Previous Invited Speakers
The researchers below were distinguished invited speakers at previous SECRYPT conferences.
We are indebted to them for their contribution to heighten the conference level.
2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004
2024
Explainability and Privacy-Preserving Data-Driven Models Vicenc Torra, Umea University, Sweden Artificial Intelligence for Biometrics Vincenzo Piuri, Università degli Studi di Milano, Italy
2023
Distributed Ledger Technology, Blockchain & Crypto Currencies Edgar Weippl, University of Vienna, SBA Research, Austria
2022
Cyber Security When IT Meets OT Sokratis K. Katsikas, Department of Information Security and Communication Technology, Norwegian University of Science and Technology, Gjøvik, Norway Don’t Tell Me The Cybersecurity Moon Is Shining… (Cybersecurity Show and Tell) Luca Viganò, King's College London, United Kingdom
2021
Access Control Convergence: Challenges and Opportunities Ravi Sandhu, University of Texas San Antonio, United States VEST: An Early Warning System for Future Cyber-Attacks V. S. Subrahmanian, Dartmouth College, United States Privacy-Preserving Analytics in the Big Data Environment Jaideep Vaidya, Rutgers Business School, United States
2020
Enterprise Systems Architecture - Essentials Henderik Alex Proper, Luxembourg Institute of Science and Technology, Luxembourg eHealth Monitoring Using Wireless Communication Protocols and Intelligent Systems Jaime Lloret Mauri, Universidad Politecnica de Valencia, Spain Industry 4.0: Challenges from a Data Science Perspective Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), United States Secure Computation Protocol: A Technology for Our Time Moti Yung, Columbia University, United States Analysing Digital Footprints to Infer the Health of Populations and Individuals Ingemar Johansson Cox, University of Copenhagen, United Kingdom
2019
Security for Connected Vehicles in CyberspaceJalel Ben-Othman, University of Paris 13, France Cooperative Communications, Distributed Coding and Machine Learning Soon Xin Ng, School of Electronics and Computer Science, University of Southampton, SO17 1BJ, U.K., United Kingdom
2018
Forensic Challenges on Multimedia Analytics, Big Data and the Internet of Things Zeno Geradts, Netherlands Forensic Institute, Netherlands The Past, Present and Future of Business Process Management Jan Mendling, Humboldt-Universität zu Berlin, Germany Scientific Research vs Bug Hunting Ismael Ripoll, Universitat Politècnica de València, Spain The CLOUD: Trigger for a Socio-Economic RevolutionTobias Hoellwarth, EuroCloud Europe, Austria Storing Critical Data in the Cloud: Challenges and Solutions Miguel Pupo Correia, Universidade de Lisboa, Portugal
2017
Representation and Learning of Structured Dynamic Bayesian Models in Non Stationary EnvironmentsCarlo Regazzoni, University of Genova, Italy Speeding up the execution of numerical computations and simulations with rCUDA Jose Duato, Independent Researcher, Spain Advances and Future Challenges in Machine Learning and Knowledge Extraction Andreas Holzinger, Medical University Graz, Austria
2016
Tactile Internet Design Challenges-Network PerspectiveHamid Aghvami, King's College London, United Kingdom Revisiting control/data plane separation in Software Defined Networking Giuseppe Bianchi, University of Roma Tor Vergata, Italy User Acceptance of Internet of Things (IoT) Services and Applications Anastasios Economides, University of Macedonia, Greece Runtime Aware Architectures Mateo Valero, Independent Researcher, Spain Attribute-Based Access Control Status and DirectionsIndrakshi Ray, Colorado State University, United States
2015
Integrating Retail and e-Commerce using Web Analytics and Intelligent Sensors Anthony C. Boucouvalas, University of Peloponnese, Greece Cloud Computing - State-of-the-Art and Future Research Trends Eleni Karatza, Aristotle University of Thessaloniki, Greece Future SDN - Reconfiguration Heartland, Challenge and Revolution Andrew Moore, University of Cambridge, United Kingdom Connecting Services to the Web of Data John Domingue, Independent Researcher, United Kingdom
2014
A Need-based Assessment for Building a National Cyber Security Workforce Seymour Goodman, Georgia Institute of Technology, United States Democratization in Science and Technology through Cloud Computing Ivona Brandić, Vienna UT, Austria Model-driven Development of Multi-View Modelling Tools - The MUVIEMOT Approach Dimitris Karagiannis, University of Vienna, Austria Social Business Intelligence - OLAP Applied to User Generated Contents Matteo Golfarelli, University of Bologna, Italy Advanced Persistent Threats & Social Engineering Edgar Weippl, University of Vienna, SBA Research, Austria
2013
A Data-as-a-Service Framework for IoT Big Data Laurence T. Yang, St Francis Xavier University, Canada IP-Oriented QoS and QoE in the Next Generation Networks - Application to Wireless Networks Pascal Lorenz, University of Haute Alsace, France The Smart Grid and the Internet should be Friends Donal O'Mahony, Trinity College Dublin, Ireland Instantaneous Frequency Analysis David Naccache, Ecole Normale Superieure, France
2012
Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes Venu Govindaraju, University at Buffalo, United States A Mission-centric Framework for Cyber Situational Awareness Sushil Jajodia, George Mason University Fairfax, United States On Knowledge Discovery and Interactive Intelligent Visualization of Biomedical Data - Challenges in Human–Computer Interaction & Biomedical Informatics Andreas Holzinger, Medical University Graz, Austria Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale Geoffrey Charles Fox, Indiana University, United States A Perspective of the Networks of the Future and Smart Cities Luis M. Correia, IST/IT-Technical University of Lisbon, Portugal
2011
WIMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks Han-Chieh Chao, National Ilan University, Taiwan, Republic of China BIOMETRICS PRIVACY - Technologies and Applications Vincenzo Piuri, Università degli Studi di Milano, Italy FACE BIOMETRICS WITHOUT INTRUSION IN AIRPORT Enrique Cabello, Universidad Rey Juan Carlos, Spain PARADIGMS OF DISTRIBUTED SOFTWARE SYSTEMS - Services, Processes, and Self-organization Winfried Lamersdorf, University of Hamburg, Germany
2010
CHAOTIC QUANTUM CRYPTOGRAPHY - The Ultimate for Network Security Stamatios Kartalopoulos, University of Oklahoma, United States NANONETWORKS - A New Frontier in Communications Ian F. Akyildiz, Georgia Institute of Technology, United States INFORMATION SECURITY - The SCAN – Secure Processor with Crypto-Biometrics CapabilitiesNikolaos Bourbakis, Wright State University, United States FROM NATURE TO METHODS AND BACK TO NATURE Petar M. Djuric, Stony Brook University, United States
2009
ADAPTIVE ANTENNAS IN WIRELESS COMMUNICATION NETWORKS Blagovest Shishkov, Independent Researcher, Bulgaria PROTECTING INFORMATION PRIVACY IN THE ELECTRONIC SOCIETY Pierangela Samarati, University of Milan, Italy CLOUD COMPUTING - Fundamental Architecture & Future Applications Frank Leymann, University of Stuttgart, Germany WEB 2.0: A BUZZWORD, A SERIOUS DEVELOPMENT, JUST FUN, OR WHAT? Gottfried Vossen, University of Münster, Germany E-BUSINESS DESIGN - A Shift to Adaptability David Marca, Independent Researcher, United States
2008
Cryptographic Algorithms: Successes, Failures and ChallengesBart Preneel, Katholieke Universiteit Leuven, Belgium e-Business Innovation: Surviving the Coming DecadeDavid A. Marca, University of Phoenix, United States Improving Reliability in Commercial IP NetworksYaakov Kogan, AT&T Labs, United States Rethinking Digital SignaturesUeli Maurer, Swiss Federal Institute of Technology (ETH), Switzerland Watermarking, Steganography and Content ForensicsIngemar Cox, , United Kingdom Next Generation CDMA Technologies for Futuristic Wireless CommunicationsHsiao-Hwa Chen, National Sun Yat-sen University, Taiwan, Republic of China The importance of Metrology in Wireless Communication Systems – From AM/FM to SDR SystemsNuno Borges Carvalho, Instituto de Telecomunicacoes, Universidade de Aveiro, Portugal
2007
Cross-Layer Resource Allocation in Satellite NetworksFranco Davoli, University of Genoa, Italy Pragmatic ComputingKecheng Liu, University of Reading, United Kingdom Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and Use in the Access-eGov ProjectGünther Pernul, University of Regensburg, Germany SOA WisdomTony C. Shan, Independent Researcher, United States Recent Trends in the Design of Video Signal Processing IPs and Multimedia SoCsSantanu Dutta, nVIDIA Corporation, United States Future and Challenges of the Security of e-Systems and Computer NetworksMohammad S. Obaidat, Fordham University, NY, United States Utility Computing: Reality and BeyondIvan Ivanov, SUNY Empire State College, United States
2006
Wireless Communications, a New emphasis for Effective Use of the Radio SpectrumLes Barclay, Barclay Associates Ltd, United Kingdom e-Business Strategy: Charting a Way through Uncertain Waters of Electronic CommerceDavid A. Marca, University of Phoenix, United States Redefining the Market Place: Only the Numbers are Different?Thomas J. Greene, M.I.T., United States Multimedia Representation in MPEG Standards: Achievements and ChallengesFernando Pereira, , Portugal Advances in Speech and Audio Coding and its applications for Mobile MultimediaAnisse Taleb, , Sweden IT Security Forensics: Promises and ShortcomingsManu Malek, Stevens Institute of Technology, United States
2005
Biometrics and CryptographySusanne Wetzel, Stevens Institute of Technology, United States Trends and Challenges in Wireless NetworksMohammad S. Obaidat, Fordham University, NY, United States Agents, Emergence and Modelling: What Value for Communication Networks?Mark d'Inverno, Westminster University, United Kingdom The Evolution of Security: Network Intrusion PreventionRohit Dhamankar, TippingPoint, United States Real world threats and opportunities with smartphonesDavid Wood, Symbian, United Kingdom Usability, Perceived Credibility and Trust : Users' Perspectives to Security and PrivacyYin-Leng Theng, Nanyang Technological University, Singapore
2004
E-Business Security and Information AssuranceManu Malek, Stevens Institute of Technology, United States Toward Identifying the Attack Source by Deterministic Packet MarkingNirwan Ansari, New Jersey Institute of Technology, United States Fundamental Challenges of Next Generation Information RetrievalHenry Tirri, Department of Computer Science, University of Helsinki, Finland TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space NetworksMohammed Atiquzzaman, University of Oklahoma, United States