ACNS
 
International Conference on
Applied Cryptography and Network Security

List of Invited/Keynote Speakers (2003 - 2016)


Srdjan Capkun (2016)
Securing Positioning: From GPS to IoT
Ed Dawson (2011)
Authorisation Models for Dynamic Environments
Robert Deng (2006)
Inference Control and Private Information Retrieval - Two Sides of One Tapestry
Craig Gentry (2009)
Fully Homomorphic Encryption Using Ideal Lattices
Matthew Green (2015)
From Strong Mathematics to Weak Cryptography
Nadia Heninger (2014)
How not to Generate Random Numbers?
Antoine Joux (2009)
Can We Settle Cryptography’s Hash?
Angelos Keromytis (2009)
Voice over IP: Risks, Threats and Vulnerabilities
Hugo Krawzcyk (2008)
Getting Serious about Key Derivation Functions
Refik Molva (2011)
Privacy in Social Networks: Can P2P Help?
Wenbo Mao (2007)
Grid Security from Two Levels of Virtualization
Victor Miller (2008)
Elliptic Curves and Cryptography: A 23 Year Perspective
David Naccache (2004)
Exploiting Side Information
Peng Ning (2012)
Cloud Computing Infrastructure Security
Bryan Parno (2013)
Bootstrapping Cloud Security
Mike Reiter (2009)
Better Architectures and New Applications for Coarse Network Monitoring
Phillip Rogaway (2014)
The Emergence of Authenticated Encryption
Avi Rubin (2005)
Security and Privacy Issues in RFID Technologies
Ahmad-Reza Sadeghi (2013)
Selected Topics in Mobile Security and Trusted Computing
George Sherman (2005)
Information Security Technologies as Enablers of Banking Systems
Vitaly Shmatikov (2015)
All Your SSL are Belong to Us
Victor Shoup (2005)
Sequence of Games: A Technique for Taming Complexity in Security Proofs
Sal Stolfo (2008)
Insider Threat Detection: Host and Network Monitoring Techniques
Francois Theberge (2013)
Ensemble Clustering for Graphs-Based Data
Bogdan Warinschi (2016)
Foundations of Hardware-Based Attested Computation and Applications of SGX
Hongjun Wu (2012)
JH in the NIST Hash Function Competition
Yiqun Lisa Yin (2005)
Recent Advances in Hash Function Research
Moti Yung (2003)
Key-Insulated Public Key Cryptosystems
Moti Yung (2012) Applied Cryptography and Network Security - 10 years in the past and 10 years in the future
Jianying Zhou (2003)
Non-repudiation in e-Commerce and e-Government




Maintained by Jianying Zhou
Last updated in July 2016