Security, Usability and Society

Conference seminar

Lecturer:Prof. Dr. Melanie Volkamer
Organisation:Andreas Gutmann
Supervisors:Prof. Dr. Melanie Volkamer, Oksana Kulyk, Jurlind Budurushi, Peter Mayer, Simon Stockhardt, Andreas Gutmann
First Meeting:Thursday 29.10.15, 14:30PM GMT (A213)
Requirements:Interest in interdisciplinary topics and research work, basic knowledge in security.
Registration:Registration from Thursday 29.10.15 until Sunday 01.11.15 (NOTE: The registration in TUCaN is also mandatory.)
Formatting:Use LNCS MS Word or LaTeX template
Submission (for reviews):Monday 11.01.16 11:59 PM GMT (link here)
Reviews:Monday 01.02.16 11:59 PM GMT
Presentations:Wednesday 10.02.16 in A313
Submission (final version):Sunday 28.02.16 11:59 PM GMT

General Information

The seminar will take place in form of a conference. The typical phases of a scientific publication will be followed through the example of a paper:

  • Submission (Paper)
  • Review Process

    • 1 person: 20 minutes + 5 minutes questions/answers
    • 2 persons: 40 minutes + 10 minutes questions/answers

  • Submission (Full Paper)

All presentations will take place on one day (two days if needed). This day will be organized similar to a talk or visit at a scientific conference. This format ensures that the preparation times are identical for all participants. We will meet all together only twice: to award topics/preliminary discussion and at the talks. Questions that arise during the work of the individual topics will be discussed with the respective supervisor in individual meetings. Further information is available at the preliminary discussion.

The slides from the "Presentation Skills" workshop can be found here.

For the presentations the following template has to be used: PPT. Please note the comments within the template and consider them for your own presentation

The best presentation will be awarded with a price.

Questions regarding your grade should be addressed to your own supervisor.

Teaching goals

Our everyday life moves more and more towards the Internet. E-business and e-banking have become the normality for a significant proportion of our society and further electronic processes begin to enter the field. While we already use the Internet for many activities like shopping, banking, gaming, and communicating with friends both in the private and business sector, the number of applications is still increasing. As prime example, electronic voting becomes an alternative or even substitution for traditional voting channels in many countries like Estonia or Norway. All these applications have in common that they are security-critical systems which need to meet many security properties from a technical point of view but which also need to be usable in a way that the implemented security is effective in practice and not only theoretically – and accepted by society.

The goal of this seminar is to better understand the challenges.

Topics, Elaborations and Talks

The following topics will be available and assigned after the first meeting:

Authentication and Usability

  • Password policies in the wild: Which sites offer secure authentication? (1 student) Literatur auf Deutsch
  • Usability, security and safety analysis of authentication methods in the modern car (2 students)

Cryptography, Privacy and Anonymity

  • Group Secret Key Agreement Protocols: A comparison with respect to resilience, efficiency, and usability challenges (2 students)
  • Public Key Identification Protocols: A practical comparison and potential real-world applications (2 students)
  • Anonymous communication on smartphones (2 students)
  • Deniable encryption (2 student)

Society and Security

  • Analyse und Vergleich der auf deutsch verfügbaren Sicherheitsguidelines (1 student) Literatur auf Deutsch
  • Analyse von Real Life Verhalten in sicherheitsrelevanten Fragen und Evaluation der Erkenntnisse im Kontext der IT-Security (1 student)
  • Auswirkungen sozialer Normen auf die Sicherheit bei der PIN Eingabe (1 student)
  • Comparing privacy violation of browsers and internet based services (2 students)

The following topics have been suggested by students themselves and are therefore already assigned:

  • Analysis of the Liquid Democracy implementation LiquidFeedback (supervisor Oksana Kulyk)

You are welcome to suggest your own topic in one of the areas. Note that suggested topics require a SECUSO member as supervisor. We advice you to check each members webpage for suitable supervisors.

Integration into study plan and examination regulations

The seminar is aimed at bachelor's candidates, master's candidates, diploma students, and potential teachers of computer science, WI-degree programs, Electrical Engineering and Information Technology from Semester 5, as well as bachelor's and master's candidates in the field of trusted systems. The seminar is part of the master's program in IT-Security. We further welcome students from the area of interdisciplinary NAG (Wissenschafts- und Technikforschung - Normen, Ambivalenzen, Gestaltungsoptionen) studies.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang