Home | english  | Impressum | Datenschutz | Sitemap | KIT
Kontakt

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe

   

Newsletter abbonieren
YouTube abonnieren

SECUSO Events
Dienstag, 01. Okt 2019
E-Vote-ID 2019
Sonntag, 03. Nov 2019
Dagstuhl Seminar: Biggest Failures in Security

Weitere Veranstaltungen...
Externe Veranstaltungen
Samstag, 04. Mai 2019
CHI 2019
Montag, 13. Mai 2019
WWW 2019
Dienstag, 21. Mai 2019
Deutscher IT-Sicherheitskongress des BSI

Weitere Veranstaltungen...

KASTEL

Karlsruher IT-Sicherheitsinitiative

Gäste bis 2017

Liste der SECUSO Gäste von 2009 bis zum 31.12.2017:

 

  • 11/2017
    • Stephan Wiefling (TH Köln): Anwendung der Blockchain außerhalb von Geldwährung
    • Jurlind Budurushi (Detecon): IT Consulting at Detecon: A brief insight from practice

 

  • 07/2016
    • Denis Fischbacher-Smith (University of Glasgow): Insider threats and the grey zone of organisational defences: designing an effective security organisation
    • Stuart Macdonald (SERIC SYSTEMS): Cyber Security and what is really happening out there
  • 02/2016
    • Andreas Poller (Frauenhofer SIT, Darmstadt): First-time security audits as a turning point? Challenges for software security practices in an industry development team

 

  • 12/2015
    • Sven Übelacker (Hamburg University of Technology): In Search of Cognitive Upper Bounds of Usable Security Mechanisms
  • 11/2015
    • Lukas Stockhardt (Student, Hochschule Darmstadt): Suchmaschinenoptimierung (SEO)
    • Jin Gerlach (Information Systems, TU Darmstadt): IT-Security and Privacy - An Overview of Research Topics at the Chair of Software Business & Information Management
  • 10/2015
    • Marco Giglieri (CASED, TU Darmstadt): Towards a Security and Privacy Protector for Smart Homes
  • 07/2015
    • Prof. Dr. Udo Thiedeke (Uni Mainz): Warum neue Medien neu sind. Soziologische Perspektiven auf sozio-technische Erwartungen im Umgang mit Computern und Computernetze
  • 06/2015
    • Florian Volk (Telecoorporation Group, TU Darmstadt): Visually Communicating Multicriterial Trustworthiness to Human Users
  • 05/2015
    • Prof. Dr. Angela Sasse (University College London): Implicit authentication via biometrics: usability triumph or privacy nightmare?
  • 04/2015
    • Zinaida Beneson (Friedrich-Alexander University of Erlangen-Nuremberg): User Acceptance Factors for Anonymous Credentials: An Empirical Investigation
  • 03/2015
    • Jan Willemson (Cybernetica, Estonia): Y U NO MIXNET?
  • 02/2015
    • Marco Prandini (Universität Bologna): Prof. Marco Prandini from Universitity Bologna visits SecUSo
    • Joseph Maguire (University of Glasgow): State of Alternative Authentication Research in Scotland

 

  • 12/2014
    • Marian Harbach (University of Hanover): On the Adoption of End-User IT Security Measures
  • 10/2014
    • Vanessa Tague (University of Melbourne): Prêt à Voter in practice: an instructive account of our efforts to put end to end verifiability into practice for State elections
    • Prof. Dr. Andreas Heinemann (Hochschule Darmstadt): Towards a User-Centered Security Software Development Process
  • 07/2014
    • Alexander de Luca (University of Munich, LMU): New Devices Old Concepts: The Smartphone Authentication Dilemma and How to Solve it
    • Prof. Dr. Marian Margraf (h_da Darmstadt): Security Management as a Service
  • 05/2014
    • Rui Joaquim (University of Luxembourg): How to prove the validity of a complex ballot encryption to the voter and the public
  • 03/2014
    • Rolf Haenni (University of Applied Sciences Engineering and Information Technology
      Bern, Switzerland): UniCrypt – A Mathematical Crypto-Library for Java
    • Thomas Pfeiffer (TU Darmstadt): Click me if you can!

 

  • 09/2013
    • Sonia Chiasson (Carleton University): Understanding and improving mental models of computer security
  • 08/2013
    • Robbie Simpson (University of Glasgow): Verifiable electronic voting
  • 07/2013
    • Prof. Simone Fischer-Hübner (Karlstad University): Usable Privacy
  • 04/2013
    • Arne Padmos: Securing Interaction
    • Prof. M. Angela Sasse (University College London):The New Institutional Economics of Security Management: An Introduction
  • 01/2013
    • Delphine Christin (TU Darmstadt): Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications
    • Ingvar Tjostheim (Norwegian Computing Centre): Measuring trust with questionnaires? On studying e-voting from the electors point of view with surverys

 

  • 10/2012
    • Prof. Dr.-Ing. Frank Pallas (KIT): The New Institutional Economics of Security Management: An Introduction
  • 07/2012
    • Prof. Dr. Peter Y.A. Ryan (University of Luxembourg): Advances in Verifiable Voting Systems
  • 06/2012
    • Marcus Niemietz (Hors Görtz Institute for IT Security): The Impact of UI Redressing on Browser-based Voting Systems
    • Kerstin Goos (Frauenhofer ISI): Internetwahlen – Eine Analyse Ihrer Bedeutung für die Wahlbeteiligung
    • Prof. Heather Lipford, Ph.D. (University of North Carolina): Interactive Support for Secure Programming
  • 05/2012
    • Dr. Michael P. Whitney (University of North Carolina): From language to location: Lessons learned through community based interactions
  • 04/2012
    • Robert Krimmer (Senior Adviser on New Voting Technologies for OSCE/ODIHR): Election Observation in the Context of New Voting Technologies (NVT)
  • 03/2012
    • Prof. Dr. Luigi Lo Iacono (Cologne University of Applied Science): Usable Security by Example - Visualizing instead of Masking Passwords
  • 01/2012
    • Dr. Roberto Samarone dos Santos Araújo (Universidade Federal do Pará (UFPA)): Farnel Voting Scheme

 

  • 11/2011
    • Max-Emanuel Maurer & Dr. Alexander De Luca (Ludwig-Maximilians Universität, LMU): Enhancing Phishing Awarness: Filling the Gaps of Automatic Protection
  • 10/2011
    • Maria Henning (Project Group Provet, VerKonWa, Department of Economics, University of Kassel): Feasibility Analysis of Prêt à Voter for German Federal Elections
  • 09/2011
    • Steffen Bartsch (University of Bremen): The Usability of Authorization: An Integrative Approach to Security Usability
    • Prof. Angela Sasse (University College London): Tutorial on Usable Security
  • 07/2011
    • Prof. Dr. Jeroen van de Graaf (Universidade Federal de Ouro Preto): Verifiable voting with everlasting privacy
  • 06/2011
    • Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Fairness in Voting: Are some voters more equal than others?
  • 03/2011
    • Prof. Karen Renaud (School of Computing Science, University of Glasgow): Handivote
  • 01/2011
    • Fateme Shirazi (University of Saarlandes): Robust Elections, extending CIVITAS towards Robustness

 

  • 12/2010
    • Oliver Spycher (University of Fribourg & Bern University of Applied Sciences): Efficient Coercion-Resistant Remote E-Voting

 

  • 12/2009
    • Prof. Dr. habil Simone Fischer-Hübner (PRISEC (Privacy and Security) Research Group, Dept. of Computer Science, Karlstad University): Usable Privacy-enhancing Identity Management
    • Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Measuring Voter-controlled Privacy
    • Dr. ir. Walter Pieters (University of Twente): The Dutch e-voting controversy: A Frankenstein perspective
  • 10/2009
    • Prof. Dr. Guido Schyren (University of Freiburg): Pattern based security metric for distributed trust systems
  • 06/2009
    • Oliver de Maneffe (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
    • Prof. Oliver Pereira (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios