<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Usable Security | UCS</title><link>/tag/usable-security/</link><atom:link href="/tag/usable-security/index.xml" rel="self" type="application/rss+xml"/><description>Usable Security</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><image><url>/media/logo_hu12465375348167678909.png</url><title>Usable Security</title><link>/tag/usable-security/</link></image><item><title>EICC 2026 at Darmstadt University of Applied Sciences</title><link>/post/2026-04-22-eicc-20226/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>/post/2026-04-22-eicc-20226/</guid><description>&lt;p>From 17 to 18 June, we will be hosting EICC 2026 at Darmstadt University of Applied Sciences. The final program is now available. &lt;a href="https://www.fvv.um.si/eicc2026/" target="_blank" rel="noopener">Details&lt;/a>&lt;/p></description></item><item><title>PIONEER project presents current investigations and publications</title><link>/post/2025-08-07-iv2025-poster/</link><pubDate>Mon, 25 Aug 2025 00:00:00 +0000</pubDate><guid>/post/2025-08-07-iv2025-poster/</guid><description>&lt;p>The ATHENE research project PIONEER was featured at the 29th International Conference Information Visualisation held on August 07, 2025 in Darmstadt.
The conference brought together leading experts from academia and research institutions to discuss the latest developments in information visualisation, machine learning, and data science.&lt;/p>
&lt;p>During the event, Sara Hahn presented the latest research investigations and publications on PIONEER’s innovative Digital Privacy Companion.
In her talk, Sara Hahn provided a comprehensive overview of the project’s theoretical foundations and research methodology, while also showcasing current investigations, findings, and recent publications.&lt;/p>
&lt;p>The PIONEER project is part of ATHENE’s mission to advance cybersecurity and privacy research with practical solutions that can be transferred into real-world applications. &lt;/p>
&lt;p>
&lt;figure id="figure-sara-hahn-presenting-the-poster-on-day-2-of-the-iv2025-conference-image-169-iv2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp 400w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu14161170330207345930.webp 760w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu16404996694804680953.webp 1200w"
src="/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp"
width="570"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Sara Hahn presenting the poster on Day 2 of the IV2025 Conference. Image © IV2025
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>PIONEER project presents current results</title><link>/post/2024-11-19-conference-ffm/</link><pubDate>Thu, 21 Nov 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-19-conference-ffm/</guid><description>&lt;p>UCS recently participated in the ATHENE-Conference on Cognitive Security, held on November 19, 2024, at the historic Jügelhaus in Frankfurt am Main. The event gathered experts from academia, media, and politics to address the pressing challenges posed by cognitive attacks in the digital age. In addition to interesting talks and an insightful panel discussion, several projects were presented in the demo sessions.&lt;/p>
&lt;p>Sara Hahn had the opportunity to present the ATHENE project PIONEER’s mobile prototype during the demo sessions with her project colleagues from the TU Darmstadt. The conference guests could explore the prototype’s features, such as lessons and quizzes about privacy, or compare applications regarding their privacy friendliness.&lt;/p>
&lt;p>Within our project PIONEER, we strive to empower users in their digital sovereignty by providing them with the necessary knowledge and motivating them to acquire and apply competencies in their everyday digital lives.&lt;/p>
&lt;p>
&lt;figure id="figure-the-pioneer-team-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu1111056830116826190.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu7028380283064851052.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
The PIONEER Team. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-conference-impressions-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 2" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu8227128744662219430.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu10417369759856008191.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Conference Impressions. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>Workshop on crypto-agility and migration</title><link>/post/2023-08-01-workshop_on_crypto-agility_and_migration/</link><pubDate>Tue, 01 Aug 2023 00:00:00 +0000</pubDate><guid>/post/2023-08-01-workshop_on_crypto-agility_and_migration/</guid><description>&lt;p>We will host a workshop on crypto-agility and migration on September 19, 2023. &lt;a href="https://camm.h-da.io/workshop/" target="_blank" rel="noopener">Details&lt;/a>&lt;/p></description></item><item><title>UCS@1st Research Day / FBI</title><link>/post/2023-07-12-research-day-computer-science/</link><pubDate>Wed, 12 Jul 2023 00:00:00 +0000</pubDate><guid>/post/2023-07-12-research-day-computer-science/</guid><description>&lt;p>&lt;a href="https://impact.h-da.de/en/research-day-computer-science" target="_blank" rel="noopener">An article about the research day can be found here&lt;/a>&lt;/p></description></item><item><title>Article in Steinbeis Transfer Magazine</title><link>/post/2023-01-24/</link><pubDate>Tue, 24 Jan 2023 00:00:00 +0000</pubDate><guid>/post/2023-01-24/</guid><description>&lt;h1 id="title">Title&lt;/h1>
&lt;p>Good Usability Delivers Tighter Security&lt;/p>
&lt;h1 id="abstract">Abstract&lt;/h1>
&lt;p>The modern world of work would be almost inconceivable without the support of IT systems. Connected systems and IT solutions also continue to make inroads into our private lives. Consider, for example, intelligent heating controls (smart home systems), which have gained in importance in the current energy crisis. This trend is being accelerated by more and more people coming into direct contact with IT solutions. Among other areas, Professor Dr. Andreas Heinemann (Darmstadt University of Applied Sciences/InCUPS, his Steinbeis Transfer Center for Internet Communication, Usability, Privacy, and Security) specializes in IT security and usability. This involves investigating how to mitigate cyber risk.&lt;/p></description></item><item><title>Paper accepted at EICC 2022</title><link>/post/paper-eicc-2022/</link><pubDate>Thu, 05 May 2022 00:00:00 +0000</pubDate><guid>/post/paper-eicc-2022/</guid><description>&lt;p>Our paper &amp;ldquo;cryptolib: comparing and selecting cryptography libraries&amp;rdquo; by Jan Wohlwender, Rolf Huesmann, Andreas Heinemann and Alexander Wiesmaier will be presented at the &lt;a href="https://www.fvv.um.si/eicc2022/" target="_blank" rel="noopener">European Interdisciplinary Cybersecurity Conference 2022&lt;/a> (EICC 2022) on June 15/16.&lt;/p>
&lt;p>This work is based on the results of Jan Wohlwender&amp;rsquo;s Master&amp;rsquo;s thesis. Jan completed his Master&amp;rsquo;s programme at the Department of Computer Science with a focus on IT security.&lt;/p></description></item><item><title>Benutzbarkeit von zustandsbehafteten, Hash-basierten Signaturverfahren</title><link>/theses/2018-zeier/</link><pubDate>Fri, 16 Nov 2018 00:00:00 +0000</pubDate><guid>/theses/2018-zeier/</guid><description>&lt;!-- Supplementary notes can be added here, including [code and math](https://sourcethemes.com/academic/docs/writing-markdown-latex/). -->
&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>Quantum computers pose a danger to asymmetric cryptographic schemes. As development continues, schemes such as RSA will likely be broken in a few years’ time. For this reason, different algorithms that would also withstand powerful quantum computers are already being considered today. One class of such algorithms are hash-based signature schemes, some of which, including XMSS, are stateful. This leads to additional challenges for error-free use and integration in IT systems by developers. However, the security of IT systems depends on the correct use of cryptographic algorithms. This thesis therefore proposes a usable API design for stateful signature schemes using XMSS/XMSSMT as an example. This design was developed through a series of interviews with software developers, prototypically implemented and evaluated in further user studies. It was shown that the API can manage the stateful key in a way that is transparent to the user. However, this leads to many of the study’s participants not being aware of using stateful schemes. Regarding the documentation and applicability of the API, good results could be achieved.&lt;/p></description></item></channel></rss>