP International Conference on EUC'2006
  106. International Workshop on Security 2006 (IWSEC 2006), Award chair
  107. EUROCRYPT 2006
  108. ACISP 2006
  109. ICISC 2006
  110. International Conference on Security and Cryptography (SECRYPT 2006)
  111. ACNS 2005
  112. WISA 2005
  113. IASTED CCN 2005
  114. ICISC 2005
  115. ASIACRYPT 2004
  116. ISITA 2004
  117. ISITA 2000, Secretary
  118. IASTED 2003
  119. ACNS 2003
  120. ICISC 2002
  121. ACISP 2002
  122. ICISC 2001
  123. The 23th Annual International Conference on Information Security and Cryptology (ICISC 2020)
  124. The 22th International Conference on Information and Communications Security(ICICS 2020)
  125. The 4th IEEE International Workshop on Big Data and IoT Security in Smart Computing
  126. The 22th Conference on Cryptographic Hardware and Embedded Systems (CHES 2020)
  127. The 17th International Conference on Privacy, Security and Trust (PST 2019)
  128. The 21th Conference on Cryptographic Hardware and Embedded Systems (CHES 2019)
  129. The 20th International Conference on Information and Communications Security(ICICS 2018)
  130. The 5th International Conference on Future Data and Security Engineering 2018(FDSE 2018)
  131. The 16th International Conference on Privacy, Security and Trust (PST 2018)
  132. The 21st Information Security Conference(ISC 2018)
Top