• Internet voting on untrusted computers, Academic Centers of Excellence in Cyber Research Conference, 16th Dec 2014, CESR Event.
  • Caveat Coercitor: coercion-evidence in electronic voting, VoteID, 19th July 2013, Surrey, UK.
  • Caveat Coercitor: coercion-evidence in electronic voting, 21th May 2013, IEEE Symposium on Security and Privacy, San Francisco, US.
  • Caveat Coercitor: coercion-evidence in electronic voting, 20th Mar 2013, George Washington University, Washington DC, US.
  • Coecion evidence in electronic voting, CSIT, 18th Oct 2012, Queen's University of Belfast, UK.
  • Coecion evidence in electronic voting, FOSAD 12, 8th Sep 2012, Bertinoro, Italy.
  • Corruption evidence in electronic voting, SecVote, 17th July 2012, Dagstuhl, Wadern, Germany.
  • Privacy and integrity on an untrusted platform, 17th May 2012, University of Surrey, UK.
  • E-voting on an untrusted platform, 4th Nov 2011, University of Luxembourg, Luxembourg.
  • Trivitas: Voters directly verifying votes, VoteID, 30th Sep 2011, Tallinn, Estonia.
  • Improving verifiability in electronic voting , BCTCS, 20th April 2011, Birmingham, UK.
  • Revisiting verifiability in JCJ/Civitas, Trustworthy Voting System's project meeting, Birmingham, UK.
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2015)
  • European Symposium On Research In Computer Science(ESORICS 2015)
  • IFIP International Information Security and Privacy conference, (SEC 2015)
  • ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
  • International Conference on Information Security Practice and Experience (ISPEC 2015)
  • Journal of Information Security and Applications,(JISA 2014)
  • ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
  • Workshop on Privacy in the Electronic Society (WPES 2014)
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)
  • International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)
  • Computer Security Foundations Symposium (CSF 2014)
  • Journal of Information Security and Applications, 2014.
  • IFIP International Information Security and Privacy conference, (SEC 2014)
  • Journal of Information Security and Applications, 2013.
  • E-Voting and Identity, 4th International conference, Vote-ID, 2013.
  • USENIX Journal of Election Technology and Systems (JETS), 2013.
  • European Symposium On Research In Computer Science(ESORICS), 2013.
  • International workshop Data Privacy Management, 2013.
  • Usenix EVT/WOTE, 2012.
  • Journal of Service-Oriented Computing & Applications (SOCA), 2012.
  • International Workshop on Requirements Engineering for Electronic Voting Systems, 2011.