Infocomm Security (ICS)


People visiting us are invited to give talks at our seminar.

  1. Two-Party Computation on Private Information from Homomorphic Encryption Schemes
    David Pointcheval (ENS, France)
    2 December 2016

  2. Security by Design is an Oxymoron
    Dieter Gollmann (Hamburg University of Technology, Germany)
    22 March 2016

  3. Design of Lightweight and Secure VANET-based Navigation Service
    Maode Ma (Nanyang Technological University, Singapore)
    20 October 2015

  4. Traceback of Distributed Denial-of-Service (DDoS) Attacks
    Wanlei Zhou (Deakin University, Australia)
    4 September 2015

  5. A Secure Engineering Perspective from the Aerospace Industry
    Michael Papay (Northrop Grumman, USA)
    17 April 2015

  6. All Your Location are Belong to Us: Breaking Mobile Social Networks for Automated User Location Tracking
    Kui Ren (State University of New York at Buffalo, USA)
    11 December 2014

  7. A Conditional Algebraic Differential Cryptanalysis of the Crypto-1 Stream Cipher
    Chen-Mou Cheng (National Taiwan University, Taiwan)
    16 October 2014

  8. Authentication in Constrained Settings: Challenges and Directions
    Katerina Mitrokotsa (Chalmers University of Technology, Sweden)
    1 October 2014

  9. A Security Vulnerability Analysis System for Android Applications
    Hung-Min Sun (National Tsing Hua University, Taiwan)
    25 August 2014

  10. Toward Obfuscation-resilient Mobile App Repackaging Detection in Android
    Sencun Zhu (Pennsylvania State University, USA)
    1 July 2014

  11. Preserving Receiver-Location Privacy in Wireless Sensor Networks
    Javier Lopez (University of Malaga, Spain)
    1 July 2014

  12. Practical Techniques for Privacy-Enhanced Collaborative Filtering
    Richard Chow (Intel, USA)
    25 March 2014

  13. Cybersecurity for Industrial Control Systems
    Kazukuni Kobara (National Institute of Advanced Industrial Science and Technology, Japan)
    24 March 2014

  14. Security for Cyber-physical Systems
    Dieter Gollmann (Hamburg University of Technology, Germany)
    6 February 2014

  15. Towards Redesigning Web Browsers with Security Principles
    Xinshu Dong (National University of Singapore, Singapore)
    22 November 2013

  16. LTE Security
    Maode Ma (Nanyang Technological University, Singapore)
    21 November 2013

  17. Data Security and Privacy in the Cloud
    Pierangela Samarati (UniversitÓ degli Studi di Milano, Italy)
    14 November 2013

  18. My software has a vulnerability, should I worry?
    Fabio Massacci (University of Trento, Italy)
    16 September 2013

  19. My Smartphone is my Best Friend - On the Trustworthiness of Smart Devices
    Ahmad-Reza Sadeghi (Technische Universitaet Darmstadt, Germany)
    30 January 2013

  20. Real Traceable Signatures and Double-Trapdoor Anonymous Tags
    Sherman Chow (University of Waterloo, Canada)
    25 June 2012

  21. On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principles and Usability
    Jin Han (Singapore Management University, Singapore)
    21 February 2012

  22. Cryptography and Computer Security
    Dieter Gollmann (Hamburg University of Technology, Germany)
    29 August 2011

  23. Privacy-Preserving Public Auditing for Shared Data in the Cloud
    Hui Li (Xidian University, China)
    26 August 2011

  24. Security and Optimization in Wireless Multi-Hop Network
    Li Xu (Fujian Normal University, China)
    22 July 2011

  25. Cloud Trends and Security Challenges
    Chunming Rong (University of Stavanger, Norway)
    25 March 2011

  26. Fragments and Loose Associations: Respecting Privacy in Data Publishing
    Pierangela Samarati (University of Milan, Italy)
    6 September 2010

  27. How to Apply for Research Grants from EU and Collaboration Opportunities in the EU Work Programme 2011-2013
    Javier Lopez (University of Malaga, Spain)
    16 August 2010

  28. Identity-Based Chameleon Hash Scheme Without Key Exposure
    Willy Susilo (University of Wollongong, Australia)
    21 July 2010

  29. Universal Authentication Protocols for Anonymous Wireless Communications
    Duncan Wong (City University of Hong Kong, China)
    8 July 2010

  30. ID-Documents: Some Emerging Strategies for Privacy and Security
    Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
    22 March 2010

  31. Lightweight Cryptography - An Update
    Matt Robshaw (Orange Labs, France)
    25 February 2010

  32. Pairing-Based Cryptography and Its Security Analysis
    Tsuyoshi Takagi (Future University - Hakodate, Japan)
    12 January 2010

  33. Key Escrow Problem in Identity-based Cryptography
    Tsz-Hon Yuen (University of Wollongong, Australia)
    30 November 2009

  34. Security-By-Contract (SxC) for Mobile Systems
    Fabio Massacci (University of Trento, Italy)
    13 March 2009

  35. Security Research in UMA and Opportunities for Collaboration with External Funding
    Javier Lopez (University of Malaga, Spain)
    13 February 2009

  36. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
    Tsuyoshi Takagi (Future University - Hakodate, Japan)
    3 February 2009

  37. Security for Passive RFID
    Manfred Aigner (Graz University of Technology, Austria)
    15 January 2009

  38. Current Status on Research, Development and Standardization of Low-Power/Light-Weight Cryptographic Technologies
    Kouichi Sakurai (Kyushu University, Japan)
    14 November 2008

  39. Access Control in Workflow Authorization Systems
    Ninghui Li (Purdue University, USA)
    18 July 2008

  40. Automated Trust Negotiation Using Cryptographic Credentials
    Ninghui Li (Purdue University, USA)
    11 July 2008

  41. Wireless Sensor Network Security - A Practical Point of View
    Rodrigo Roman (University of Malaga, Spain)
    15 February 2008

  42. Identity Protection - Power of Diversity
    Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
    10 December 2007

  43. Current Status on Standardization of Cryptographic Technologies
    Kouichi Sakurai (Kyushu University, Japan)
    12 November 2007

  44. The Need of Deniability in Identification Schemes
    Willy Susilo (University of Wollongong, Australia)
    25 October 2007

  45. Products of Small Primes in Cryptography, Error Correcting Codes and Theoretical Computer Science
    David Naccache (Ecole Normale Superieure, France)
    26 September 2007

  46. Attacking the IPsec Standards in Encryption-only Configurations
    Kenneth Paterson (Royal Holloway, University of London, UK)
    17 July 2007

  47. Authentication in Wireless Sensor Networks
    Ernest Foo (Queensland University of Technology, Australia)
    14 June 2007

  48. Detection and Mitigation of Distributed Denial-of-Service Attacks
    Vrizlynn Thing (Imperial College, UK)
    5 April 2007

  49. Information Security - The Royal Holloway Perspective and Some Moves Towards Professionalism
    Fred Piper (Royal Holloway, University of London, UK)
    5 March 2007

  50. ID-based Cryptography using Symmetric Primitives
    Peter Wild (Royal Holloway, University of London, UK)
    30 January 2007

  51. Multi-Party Concurrent Signatures
    Willy Susilo (University of Wollongong, Australia)
    2 August 2006

  52. Providing Robust and Secure Decentralized Services
    Nitesh Saxena (University of California at Irvine, USA)
    6 June 2006

  53. Secure Agglomerative Document Clustering in Distributed Environment
    Kouichi Sakurai (Kyushu University, Japan)
    26 May 2006

  54. Security Research at University of Siegen
    Christoph Ruland (University of Siegen, Germany)
    23 February 2006

  55. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
    Colin Boyd (Queensland University of Technology, Australia)
    30 November 2005

  56. Information Security in SJTU
    Kefei Chen (Shanghai Jiaotong University, China)
    26 September 2005

  57. Worm Defense Mechanisms: Network-Level Detection and Beyond
    Kostas Anagnostakis (University of Pennsylvania, USA)
    27 May 2005

  58. Reactive Software Systems
    Angelos Keromytis (Columbia University, USA)
    17 January 2005

  59. Cryptanalysis of a Wavelet Based Watermarking Scheme
    Subhamoy Maitra (Indian Statistical Institute, India)
    5 November 2004

  60. Secure Execution of Authenticated Programs: Re-engineering Smart Cards
    David Naccache (Gemplus, France)
    17 June 2004

  61. Certified E-mail with Delivery Authority - Design, Analysis, and Improvements
    Kouichi Sakurai (Kyushu University, Japan)
    3 March 2003

  62. Perfectly Secure Message Transmission Revisited
    Yvo Desmedt (Florida State University, USA)
    16 August 2002