2016
2015
2014
2013
2012
- Gaming security by obscurity, Beijing, December 2012
- 3 dubious concepts in Science of Security, Washington DC, November 2012
- Monoidal computer: Towards cryptography in pictures, Oxford, July 2012
- Classifying and quantifying concept analyses, Leuven, May 2012
- Tracing monoidal man in the middle (with hindsight), Talinn, April 2012
2011
2010
- Mining for meaning, London, November 2010
- The unreasonable ineffectiveness of security engineering, Pisa, September 2010
- Catching spies by math, Dagstuhl, August 2010
- Everything, Tartu, June 2010
- On unreasonable ineffectiveness of security engineering: probable security of a payment system, Boston, March 2010
2009
- Coalgebra of market games, Udine, September 2009
- Probable security, Baltimore, September 2009
- A geometric language for quantum protocols, Dagstuhl, July 2009
- Categorical semantics of quantum computation and its implementation in REL, Cape Town, July 2009 (and New Orleans, March 2008)
- Bayesian authentication with imperfect cryptography in pervasive networks, Nijmegen, June 2009
- Way below security, Oxford, April 2009
- Quantum computing with relations, Saarbruecken, March 2009
2008
- 4 statements about science and security, Oakland, November 2008
- Dynamics, robustness and fragility of trust, Malaga, October 2008
- Network as a computer: Ranking paths to find flows, Moscow, June 2008
- Authentication in pervasive and social computation, Philadelphia, May 2008
- Geometry of abstraction in quantum computation, New Orleans, March 2008