• a National Cyber Security Centre (NCSC)-funded PhD-studentship prize, to employ one PhD student for 3.5 years, cca. 150,000 GBP, granted in 12/2017
  • Co-I on a National Cyber Security Centre (NCSC)-funded to experiment with implementations of cryptographic protocols on Surrey's 5G testbed, cca 40,000 GBP, granted in 03/2018
  • a National Cyber Security Centre (NCSC)-funded grant, supporting equipment for applied research in security aspects within NFC, cca. 8,000 GBP, granted in 12/2016
  • an EU Commission-funded H2020 MSCA fellowship, called LVPri20 ("Logic-based Verification of Privacy-Preservation in Europe's 2020 ICT"), cca. 200,000 EUR, granted 05/2014
  • one of two country-representatives on the COST (European Cooperation in Science and Technology) action IC1403 "Cryptanalysis of ubiquitous computing systems" – Cryptacus, in collaboration with 19 other European research institutions (the entire 4-year action estimated at cca. 48 million EUR, granted in 02/2014 - I had to leave the consortium when I took up a position in industry)
  • a joint SNF (Swiss National Foundation) award for the organization of ACNS 2014, 02/2014, 4,000 CHF
  • the extension to year 11 of the "Security for Wireless Networks" project under MICS, NCCR, Switzerland, 08/2011, cca. CHF 80,000
  • four mobile phones for applied research under the "Google's 2011 EMEA AndroidEDU Program", 09/2011, cca. CHF 2,000
  • an EPSRC, three-year PhD scholarship, after a world-wide selective interview process, by Department of Computing, Imperial College London, 04/2007, cca. 45,000 GBP
__________________________

  • Outreach talk on cybersecurity research, speaking to A-level students at King Edward's College in Witley, 05/2018
  • "Introduction to provable security for distance-bounding", invited talk at the FutureDB workshop, 04/2018
  • "Relay Attacks in Wireless Environment and Physical-layer Countermeasures", invited lecture at the COMMNET PhD Spring-School, Guildford, UK, 03/2018
  • "Breaking and fixing HB+DB: A Short Tale of Provable vs Experimental Security and Lightweight Designs", invited talk at the SoSySec Seminar , INRIA, Rennes, France, 02/2018
  • "How (not) to use TLS between 3 parties", invited abstract at Cryptacus workshop, Nijmegen, Netherlands, 11/2017
  • "How (not) to use TLS between 3 parties", visit of the Security Group and talk at Security Seminar series of the School of Computer Science, 10/2017
  • "How (not) to use TLS between 3 parties", invited talk at the "Romanian Cryptology Days", Bucharest, Romania, 09/2017
  • "Breaking and fixing HB+DB: A Short Tale of Provable vs. Experimental Security and Lightweight Designs", visit of the "Security and Trust of Software Systems (SaToSS)" group and talk at their seminar series the University of Luxembourg, 09/2017
  • "From Formal Verification to Cryptography, From Academia to Industry and Back: The Journeys of a Researcher", invited talk at the 7th edition of the International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre), affiliated to Euro S& P, Paris, 04/2017
  • "Cyber-threats in Modern Internet Architectures: How (not) to use TLS between 3 parties", Spotlight Talk at the "CyberUK in Practice" Forum organised by UK's National Cyber Security Centre (NCSC), Liverpool, UK, 03/2017
  • "Parameterised Verification of Epistemic Properties in Security Protocols", as invited seminar at Universite Paris-Est, France, 03/2017
  • "How (not) to use TLS between 3 parties", as invited seminar at Universite d'Auvergne, France, 12/2016
  • "How (not) to use TLS between 3 parties", as invited seminar at the Open University, UK, 11/2016
  • "Automatic Verification of Security Protocols using Temporal-Epistemic Logics", as speaker at a seminar at the "Embedded Security and Cryptography" (EMSEC) group, IRISA, Rennes, France, 05/2016
  • "Automatic Verification of Security Protocols using Temporal-Epistemic Logics", as speaker at a security-focused seminar at LSV, Ens-Cachan, Cachan, France, 04/2016
  • "Touch and Pay... or... Touch and Pray", as invited speaker at a series of FinTech-oriented talks, by Imperial College London, London, UK, 03/2016
  • "Automatic Verification of Security Protocols with Multi-agent Systems: How Many Alice and Bob?", as invited speaker at the MASE Seminar, Middlesex University, London, UK, 12/2015
  • "Multiagent System-based Verification of Security and Privacy", as invited speaker at "Agent Verification Workshop", Liverpool, UK, 09/2015
  • "Challenges in Distance-Bounding Protocols", as invited participant at the "Romanian Cryptology Days", Bucharest, Romania, 09/2015
  • "Remote Car-Starter, Keyless Entries, Touch and Pay...: Are they secure?", invited seminar at the series of tech talks at the "Women in Engineering" event by Facebook, London, UK, 05/2015
  • "Touch and pay: making it secure!", invited seminar at Middlesex University, London, UK, 02/2014
  • "Automatically Verifying Multiagent Systems expressed via Equational Theories" and "PD2IS and MCMAS: Logic-based Automatic Verifiers for Security Protocols",as invited participant at the Dagstuhl Seminar "VaToMAS - Verification and Testing of Multi-Agent Systems", Dagstuhl, Germany, 04/2013
  • "Analysing Security Properties expressed via Equational Theories", as invited participant at the "Romanian Cryptology Days", Bucharest, Romania, 09/2013
  • "On the Need for Provable Secure Distance-Bounding", as invited participant at the Early Symmetric Crypto (ESC) 2013, Mondorf les Bains, Luxembourg, 01/2013;
  • "Secure Distance-Bounding Protocols" and "Public-Key Cryptography Analysis", as invited lecturer at Cryptology Summer School, in Romania, 09/2012
  • "Model Checking Security Protocols: A Multiagent System Approach", as visitor at Faculty of Computer Science, "Alexandru Ioan Cuza" University, Iasi, Romania, 01/2012
  • "Attack-Detectability in Security Protocols", as invited participant at the Romanian Cryptology Days, RCD-2011, Bucharest, Romania, 10/2011
  • "Verification of Security Protocols with MCMAS" , as visitor at King's College, London, UK, 10/2010
  • "Model Checking Cryptographic Protocols Beyond Secrecy", as visitor at The Security and Cryptography Laboratory (LASEC), EPFL, Switzerland, 06/2010
  • "Verification of Temporal-Epistemic Properties of Authentication Protocols", as visitor at Laboratoire d'algorithmique, complexité et logique (LACL), Université Paris12, France, 11/2009