Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Previous Invited Speakers

The researchers below were distinguished invited speakers at previous SECRYPT conferences.
We are indebted to them for their contribution to heighten the conference level.

2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004

2024

Explainability and Privacy-Preserving Data-Driven Models    
Vicenc Torra, Umea University, Sweden

Artificial Intelligence for Biometrics    
Vincenzo Piuri, Università degli Studi di Milano, Italy


2023

The Certification Panacea    
Rigo Wenning, ERCIM, France

Distributed Ledger Technology, Blockchain & Crypto Currencies    
Edgar Weippl, University of Vienna, SBA Research, Austria


2022

Cyber Security When IT Meets OT    
Sokratis K. Katsikas, Norwegian University of Science and Technology, Norway

Don’t Tell Me The Cybersecurity Moon Is Shining… (Cybersecurity Show and Tell)  
Luca Viganò, King's College London, United Kingdom


2021

Access Control Convergence: Challenges and Opportunities  
Ravi Sandhu, University of Texas San Antonio, United States

VEST: An Early Warning System for Future Cyber-Attacks  
V. S. Subrahmanian, Dartmouth College, United States

Privacy-Preserving Analytics in the Big Data Environment  
Jaideep Vaidya, Rutgers Business School, United States


2020

Enterprise Systems Architecture - Essentials  
Henderik Alex Proper, Luxembourg Institute of Science and Technology, Luxembourg

eHealth Monitoring Using Wireless Communication Protocols and Intelligent Systems  
Jaime Lloret Mauri, Universidad Politecnica de Valencia, Spain

Industry 4.0: Challenges from a Data Science Perspective  
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), United States

Secure Computation Protocol: A Technology for Our Time  
Moti Yung, Columbia University, United States

Analysing Digital Footprints to Infer the Health of Populations and Individuals  
Ingemar Johansson Cox, University of Copenhagen, United Kingdom


2019

Security for Connected Vehicles in Cyberspace
Jalel Ben-Othman, University of Paris 13, France

Network Slicing an Enabler of 5G
Adlen Ksentini, Eurecom, France

Cooperative Communications, Distributed Coding and Machine Learning    
Soon Xin Ng, School of Electronics and Computer Science, University of Southampton, SO17 1BJ, U.K., United Kingdom

AI and Computer Vision: Beyond Seeing  
Sebastiano Battiato, University of Catania, Italy


2018

Forensic Challenges on Multimedia Analytics, Big Data and the Internet of Things  
Zeno Geradts, Netherlands Forensic Institute, Netherlands

The Past, Present and Future of Business Process Management    
Jan Mendling, Humboldt-Universität zu Berlin, Germany

Scientific Research vs Bug Hunting    
Ismael Ripoll, Universitat Politècnica de València, Spain

The CLOUD: Trigger for a Socio-Economic Revolution
Tobias Hoellwarth, EuroCloud Europe, Austria

Storing Critical Data in the Cloud: Challenges and Solutions    
Miguel Pupo Correia, Universidade de Lisboa, Portugal


2017

Representation and Learning of Structured Dynamic Bayesian Models in Non Stationary Environments
Carlo Regazzoni, University of Genova, Italy

Directions in Security Research  
Jan Camenisch, , Switzerland

Speeding up the execution of numerical computations and simulations with rCUDA    
Jose Duato, Independent Researcher, Spain

Advances and Future Challenges in Machine Learning and Knowledge Extraction  
Andreas Holzinger, Medical University Graz, Austria


2016

Tactile Internet Design Challenges-Network Perspective
Hamid Aghvami, King's College London, United Kingdom

Revisiting control/data plane separation in Software Defined Networking  
Giuseppe Bianchi, University of Roma Tor Vergata, Italy

User Acceptance of Internet of Things (IoT) Services and Applications  
Anastasios Economides, University of Macedonia, Greece

Runtime Aware Architectures  
Mateo Valero, Independent Researcher, Spain

Attribute-Based Access Control Status and Directions
Indrakshi Ray, Colorado State University, United States


2015

Integrating Retail and e-Commerce using Web Analytics and Intelligent Sensors    
Anthony C. Boucouvalas, University of Peloponnese, Greece

Cloud Computing - State-of-the-Art and Future Research Trends  
Eleni Karatza, Aristotle University of Thessaloniki, Greece

Future SDN - Reconfiguration Heartland, Challenge and Revolution    
Andrew Moore, University of Cambridge, United Kingdom

Connecting Services to the Web of Data  
John Domingue, Independent Researcher, United Kingdom


2014

A Need-based Assessment for Building a National Cyber Security Workforce  
Seymour Goodman, Georgia Institute of Technology, United States

Democratization in Science and Technology through Cloud Computing  
Ivona Brandić, Vienna UT, Austria

Model-driven Development of Multi-View Modelling Tools - The MUVIEMOT Approach  
Dimitris Karagiannis, University of Vienna, Austria

Social Business Intelligence - OLAP Applied to User Generated Contents    
Matteo Golfarelli, University of Bologna, Italy

Advanced Persistent Threats & Social Engineering    
Edgar Weippl, University of Vienna, SBA Research, Austria


2013

A Data-as-a-Service Framework for IoT Big Data  
Laurence T. Yang, St Francis Xavier University, Canada

IP-Oriented QoS and QoE in the Next Generation Networks - Application to Wireless Networks    
Pascal Lorenz, University of Haute Alsace, France

The Smart Grid and the Internet should be Friends    
Donal O'Mahony, Trinity College Dublin, Ireland

Instantaneous Frequency Analysis  
David Naccache, Ecole Normale Superieure, France


2012

Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes  
Venu Govindaraju, University at Buffalo, United States

A Mission-centric Framework for Cyber Situational Awareness  
Sushil Jajodia, George Mason University Fairfax, United States

On Knowledge Discovery and Interactive Intelligent Visualization of Biomedical Data - Challenges in Human–Computer Interaction & Biomedical Informatics  
Andreas Holzinger, Medical University Graz, Austria

Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale  
Geoffrey Charles Fox, Indiana University, United States

A Perspective of the Networks of the Future and Smart Cities  
Luis M. Correia, IST/IT-Technical University of Lisbon, Portugal


2011

WIMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks  
Han-Chieh Chao, National Ilan University, Taiwan, Republic of China

BIOMETRICS PRIVACY - Technologies and Applications  
Vincenzo Piuri, Università degli Studi di Milano, Italy

FACE BIOMETRICS WITHOUT INTRUSION IN AIRPORT  
Enrique Cabello, Universidad Rey Juan Carlos, Spain

PARADIGMS OF DISTRIBUTED SOFTWARE SYSTEMS - Services, Processes, and Self-organization  
Winfried Lamersdorf, University of Hamburg, Germany


2010

CHAOTIC QUANTUM CRYPTOGRAPHY - The Ultimate for Network Security  
Stamatios Kartalopoulos, University of Oklahoma, United States

NANONETWORKS - A New Frontier in Communications  
Ian F. Akyildiz, Georgia Institute of Technology, United States

INFORMATION SECURITY - The SCAN – Secure Processor with Crypto-Biometrics Capabilities
Nikolaos Bourbakis, Wright State University, United States

FROM NATURE TO METHODS AND BACK TO NATURE  
Petar M. Djuric, Stony Brook University, United States


2009

ADAPTIVE ANTENNAS IN WIRELESS COMMUNICATION NETWORKS  
Blagovest Shishkov, Independent Researcher, Bulgaria

PROTECTING INFORMATION PRIVACY IN THE ELECTRONIC SOCIETY  
Pierangela Samarati, University of Milan, Italy

CLOUD COMPUTING - Fundamental Architecture & Future Applications  
Frank Leymann, University of Stuttgart, Germany

WEB 2.0: A BUZZWORD, A SERIOUS DEVELOPMENT, JUST FUN, OR WHAT?  
Gottfried Vossen, University of Münster, Germany

E-BUSINESS DESIGN - A Shift to Adaptability  
David Marca, Independent Researcher, United States


2008

Cryptographic Algorithms: Successes, Failures and Challenges
Bart Preneel, Katholieke Universiteit Leuven, Belgium

e-Business Innovation: Surviving the Coming Decade
David A. Marca, University of Phoenix, United States

Improving Reliability in Commercial IP Networks
Yaakov Kogan, AT&T Labs, United States

Rethinking Digital Signatures
Ueli Maurer, Swiss Federal Institute of Technology (ETH), Switzerland

Watermarking, Steganography and Content Forensics
Ingemar Cox, , United Kingdom

Next Generation CDMA Technologies for Futuristic Wireless Communications
Hsiao-Hwa Chen, National Sun Yat-sen University, Taiwan, Republic of China

The importance of Metrology in Wireless Communication Systems – From AM/FM to SDR Systems
Nuno Borges Carvalho, Instituto de Telecomunicacoes, Universidade de Aveiro, Portugal


2007

Cross-Layer Resource Allocation in Satellite Networks
Franco Davoli, University of Genoa, Italy

Pragmatic Computing
Kecheng Liu, University of Reading, United Kingdom

Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and Use in the Access-eGov Project
Günther Pernul, University of Regensburg, Germany

SOA Wisdom
Tony C. Shan, Independent Researcher, United States

Recent Trends in the Design of Video Signal Processing IPs and Multimedia SoCs
Santanu Dutta, nVIDIA Corporation, United States

Future and Challenges of the Security of e-Systems and Computer Networks
Mohammad S. Obaidat, Fordham University, NY, United States

Utility Computing: Reality and Beyond
Ivan Ivanov, SUNY Empire State College, United States


2006

Wireless Communications, a New emphasis for Effective Use of the Radio Spectrum
Les Barclay, Barclay Associates Ltd, United Kingdom

e-Business Strategy: Charting a Way through Uncertain Waters of Electronic Commerce
David A. Marca, University of Phoenix, United States

Redefining the Market Place: Only the Numbers are Different?
Thomas J. Greene, M.I.T., United States

Multimedia Representation in MPEG Standards: Achievements and Challenges
Fernando Pereira, , Portugal

Model-based Security Engineering
Jan Jurjens, , Germany

Advances in Speech and Audio Coding and its applications for Mobile Multimedia
Anisse Taleb, , Sweden

IT Security Forensics: Promises and Shortcomings
Manu Malek, Stevens Institute of Technology, United States


2005

Biometrics and Cryptography
Susanne Wetzel, Stevens Institute of Technology, United States

Trends and Challenges in Wireless Networks
Mohammad S. Obaidat, Fordham University, NY, United States

Agents, Emergence and Modelling: What Value for Communication Networks?
Mark d'Inverno, Westminster University, United Kingdom

The Evolution of Security: Network Intrusion Prevention
Rohit Dhamankar, TippingPoint, United States

Real world threats and opportunities with smartphones
David Wood, Symbian, United Kingdom

Usability, Perceived Credibility and Trust : Users' Perspectives to Security and Privacy
Yin-Leng Theng, Nanyang Technological University, Singapore


2004

E-Business Security and Information Assurance
Manu Malek, Stevens Institute of Technology, United States

Toward Identifying the Attack Source by Deterministic Packet Marking
Nirwan Ansari, New Jersey Institute of Technology, United States

Fundamental Challenges of Next Generation Information Retrieval
Henry Tirri, Department of Computer Science, University of Helsinki, Finland

TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space Networks
Mohammed Atiquzzaman, University of Oklahoma, United States


footer