2016
- 07/2016
- Denis Fischbacher-Smith (University of Glasgow): Insider threats and the grey zone of organisational defences: designing an effective security organisation
- Stuart Macdonald (SERIC SYSTEMS): Cyber Security and what is really happening out there
- 02/2016
- Andreas Poller (Frauenhofer SIT, Darmstadt): First-time security audits as a turning point? Challenges for software security practices in an industry development team
2015
- 12/2015
- Sven Übelacker (Hamburg University of Technology): In Search of Cognitive Upper Bounds of Usable Security Mechanisms
- 11/2015
- Lukas Stockhardt (Student, Hochschule Darmstadt): Suchmaschinenoptimierung (SEO)
- Jin Gerlach (Information Systems, TU Darmstadt): IT-Security and Privacy - An Overview of Research Topics at the Chair of Software Business & Information Management
- 10/2015
- Marco Giglieri (CASED, TU Darmstadt): Towards a Security and Privacy Protector for Smart Homes
- 07/2015
- Prof. Dr. Udo Thiedeke (Uni Mainz): Warum neue Medien neu sind. Soziologische Perspektiven auf sozio-technische Erwartungen im Umgang mit Computern und Computernetze
- 06/2015
- Florian Volk (Telecoorporation Group, TU Darmstadt): Visually Communicating Multicriterial Trustworthiness to Human Users
- 05/2015
- Prof. Dr. Angela Sasse (University College London): Implicit authentication via biometrics: usability triumph or privacy nightmare?
- 04/2015
- Zinaida Beneson (Friedrich-Alexander University of Erlangen-Nuremberg): User Acceptance Factors for Anonymous Credentials: An Empirical Investigation
- 03/2015
- Jan Willemson (Cybernetica, Estonia): Y U NO MIXNET?
- 02/2015
- Marco Prandini (Universität Bologna): Prof. Marco Prandini from Universitity Bologna visits SecUSo
- Joseph Maguire (University of Glasgow): State of Alternative Authentication Research in Scotland
2014
- 12/2014
- Marian Harbach (University of Hanover): On the Adoption of End-User IT Security Measures
- 10/2014
- Vanessa Tague (University of Melbourne): Prêt à Voter in practice: an instructive account of our efforts to put end to end verifiability into practice for State elections
- Prof. Dr. Andreas Heinemann (Hochschule Darmstadt): Towards a User-Centered Security Software Development Process
- 07/2014
- Alexander de Luca (University of Munich, LMU): New Devices Old Concepts: The Smartphone Authentication Dilemma and How to Solve it
- Prof. Dr. Marian Margraf (h_da Darmstadt): Security Management as a Service
- 05/2014
- Rui Joaquim (University of Luxembourg): How to prove the validity of a complex ballot encryption to the voter and the public
- 03/2014
- Rolf Haenni (University of Applied Sciences Engineering and Information Technology
Bern, Switzerland): UniCrypt – A Mathematical Crypto-Library for Java - Thomas Pfeiffer (TU Darmstadt): Click me if you can!
- Rolf Haenni (University of Applied Sciences Engineering and Information Technology
2013
- 09/2013
- Sonia Chiasson (Carleton University): Understanding and improving mental models of computer security
- 08/2013
- Robbie Simpson (University of Glasgow): Verifiable electronic voting
- 07/2013
- Prof. Simone Fischer-Hübner (Karlstad University): Usable Privacy
- 04/2013
- Arne Padmos: Securing Interaction
- Prof. M. Angela Sasse (University College London):The New Institutional Economics of Security Management: An Introduction
- 01/2013
- Delphine Christin (TU Darmstadt): Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications
- Ingvar Tjostheim (Norwegian Computing Centre): Measuring trust with questionnaires? On studying e-voting from the electors point of view with surverys
2012
- 10/2012
- Prof. Dr.-Ing. Frank Pallas (KIT): The New Institutional Economics of Security Management: An Introduction
- 07/2012
- Prof. Dr. Peter Y.A. Ryan (University of Luxembourg): Advances in Verifiable Voting Systems
- 06/2012
- Marcus Niemietz (Hors Görtz Institute for IT Security): The Impact of UI Redressing on Browser-based Voting Systems
- Kerstin Goos (Frauenhofer ISI): Internetwahlen – Eine Analyse Ihrer Bedeutung für die Wahlbeteiligung
- Prof. Heather Lipford, Ph.D. (University of North Carolina): Interactive Support for Secure Programming
- 05/2012
- Dr. Michael P. Whitney (University of North Carolina): From language to location: Lessons learned through community based interactions
- 04/2012
- Robert Krimmer (Senior Adviser on New Voting Technologies for OSCE/ODIHR): Election Observation in the Context of New Voting Technologies (NVT)
- 03/2012
- Prof. Dr. Luigi Lo Iacono (Cologne University of Applied Science): Usable Security by Example - Visualizing instead of Masking Passwords
- 01/2012
- Dr. Roberto Samarone dos Santos Araújo (Universidade Federal do Pará (UFPA)): Farnel Voting Scheme
2011
- 11/2011
- Max-Emanuel Maurer & Dr. Alexander De Luca (Ludwig-Maximilians Universität, LMU): Enhancing Phishing Awarness: Filling the Gaps of Automatic Protection
- 10/2011
- Maria Henning (Project Group Provet, VerKonWa, Department of Economics, University of Kassel): Feasibility Analysis of Prêt à Voter for German Federal Elections
- 09/2011
- Steffen Bartsch (University of Bremen): The Usability of Authorization: An Integrative Approach to Security Usability
- Prof. Angela Sasse (University College London): Tutorial on Usable Security
- 07/2011
- Prof. Dr. Jeroen van de Graaf (Universidade Federal de Ouro Preto): Verifiable voting with everlasting privacy
- 06/2011
- Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Fairness in Voting: Are some voters more equal than others?
- 03/2011
- Prof. Karen Renaud (School of Computing Science, University of Glasgow): Handivote
- 01/2011
- Fateme Shirazi (University of Saarlandes): Robust Elections, extending CIVITAS towards Robustness
2009
- 12/2009
- Prof. Dr. habil Simone Fischer-Hübner (PRISEC (Privacy and Security) Research Group, Dept. of Computer Science, Karlstad University): Usable Privacy-enhancing Identity Management
- Dr. ir. Hugo Jonker (Safety and Trust of Software Systems, University of Luxembourg): Measuring Voter-controlled Privacy
- Dr. ir. Walter Pieters (University of Twente): The Dutch e-voting controversy: A Frankenstein perspective
- 10/2009
- Prof. Dr. Guido Schyren (University of Freiburg): Pattern based security metric for distributed trust systems
- 06/2009
- Oliver de Maneffe (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
- Prof. Oliver Pereira (Microelectronics Laboratory (DICE), UCL Crypto Group, Université catholique de Louvain): Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios