Home | english  | Impressum | Datenschutz | Sitemap | KIT

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe


Newsletter abbonieren
YouTube abonnieren

Externe Veranstaltungen
Samstag, 25. Apr 2020
CHI 2020
Dienstag, 26. Mai 2020
Montag, 24. Aug 2020
ARES 2020

Weitere Veranstaltungen...


Karlsruher IT-Sicherheitsinitiative

Gäste bis 2017

Liste der SECUSO Gäste von 2009 bis zum 31.12.2017:


  • 11/2017
    • Stephan Wiefling (TH Köln): Anwendung der Blockchain außerhalb von Geldwährung
    • Jurlind Budurushi (Detecon): IT Consulting at Detecon: A brief insight from practice


  • 07/2016
    • Denis Fischbacher-Smith (University of Glasgow): Insider threats and the grey zone of organisational defences: designing an effective security organisation
    • Stuart Macdonald (SERIC SYSTEMS): Cyber Security and what is really happening out there
  • 02/2016
    • Andreas Poller (Frauenhofer SIT, Darmstadt): First-time security audits as a turning point? Challenges for software security practices in an industry development team


  • 12/2015
    • Sven Übelacker (Hamburg University of Technology): In Search of Cognitive Upper Bounds of Usable Security Mechanisms
  • 11/2015
    • Lukas Stockhardt (Student, Hochschule Darmstadt): Suchmaschinenoptimierung (SEO)
    • Jin Gerlach (Information Systems, TU Darmstadt): IT-Security and Privacy - An Overview of Research Topics at the Chair of Software Business & Information Management
  • 10/2015
    • Marco Giglieri (CASED, TU Darmstadt): Towards a Security and Privacy Protector for Smart Homes
  • 07/2015
    • Prof. Dr. Udo Thiedeke (Uni Mainz): Warum neue Medien neu sind. Soziologische Perspektiven auf sozio-technische Erwartungen im Umgang mit Computern und Computernetze
  • 06/2015
    • Florian Volk (Telecoorporation Group, TU Darmstadt): Visually Communicating Multicriterial Trustworthiness to Human Users
  • 05/2015
    • Prof. Dr. Angela Sasse (University College London): Implicit authentication via biometrics: usability triumph or privacy nightmare?
  • 04/2015
    • Zinaida Beneson (Friedrich-Alexander University of Erlangen-Nuremberg): User Acceptance Factors for Anonymous Credentials: An Empirical Investigation
  • 03/2015
    • Jan Willemson (Cybernetica, Estonia): Y U NO MIXNET?
  • 02/2015
    • Marco Prandini (Universität Bologna): Prof. Marco Prandini from Universitity Bologna visits SecUSo
    • Joseph Maguire (University of Glasgow): State of Alternative Authentication Research in Scotland


  • 12/2014
    • Marian Harbach (University of Hanover): On the Adoption of End-User IT Security Measures
  • 10/2014
    • Vanessa Tague (University of Melbourne): Prêt à Voter in practice: an instructive account of our efforts to put end to end verifiability into practice for State elections
    • Prof. Dr. Andreas Heinemann (Hochschule Darmstadt): Towards a User-Centered Security Software Development Process
  • 07/2014
    • Alexander de Luca (University of Munich, LMU): New Devices Old Concepts: The Smartphone Authentication Dilemma and How to Solve it
    • Prof. Dr. Marian Margraf (h_da Darmstadt): Security Management as a Service
  • 05/2014
    • Rui Joaquim (University of Luxembourg): How to prove the validity of a complex ballot encryption to the voter and the public
  • 03/2014
    • Rolf Haenni (University of Applied Sciences Engineering and Information Technology
      Bern, Switzerland): UniCrypt – A Mathematical Crypto-Library for Java
    • Thomas Pfeiffer (TU Darmstadt): Click me if you can!


  • 09/2013
    • Sonia Chiasson (Carleton University): Understanding and improving mental models of computer security
  • 08/2013
    • Robbie Simpson (University of Glasgow): Verifiable electronic voting
  • 07/2013
    • Prof. Simone Fischer-Hübner (Karlstad University): Usable Privacy
  • 04/2013
    • Arne Padmos: Securing Interaction
    • Prof. M. Angela Sasse (University College London):The New Institutional Economics of Security Management: An Introduction
  • 01/2013
    • Delphine Christin (TU Darmstadt): Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications
    • Ingvar Tjostheim (Norwegian Computing Centre): Measuring trust with questionnaires? On studying e-voting from the electors point of view with surverys


  • 10/2012
    • Prof. Dr.-Ing. Frank Pallas (KIT): The New Institutional Economics of Security Management: An Introduction
  • 07/2012
    • Prof. Dr. Peter Y.A. Ryan (University of Luxembourg): Advances in Verifiable Voting Systems
  • 06/2012
    • Marcus Niemietz (Hors Görtz Institute for IT Security): The Impact of UI Redressing on Browser-based Voting Systems
    • Kerstin Goos (Frauenhofer ISI): Internetwahlen – Eine Analyse Ihrer Bedeutung für die Wahlbeteiligung
    • Prof. Heather Lipford, Ph.D. (University of North Carolina): Interactive Support for Secure Programming
  • 05/2012
    • Dr. Michael P. Whitney (University of North Carolina): From language to location: Lessons learned through community based interactions
  • 04/2012
    • Robert Krimmer (Senior Adviser on New Voting Technologies for OSCE/ODIHR): Election Observation in the Context of New Voting Technologies (NVT)
  • 03/2012
    • Prof. Dr. Luigi Lo Iacono (Cologne University of Applied Science): Usable Security by Example - Visualizing instead of Masking Passwords
  • 01/2012
    • Dr. Roberto Samarone dos Santos Araújo (Universidade Federal do Pará (UFPA)): Farnel Voting Scheme


  • 11/2011
    • Max-Emanuel Maurer & Dr. Alexander De Luca (Ludwig-Maximilians Universität, LMU): Enhancing Phishing Awarness: Filling the Gaps of Automatic Protection
  • 10/2011
    • Maria Henning (Project Group Provet, VerKonWa, Department of Economics, University of Kassel): Feasibility Analysis of Prêt à Voter for German Federal Elections
  • 09/2011
    • Steffen Bartsch (University of Bremen): The Usability of Authorization: An Integrative Approach to Security Usability
    • Prof. Angela Sasse (University College London): Tutorial on Usable Security
  • 07/2011
    • Prof. Dr. Jeroen van de Graaf (Universidade Federal de Ouro Preto): Verifiable voting with everlasting privacy
  • 06/2011
    • Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Fairness in Voting: Are some voters more equal than others?
  • 03/2011
    • Prof. Karen Renaud (School of Computing Science, University of Glasgow): Handivote
  • 01/2011
    • Fateme Shirazi (University of Saarlandes): Robust Elections, extending CIVITAS towards Robustness


  • 12/2010
    • Oliver Spycher (University of Fribourg & Bern University of Applied Sciences): Efficient Coercion-Resistant Remote E-Voting


  • 12/2009
    • Prof. Dr. habil Simone Fischer-Hübner (PRISEC (Privacy and Security) Research Group, Dept. of Computer Science, Karlstad University): Usable Privacy-enhancing Identity Management
    • Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Measuring Voter-controlled Privacy
    • Dr. ir. Walter Pieters (University of Twente): The Dutch e-voting controversy: A Frankenstein perspective
  • 10/2009
    • Prof. Dr. Guido Schyren (University of Freiburg): Pattern based security metric for distributed trust systems
  • 06/2009
    • Oliver de Maneffe (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
    • Prof. Oliver Pereira (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios