My Google Scholar Profile

My LinkedIn Profile

Committees and Boards

General and Program Co-chair
-- ACNS 2014

Associate Editor
-- the Information Security Journal

PC Member
  • -- the 26th International Joint Conference on Artificial Intelligence (IJCAI), Special Track on AI and Autonomy, 2017
  • -- 16th International Conference on Autonomous Agents and Multiagent Systems (AAMAS2017), 2017
  • -- the 5th International Conference - Romanian Cryptology Days (RCD), Bucharest, Romania, 2017
  • -- the 13th International Conference on Information Security and Cryptology (Inscrypt), 2017
  • -- the 25th International Joint Conference on Artificial Intelligence (IJCAI-16), 2016
  • -- the 12th International Conference on Information Security and Cryptology (Inscrypt), 2016
  • -- the 14th International Conference on Privacy, Security and Trust (PST), 2016
  • -- the 25th International Joint Conference on Artificial Intelligence (IJCAI-16), 2016
  • -- the International Workshop on AI for Privacy and Security (PrAISe) 2016
  • -- the 11th International Conference on Information Security and Cryptology (Inscrypt), 2015
  • -- the 13th International Conference on Privacy, Security and Trust (PST), 2015
  • -- the ACySe 2015: the 2nd International Workshop on Agents and CyberSecurity, affiliated to AAMAS2015
  • -- the 3rd International Conference - Romanian Cryptology Days (RCD), Bucharest, Romania, 2015
  • -- the 2nd International Conference on Mathematics and Computing, India, 2015
  • -- the 10th International Conference on Information Security and Cryptology (Inscrypt), 2014
  • -- the 1st International Workshop on Agents and CyberSecurity (ACySe), 2014
  • -- the 1st international conference on cryptography and information security in Balkans (BalkanCryptSec), 2014
  • -- the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014
  • -- the 19th Australasian Conference on Information Security and Privacy (ACISP), Australia, 2014
  • -- the 12th International Conference on Privacy, Security and Trust (PST), 2014
  • -- the 7th International Conference on Provable Security (ProvSec), Melaka, Malaysia, 2013
  • -- the 12th International Conference on Cryptology and Network Security (CANS), 2013
  • -- the 11th International Conference on Privacy, Security and Trust (PST), 2013
  • -- the 14th International Conference on Cryptology in India (Indocrypt), 2013
  • -- the 15th International Conference on Information and Communications Security (ICICS), 2013
  • -- the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013
  • -- the 2nd International Conference, Romanian Cryptology Days (RCD), 2013
  • -- the 6th International Conference on Cryptology in Africa (Africacrypt), 2013
  • -- CT-RSA 2013
  • -- Yet Another Conference on Cryptography (YACC), 2012
  • -- the 15th International Conference on Principles and Practice of Multi-Agent Systems (PRIMA), 2012

Grant Reviewing
  • -- CHIST-ERA ERA-NET 2016, remote reviewer.

They turn around the area of cyber security, formal verification and cryptography, including:

  • formal security analysis: development of formal frameworks and tools for security (protocol) analysis
  • provable security: generic framework development, protocol design, security proofs, the UC framework
  • formal verification (especially, model checking), applied logics
  • wireless, mobile and IoT security: e.g., distance-bounding, RFID/NFC security, security-sensitive Android apps, manual key setups for mobile devices, etc.
__________________________

  • a National Cyber Security Centre (NCSC)-funded grant, supporting equipment for applied research in security aspects within NFC, cca. 8, 000 GBP
  • a EU Commission-funded H2020 MSCA fellowship, called LVPri20 ("Logic-based Verification of Privacy-Preservation in Europe's 2020 ICT")
  • a joint EU ICT COST action, called CRYPTACUS (cryptanalysis of ubiquitous computing systems); [I have not joint the project eventually, due to new affiliation]
  • a joint SNF (Swiss National Foundation) award for the organization of ACNS 2014, 02/2014, CHF 4'000
  • the extension to year 11 of the "Security for Wireless Networks" project under MICS, NCCR, Switzerland, 08/2011, cca. CHF 80,000
  • four mobile phones for applied research under the "Google's 2011 EMEA AndroidEDU Program", 09/2011, cca. CHF 2,000
  • an EPSRC, three-year PhD scholarship, after a world-wide selective interview process, by Department of Computing, Imperial College London, 04/2007, cca. 45, 000 GBP
__________________________

  • "Cyber-threats in Modern Internet Architectures: How (not) to use TLS between 3 parties", Spotlight Talk at the "CyberUK in Practice" Forum organised by UK's National Cyber Security Centre (NCSC), Liverpool, UK, 03/2017
  • "Parameterised Verification of Epistemic Properties in Security Protocols", as invited seminar at Universite Paris-Est, France, 03/2017
  • "How (not) to use TLS between 3 parties", as invited seminar at Universite d'Auvergne, France, 12/2016
  • "How (not) to use TLS between 3 parties", as invited seminar at the Open University, UK, 11/2016
  • "Automatic Verification of Security Protocols using Temporal-Epistemic Logics", as speaker at a seminar at the "Embedded Security and Cryptography" (EMSEC) group, IRISA, Rennes, France, 05/2016
  • "Automatic Verification of Security Protocols using Temporal-Epistemic Logics", as speaker at a security-focused seminar at LSV, Ens-Cachan, Cachan, France, 04/2016
  • "Touch and Pay... or... Touch and Pray", as invited speaker at a series of FinTech-oriented talks, by Imperial College London, London, UK, 03/2016
  • "Automatic Verification of Security Protocols with Multi-agent Systems: How Many Alice and Bob?", as invited speaker at the MASE Seminar, Middlesex University, London, UK, 12/2015
  • "Multiagent System-based Verification of Security and Privacy", as invited speaker at "Agent Verification Workshop", Liverpool, UK, 09/2015
  • "Challenges in Distance-Bounding Protocols", as invited participant at the "Romanian Cryptology Days", Bucharest, Romania, 09/2015
  • "Remote Car-Starter, Keyless Entries, Touch and Pay...: Are they secure?", invited seminar at the series of tech talks at the "Women in Engineering" event by Facebook, London, UK, 05/2015
  • "Touch and pay: making it secure!", invited seminar at Middlesex University, London, UK, 02/2014
  • "Automatically Verifying Multiagent Systems expressed via Equational Theories" and "PD2IS and MCMAS: Logic-based Automatic Verifiers for Security Protocols",as invited participant at the Dagstuhl Seminar "VaToMAS - Verification and Testing of Multi-Agent Systems", Dagstuhl, Germany, 04/2013
  • "Analysing Security Properties expressed via Equational Theories", as invited participant at the "Romanian Cryptology Days", Bucharest, Romania, 09/2013
  • "On the Need for Provable Secure Distance-Bounding", as invited participant at the Early Symmetric Crypto (ESC) 2013, Mondorf les Bains, Luxembourg, 01/2013;
  • "Secure Distance-Bounding Protocols" and "Public-Key Cryptography Analysis", as invited lecturer at Cryptology Summer School, in Romania, 09/2012
  • "Model Checking Security Protocols: A Multiagent System Approach", as visitor at Faculty of Computer Science, "Alexandru Ioan Cuza" University, Iasi, Romania, 01/2012
  • "Attack-Detectability in Security Protocols", as invited participant at the Romanian Cryptology Days, RCD-2011, Bucharest, Romania, 10/2011
  • "Verification of Security Protocols with MCMAS" , as visitor at King's College, London, UK, 10/2010
  • "Model Checking Cryptographic Protocols Beyond Secrecy", as visitor at The Security and Cryptography Laboratory (LASEC), EPFL, Switzerland, 06/2010
  • "Verification of Temporal-Epistemic Properties of Authentication Protocols", as visitor at Laboratoire d'algorithmique, complexité et logique (LACL), Université Paris12, France, 11/2009