News - Page 3
Article published in JISA
The article "Signalling over-privileged mobile applications using passive security indicators" by Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse and Nils Gruschka has been published in the Journal Journal of Information Security and Applications (JISA).December 16, 2016
Book chapter published in Mobile Security and Privacy
The book chapter "REST-ful IoT Authentication Protocols" by Hoai Viet Nguyen and Luigi Lo Iacono has been published in the Book Mobile Security and Privacy, Advances, Challenges and Future Research Directions.September 29, 2016
Article published in DuD
The article "Untersuchung des Datenverkehrs aktueller Smart-TVs" by Aline Jaritz and Luigi Lo Iacono has been published in the Journal [DuD
- Datenschutz und Datensicherheit](https://link.springer.com/article/10.1007/s11623-016-0648-0).
Article published in i-com
The article "Usable Security - Results from a Field Study" by Luigi Lo Iacono, Hoai Viet Nguyen and Hartmut Schmitt will be published in the Journal i-com - Journal of Interactive Media.June 24, 2016
Paper accepted at the HAISA 2016
The paper "Towards the Usability Evaluation of Security-APIs" by Peter Gorski and Luigi Lo Iacono has been accepted for publication at the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016). The conference will be held from 19th - 21st July in Frankfurt, Germany.June 17, 2016
DAS Group at the "Bürgerdialog IT-Sicherheit in NRW"
The DAS Group will attend the "Markt der Möglichkeiten" at the Bürgerdialog IT-Sicherheit in NRW on June 20, 2016 in Cologne. The event offers the opportunity to discuss innovative solutions for IT security in the digital future. Here you can find the invitation with further information.June 13, 2016
"Usable Security and Privacy" Workshop 2016
At this years „Mensch und Computer 2016” conference (September 4-7, 2016 in Aachen) a workshop on "Usable Security and Privacy" will be organized by the USecureD consortium. The workshop aims at discussing new user-centered approaches and solutions for digital security mechanisms. Authors are invited to submit according scientific or technical papers.June 2, 2016