Blog
Career
Traveling
Diving
Hiking
Abi95
Info
Contact
Home

Invited Talks

09/2019 1909_Pape_TRANSFORM.pdf Privacy Skills Needed for the Future - Applying Privacy Patterns to the Internet of Things' (IoT) Architecture, TRANSFORM 2019 - Digital Skills for the Transformation of Disciplines, Business and Government, Bern, Switzerland
05/2019 1905_Pape_Karlstad.pdf PET Users’ Information Privacy Concerns, Kolloquium at Karlstad University, Karlstad, Sweden
10/2018 Social Engineering, Arbeitskreis Payment Fraud des Verbandes der Chemischen Industrie (VCI), Frankfurt
10/2018 1810_Pape_CAST_IoT.pdf Privacy Policies von IoT-Geräten, CAST-Workshop: Anonymes Shopping im Internet: SIOC - Selbstdatenschutz im Online-Commerce, Darmstadt
06/2018 Risk Assessment von Smartphone Apps im Unternehmenskontext, GFFT-Technology Race IT-Security, Essen
05/2018 1805_Pape_VDI_Fachtagung.pdf Stand zur IT-Sicherheit deutscher Stromnetzbetreiber, VDI-Fachtagung IT-Sicherheit für kritische Infrastrukturen, Neuss
02/2018 Social Engineering: Introduction, Tools and Counteracting Training Strategies, NECS Winter School 2018, Trento, Italy
02/2018 Status zur IT-Sicherheit deutscher Stromnetzbetreiber, 43. Sitzung DKE/AK952.0.15 DKE-ETG-ITG Informationssicherheit in der Netz- und Stationsleittechnik, Frankfurt
12/2017 Serious Gaming: Wie das Kartenspiel HATCH für mehr Sicherheit sorgt, VDMA-Informationstag Cybersecurity & Informationssicherheit, Frankfurt
02/2017 HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering, CAST-Workshop "Usable Security", Darmstadt
11/2016 1611_Pape_DGRI.pdf Technische Bedingungen wirksamer Verschlüsselung,Deutsche Gesellschaft für Recht und Informatik e.V., DGRI Jahrestagung 2016: 40 Jahre DGRI!, Frankfurt
03/2016 1603_Pape+Wagner_AGAD_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge, 7. ERFA-Runde Datenschutz und IT-Sicherheit, Arbeitgeberverband Großhandel, Außenhandel, Dienstleistungen e.V., Dortmund
03/2016 IT-Sicherheit spielend lernen: Ein Lernspiel zu Social Engineering, ASEW Arbeitskreis IT-Sicherheit , Cologne
11/2015 1511_Wagner+Pape_DAFTA_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge (mit F. Wagner), 39. Datenschutzfachtagung (DAFTA), Cologne
02/2015   The Difficulty of Selecting a Secure Cloud Provider, Invited Talk, Goethe University Frankfurt, Frankfurt
08/2005 0508-slides-pape-ajtai_dwork+regev.pdf Gitterbasierte Kryptosysteme: Ajtai-Dwork und Regev, Invited Talk, HGI/RUB Bochum

Conference and Workshop Talks

11/2019 1911_Pape_Dagstuhl.pdf Relation of Business Models to Security (Failures), Dagstuhl Seminar 19451, Biggest Failures in Security, Germany
09/2019 PS19spose-slides.pdf An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security, ESORICS 2019 International Workshops, SPOSE 2019, Luxemburg
09/2018 HP18sec-slides.pdf JonDonym Users' Information Privacy Concerns., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
09/2018 PTKSP18sec-slides.pdf Assessing Privacy Policies of Internet of Things Services., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
04/2018 PTBGLR18sicherheit-slides.pdf Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext., Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
04/2018 PTBGLR18sicherheit-slides.pdf Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping, Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
10/2017 HATCH – eine Juristische Bewertung: Hürden beim Einsatz von Serious Games zu Social Engineering (with D. Kipker), ITS|KRITIS Jahreskongress 2017, Berlin, Germany
08/2017 1708_Pape_Trustbus.pdf A Structured Comparison of Social Engineering Intelligence Gathering Tools, Trust, Privacy and Security in Digital Business (TrustBus 2017), Lyon, France
03/2017   Privacy Hacking / SE with QR-Codes, m-chair workshop, internal research workshop, Frankfurt
03/2017 1703_P_Vorstellung_GI-FG-PET.pdf Vorstellung der GI Fachgruppe Privacy Enhancing Technologies (PET), Workshop der Fachgruppen SECMGT und PET: EU-DSGVO - "Wie sicher ist der neue Datenschutz?", Frankfurt, Germany
03/2017 Offer for participation: Privacy Hacking / SE with QR-Codes, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
03/2017 Why Open Data May Threaten Your Privacy, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
02/2017 1702_BFGP_Creativity_Techniques.pdf Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment (with E. Groen), CreaRE: Sixth International Workshop on Creativity in Requirements Engineering, Essen, Germany
09/2016   Relation of Mood and Social Engineering, m-chair workshop, internal research workshop, Frankfurt
06/2016 1606_Pape_ITSKRITIS_Social_Engineering.pdf Workshop: HATCH -- Ein Lernspiel zu Social Engineering, 2. Jahreskonferenz des Förderschwerpunkts "IT-Sicherheit für Kritische Infrastrukturen" (ITS KRITIS), Bremen, Germany
05/2016 PFBJ16icse-slides.pdf STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper, 38th International Conference on Software Engineering (ICSE 2016), Austin, TX, USA
04/2016 SIOC16moppa-slides.pdf Selbstdatenschutz im Online-Commerce (SIOC), Projektvorstellung, MoPPa Workshop, Darmstadt
03/2016   Interpreting Self-Assessments of Cloud Service Providers, m-chair workshop, internal research workshop, Frankfurt
09/2015 1509_PST_PRINF-slides.pdf Why Open Data May Threaten Your Privacy, Workshop on Privacy and Inference (PRINF), co-located with KI, Dresden
09/2015   A Serious Game on Social Engineering, m-chair workshop, internal research workshop, Oberelsbach
12/2014   Comparison of Cloud Provider Security, Socio-Technical Security Metrics (Dagstuhl Seminar 14491), Dagstuhl
03/2014 1309-slides-introduction_workshop.pdf Sample or Random Security – A Security Model for Segment-Based Visual Encryption, Financial Cryptography and Data Security 2014, Barbados
09/2013 1309-slides-introduction_workshop.pdf Begrüssung und Einführung in den Workshop , "Der Mensch im Fokus: Möglichkeiten der Selbstkontrolle von Datenschutz und Datensicherheit durch den Anwender", Informatik 2013, Koblenz
09/2013   The Challenge of Authentication in Insecure Environments , Disputation, Kassel
03/2013 /1303_BMPPD_cloud-battlefield.pdf Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers , 24. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Reusing keys in visual cryptography, 22. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Sample or Random Security, LS14 Workshop, internal Research Workshop, Essen
10/2011   UMLsec: Secure Links Revisited, LS14 Workshop, internal Research Workshop, Essen
03/2011   Human Decipherable Encryption, LS14 Workshop, internal Research Workshop, Essen
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, PET-CON 2009.1, Dresden
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, 10. Kryptotag, Berlin
09/2008 0809-slides-pape-a_survey_on_untransferable_anonymous_credentials.pdf A Survey on Untransferable Anonymous Credentials, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Brno
07/2008 0807-slides-pape-templateless.pdf Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials, 2. Kryptowochenende, Tabarz
02/2008   Embedding Biometric Information into Anonymous Credentials, PET-CON 2008.1, Aachen
08/2007   Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Karlstad
04/2004   Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops, Workshop "Gaming Applications in Pervasive Computing Environments", PERVASIVE 2004, the 2nd International Conference on Pervasive Computing, Wien

Profile

Business Networks

View Sebastian Pape's profile on Xing   View Sebastian Pape's profile on LinkedIn

Academic Networks

View Sebastian Pape's Profile on Research Gate   View Sebastian Pape's ORCID