Presentations:
Conference presentations regarding regular papers can be found on the list of papers.Computer security, privacy, anonymity
- "Advances in Privacy Aware Authentication" , an invited talk during IFIP SEC 2015 in Hamburg
- Technical issues of disability parking permit , presentation in Polish Sejm (in Polish)
- Tutorial on identity documents during INSCRYPT 2012 , Beijing
- Security techniques for cloud computing , a conference on legal issues of security in cloud computing , UKSW, Warsaw, 2012 (in Polish)
-
Challenges for electronic identity documents
keynote at 4th Workshop on Legal Informatics and Legal Information Technology (LIT 2011), Poznan 17.06.2011,
-
Securing random key predistribution against key capture
talk at Shanghai Jaio Tong University, 20.10.2010,
-
Security and privacy issues for electronic ID cards
talk at Nowy pl.ID: funkcjonalnosci, standardy, wdrozenie Warszawa 18.03.2010,
co-author: Dr Przemyslaw Kubiak
-
Embedding Security and Trust in Mobile Ad Hoc Network Protocols
talk at NMTS 2008 -
Malicious Cryptography on "Secure" Devices
talk at EFPE 2008 -
Anonymity and Rapid Mixing in Cryptographic Protocols
invited talk at Wartacrypt 2004 - Technologie Anonimowosci w Komunikacji Elektronicznej
talk at Zjazd Polskiego Towarzystwa Matematycznego, 2004 (Polish Mathematical Society 2004) -
Nowe perspektywy ochrony prawa do prywatnosci
(New perspectives for implementation of privacy rights)
1Oth Anniversary of Center of Economic and Legal Problems of Electronic Communication (CBKE)
-
Prawne aspekty wykorzystania technologii cyfrowych w komunikacji urzad-obywatel
(Legal aspects of digital technology for communication between citizens and public administration)
co-author: Dr Dariusz Adamski
talk in Wroclaw City Hall - Uregulowania prawne dotyczace bankow elektronicznych
(E-law Concerning Security of Internet Banking)
talk at conference Electronic Banking Services, Research Centre for Legal and Economic Issues of Electronic Communication -
Adversary Immune Communications in Ad Hoc Networks
colloquium at College of Computer and Information Science, North-Eastern University, Boston