Invited Talks

09/2019 1909_Pape_TRANSFORM.pdf Privacy Skills Needed for the Future - Applying Privacy Patterns to the Internet of Things' (IoT) Architecture, TRANSFORM 2019 - Digital Skills for the Transformation of Disciplines, Business and Government, Bern, Switzerland
05/2019 1905_Pape_Karlstad.pdf PET Users’ Information Privacy Concerns, Kolloquium at Karlstad University, Karlstad, Sweden
10/2018 Social Engineering, Arbeitskreis Payment Fraud des Verbandes der Chemischen Industrie (VCI), Frankfurt
10/2018 1810_Pape_CAST_IoT.pdf Privacy Policies von IoT-Geräten, CAST-Workshop: Anonymes Shopping im Internet: SIOC - Selbstdatenschutz im Online-Commerce, Darmstadt
06/2018 Risk Assessment von Smartphone Apps im Unternehmenskontext, GFFT-Technology Race IT-Security, Essen
05/2018 1805_Pape_VDI_Fachtagung.pdf Stand zur IT-Sicherheit deutscher Stromnetzbetreiber, VDI-Fachtagung IT-Sicherheit für kritische Infrastrukturen, Neuss
02/2018 Social Engineering: Introduction, Tools and Counteracting Training Strategies, NECS Winter School 2018, Trento, Italy
02/2018 Status zur IT-Sicherheit deutscher Stromnetzbetreiber, 43. Sitzung DKE/AK952.0.15 DKE-ETG-ITG Informationssicherheit in der Netz- und Stationsleittechnik, Frankfurt
12/2017 Serious Gaming: Wie das Kartenspiel HATCH für mehr Sicherheit sorgt, VDMA-Informationstag Cybersecurity & Informationssicherheit, Frankfurt
02/2017 HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering, CAST-Workshop "Usable Security", Darmstadt
11/2016 1611_Pape_DGRI.pdf Technische Bedingungen wirksamer Verschlüsselung,Deutsche Gesellschaft für Recht und Informatik e.V., DGRI Jahrestagung 2016: 40 Jahre DGRI!, Frankfurt
03/2016 1603_Pape+Wagner_AGAD_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge, 7. ERFA-Runde Datenschutz und IT-Sicherheit, Arbeitgeberverband Großhandel, Außenhandel, Dienstleistungen e.V., Dortmund
03/2016 IT-Sicherheit spielend lernen: Ein Lernspiel zu Social Engineering, ASEW Arbeitskreis IT-Sicherheit , Cologne
11/2015 1511_Wagner+Pape_DAFTA_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge (mit F. Wagner), 39. Datenschutzfachtagung (DAFTA), Cologne
02/2015   The Difficulty of Selecting a Secure Cloud Provider, Invited Talk, Goethe University Frankfurt, Frankfurt
08/2005 0508-slides-pape-ajtai_dwork+regev.pdf Gitterbasierte Kryptosysteme: Ajtai-Dwork und Regev, Invited Talk, HGI/RUB Bochum

Conference and Workshop Talks

09/2019 PS19spose-slides.pdf An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security, ESORICS 2019 International Workshops, SPOSE 2019, Luxemburg
09/2018 HP18sec-slides.pdf JonDonym Users' Information Privacy Concerns., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
09/2018 PTKSP18sec-slides.pdf Assessing Privacy Policies of Internet of Things Services., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
04/2018 PTBGLR18sicherheit-slides.pdf Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext., Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
04/2018 PTBGLR18sicherheit-slides.pdf Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping, Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
10/2017 HATCH – eine Juristische Bewertung: Hürden beim Einsatz von Serious Games zu Social Engineering (with D. Kipker), ITS|KRITIS Jahreskongress 2017, Berlin, Germany
08/2017 1708_Pape_Trustbus.pdf A Structured Comparison of Social Engineering Intelligence Gathering Tools, Trust, Privacy and Security in Digital Business (TrustBus 2017), Lyon, France
03/2017   Privacy Hacking / SE with QR-Codes, m-chair workshop, internal research workshop, Frankfurt
03/2017 1703_P_Vorstellung_GI-FG-PET.pdf Vorstellung der GI Fachgruppe Privacy Enhancing Technologies (PET), Workshop der Fachgruppen SECMGT und PET: EU-DSGVO - "Wie sicher ist der neue Datenschutz?", Frankfurt, Germany
03/2017 Offer for participation: Privacy Hacking / SE with QR-Codes, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
03/2017 Why Open Data May Threaten Your Privacy, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
02/2017 1702_BFGP_Creativity_Techniques.pdf Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment (with E. Groen), CreaRE: Sixth International Workshop on Creativity in Requirements Engineering, Essen, Germany
09/2016   Relation of Mood and Social Engineering, m-chair workshop, internal research workshop, Frankfurt
06/2016 1606_Pape_ITSKRITIS_Social_Engineering.pdf Workshop: HATCH -- Ein Lernspiel zu Social Engineering, 2. Jahreskonferenz des Förderschwerpunkts "IT-Sicherheit für Kritische Infrastrukturen" (ITS KRITIS), Bremen, Germany
05/2016 PFBJ16icse-slides.pdf STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper, 38th International Conference on Software Engineering (ICSE 2016), Austin, TX, USA
04/2016 SIOC16moppa-slides.pdf Selbstdatenschutz im Online-Commerce (SIOC), Projektvorstellung, MoPPa Workshop, Darmstadt
03/2016   Interpreting Self-Assessments of Cloud Service Providers, m-chair workshop, internal research workshop, Frankfurt
09/2015 1509_PST_PRINF-slides.pdf Why Open Data May Threaten Your Privacy, Workshop on Privacy and Inference (PRINF), co-located with KI, Dresden
09/2015   A Serious Game on Social Engineering, m-chair workshop, internal research workshop, Oberelsbach
12/2014   Comparison of Cloud Provider Security, Socio-Technical Security Metrics (Dagstuhl Seminar 14491), Dagstuhl
03/2014 1309-slides-introduction_workshop.pdf Sample or Random Security – A Security Model for Segment-Based Visual Encryption, Financial Cryptography and Data Security 2014, Barbados
09/2013 1309-slides-introduction_workshop.pdf Begrüssung und Einführung in den Workshop , "Der Mensch im Fokus: Möglichkeiten der Selbstkontrolle von Datenschutz und Datensicherheit durch den Anwender", Informatik 2013, Koblenz
09/2013   The Challenge of Authentication in Insecure Environments , Disputation, Kassel
03/2013 /1303_BMPPD_cloud-battlefield.pdf Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers , 24. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Reusing keys in visual cryptography, 22. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Sample or Random Security, LS14 Workshop, internal Research Workshop, Essen
10/2011   UMLsec: Secure Links Revisited, LS14 Workshop, internal Research Workshop, Essen
03/2011   Human Decipherable Encryption, LS14 Workshop, internal Research Workshop, Essen
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, PET-CON 2009.1, Dresden
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, 10. Kryptotag, Berlin
09/2008 0809-slides-pape-a_survey_on_untransferable_anonymous_credentials.pdf A Survey on Untransferable Anonymous Credentials, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Brno
07/2008 0807-slides-pape-templateless.pdf Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials, 2. Kryptowochenende, Tabarz
02/2008   Embedding Biometric Information into Anonymous Credentials, PET-CON 2008.1, Aachen
08/2007   Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Karlstad
04/2004   Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops, Workshop "Gaming Applications in Pervasive Computing Environments", PERVASIVE 2004, the 2nd International Conference on Pervasive Computing, Wien