


Остановите войну!
for scientists:
Melanie Volkamer
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j40]Melanie Volkamer, Benjamin Berens, Lukas Aldag, Milan Burgdorf, Andreas Lorenz, Marie-Claire Thiery:
NoPhish-Challenge-Karten. Datenschutz und Datensicherheit 45(11): 721-726 (2021) - [c141]Mattia Mossano, Benjamin Berens, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer, Melanie Volkamer:
SMILE - Smart eMaIl Link Domain Extractor. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 403-412 - [c140]Chiara Krisam, Heike Dietmann, Melanie Volkamer, Oksana Kulyk:
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites. EuroUSEC 2021: 1-8 - [c139]Mathieu Christmann, Peter Mayer, Melanie Volkamer:
Vision: What Johnny learns about Password Security from Videos posted on YouTube. EuroUSEC 2021: 124-128 - [c138]John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das:
A Literature Review on Virtual Reality Authentication. HAISA 2021: 189-198 - [c137]Niklas Kühl, Dominik Martin, Clemens Wolff, Melanie Volkamer:
"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics. HICSS 2021: 1-10 - [c136]Reyhan Duezguen, Peter Mayer, Benjamin Berens, Christopher Beckmann, Lukas Aldag, Mattia Mossano, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Security and Privacy Risk Perception. TrustCom 2021: 997-1004 - [e12]Robert Krimmer
, Melanie Volkamer
, David Duenas-Cid
, Oksana Kulyk, Peter B. Rønne
, Mihkel Solvak, Micha Germann
:
Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings. Lecture Notes in Computer Science 12900, Springer 2021, ISBN 978-3-030-86941-0 [contents] - 2020
- [j39]Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer:
Has the GDPR hype affected users' reaction to cookie disclaimers? J. Cybersecur. 6(1) (2020) - [j38]Melanie Volkamer, Tobias Hilt:
Sensibilisierung für Phishing und andere betrügerische Nachrichten. Datenschutz und Datensicherheit 44(2): 121-125 (2020) - [j37]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness. Datenschutz und Datensicherheit 44(8): 518-521 (2020) - [j36]Peter Mayer, Fabian Ballreich, Reyhan Düzgün, Christian Schwartz, Melanie Volkamer:
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit. Datenschutz und Datensicherheit 44(8): 522-527 (2020) - [c135]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Analysing Simulated Phishing Campaigns for Staff. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 312-328 - [c134]Mattia Mossano
, Kami Vaniea, Lukas Aldag, Reyhan Düzgün, Peter Mayer, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. EuroS&P Workshops 2020: 130-139 - [c133]Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. Financial Cryptography Workshops 2020: 84-101 - [c132]Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud
:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. Financial Cryptography Workshops 2020: 291-309 - [c131]Dirk Müllmann, Melanie Volkamer:
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen. GI-Jahrestagung 2020: 829-840 - [c130]Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger, Melanie Volkamer:
An investigation of phishing awareness and education over time: When and how to best remind users. SOUPS @ USENIX Security Symposium 2020: 259-284 - [e11]Melanie Volkamer, Christian Wressnegger:
ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020. ACM 2020, ISBN 978-1-4503-8833-7 [contents] - [e10]Robert Krimmer
, Melanie Volkamer
, Bernhard Beckert
, Ralf Küsters, Oksana Kulyk, David Duenas-Cid
, Mikhel Solvak:
Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings. Lecture Notes in Computer Science 12455, Springer 2020, ISBN 978-3-030-60346-5 [contents] - [i10]Reyhan Duezguen, Peter Mayer, Sanchari Das, Melanie Volkamer:
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays. CoRR abs/2007.11663 (2020) - [i9]Niklas Kühl, Dominik Martin, Clemens Wolff, Melanie Volkamer:
"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics. CoRR abs/2010.12026 (2020)
2010 – 2019
- 2019
- [j35]Oksana Kulyk, Nina Gerber, Melanie Volkamer, Annika Hilt:
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen. Datenschutz und Datensicherheit 43(2): 81-85 (2019) - [j34]Nina Gerber, Benjamin Reinheimer, Melanie Volkamer:
Investigating People's Privacy Risk Perception. Proc. Priv. Enhancing Technol. 2019(3): 267-288 (2019) - [c129]Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, Melanie Volkamer:
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads. CHI 2019: 549 - [c128]Nina Gerber, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. EuroS&P Workshops 2019: 109-118 - [c127]Oksana Kulyk, Melanie Volkamer:
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness. HICSS 2019: 1-10 - [c126]Oksana Kulyk, Jan Henzel, Karen Renaud
, Melanie Volkamer:
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations. INTERACT (1) 2019: 519-538 - [c125]Robert Krimmer
, Melanie Volkamer
, David Duenas-Cid
:
E-Voting - An Overview of the Development in the Past 15 Years and Current Discussions. E-VOTE-ID 2019: 1-13 - [e9]Robert Krimmer, Melanie Volkamer, Véronique Cortier, Bernhard Beckert, Ralf Küsters, Uwe Serdült, David Duenas-Cid:
Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11759, Springer 2019, ISBN 978-3-030-30624-3 [contents] - [i8]Frederik Armknecht, Ingrid Verbauwhede, Melanie Volkamer, Moti Yung:
Biggest Failures in Security (Dagstuhl Seminar 19451). Dagstuhl Reports 9(11): 1-23 (2019) - 2018
- [j33]Nina Gerber
, Paul Gerber, Melanie Volkamer:
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77: 226-261 (2018) - [j32]Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer, Alexandra Kunz, Christian Schwartz:
Effektiver Schutz vor betrügerischen Nachrichten. Datenschutz und Datensicherheit 42(5): 301-306 (2018) - [j31]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte. Datenschutz und Datensicherheit 42(5): 307-310 (2018) - [j30]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer, Tobias Hilt:
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp. Datenschutz und Datensicherheit 42(11): 680-685 (2018) - [j29]Jurlind Budurushi, Stephan Neumann, Karen Renaud
, Melanie Volkamer:
Introduction to special issue on e-voting. J. Inf. Secur. Appl. 38: 122-123 (2018) - [c124]Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? ARES 2018: 11:1-11:10 - [c123]Peter Mayer, Christian Schwartz, Melanie Volkamer:
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. ACSAC 2018: 733-748 - [c122]Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer:
What Did I Really Vote For? CHI 2018: 176 - [c121]Anastasija Collen
, Niels A. Nijdam, Javier Augusto-Gonzalez, Sokratis K. Katsikas, Konstantinos M. Giannoutakis, Georgios P. Spathoulas, Erol Gelenbe, Konstantinos Votis, Dimitrios Tzovaras, Navid Ghavami
, Melanie Volkamer, Piroska Haller
, Alvaro Sánchez, Miltiadis Dimas:
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Euro-CYBERSEC 2018: 68-78 - [c120]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Motivating Users to Consider Recommendations on Password Management Strategies. HAISA 2018: 28-37 - [c119]Farzaneh Karegar, Nina Gerber, Melanie Volkamer, Simone Fischer-Hübner:
Helping john to make informed decisions on using social login. SAC 2018: 1165-1174 - [c118]Karola Marky, Oksana Kulyk, Melanie Volkamer:
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting. Sicherheit 2018: 197-208 - [c117]Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Security Symposium 2018: 1-11 - [c116]Melanie Volkamer, Karen Renaud
, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - [c115]Oksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. TrustCom/BigDataSE 2018: 1058-1063 - [e8]Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid
:
Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings. Lecture Notes in Computer Science 11143, Springer 2018, ISBN 978-3-030-00418-7 [contents] - [i7]Martin Johns, Nick Nikiforakis, Melanie Volkamer, John Wilander:
Web Application Security (Dagstuhl Seminar 18321). Dagstuhl Reports 8(8): 1-17 (2018) - [i6]Oksana Kulyk, Melanie Volkamer:
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability. IACR Cryptol. ePrint Arch. 2018: 683 (2018) - 2017
- [j28]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer:
Coercion-resistant proxy voting. Comput. Secur. 71: 88-99 (2017) - [j27]Melanie Volkamer, Karen Renaud
, Benjamin Reinheimer, Alexandra Kunz:
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Comput. Secur. 71: 100-113 (2017) - [j26]Verena Zimmermann, Birgit Henhapl, Melanie Volkamer, Joachim Vogt:
Ende-zu-Ende sichere E-Mail-Kommunikation. Datenschutz und Datensicherheit 41(5): 308-313 (2017) - [j25]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer:
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? IEEE Secur. Priv. 15(3): 24-29 (2017) - [j24]Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs security: mitigating conflicting goals in organizations. Inf. Comput. Secur. 25(2): 137-151 (2017) - [j23]Paul Gerber, Melanie Volkamer, Karen Renaud
:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. J. Inf. Secur. Appl. 34: 8-26 (2017) - [c114]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. ARES 2017: 1:1-1:10 - [c113]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Reliable Behavioural Factors in the Information Security Context. ARES 2017: 9:1-9:10 - [c112]Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer:
Enabling Vote Delegation for Boardroom Voting. Financial Cryptography Workshops 2017: 419-433 - [c111]Matthias Enzmann, Annika Selzer, Melanie Volkamer, Ulrich Waldmann:
Keys4All. GI-Jahrestagung 2017: 735 - [c110]Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. HCI (22) 2017: 656-674 - [c109]Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. HCI (22) 2017: 675-690 - [c108]Stephan Neumann, Manuel Noll, Melanie Volkamer:
Election-Dependent Security Evaluation of Internet Voting Schemes. SEC 2017: 371-382 - [c107]Peter Mayer, Jan Kirchner, Melanie Volkamer:
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. SOUPS 2017: 13-28 - [c106]Peter Mayer, Melanie Volkamer:
Addressing misconceptions about password security effectively. STAST 2017: 16-27 - [c105]Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer:
Don't Be Deceived: The Message Might Be Fake. TrustBus 2017: 199-214 - [c104]Oksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser:
Advancing Trust Visualisations for Wider Applicability and User Acceptance. TrustCom/BigDataSE/ICESS 2017: 562-569 - [e7]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [e6]Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann:
Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings. Lecture Notes in Computer Science 10615, Springer 2017, ISBN 978-3-319-68686-8 [contents] - 2016
- [j22]Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide:
An investigation into the usability of electronic voting systems for complex elections. Ann. des Télécommunications 71(7-8): 309-322 (2016) - [j21]Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini
:
SecIVo: a quantitative security evaluation framework for internet voting schemes. Ann. des Télécommunications 71(7-8): 337-352 (2016) - [j20]Melanie Volkamer:
E-Mail-Sicherheit. Datenschutz und Datensicherheit 40(5): 265 (2016) - [j19]Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer:
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung. Datenschutz und Datensicherheit 40(5): 295-299 (2016) - [j18]Jurlind Budurushi, Annika Hilt, Melanie Volkamer:
"E-Mail made in Germany". Datenschutz und Datensicherheit 40(5): 300-304 (2016) - [j17]Melanie Volkamer, Karen Renaud
, Paul Gerber:
Spot the phish by checking the pruned URL. Inf. Comput. Secur. 24(4): 372-385 (2016) - [j16]Karen Renaud, Stephen Flowerday
, Rosanne English, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? Inf. Comput. Secur. 24(4): 400-415 (2016) - [c103]Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer:
Introducing Proxy Voting to Helios. ARES 2016: 98-106 - [c102]Peter Mayer, Stephan Neumann, Melanie Volkamer:
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. CCS 2016: 1817-1819 - [c101]Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer:
Privacy Friendly Apps - Making Developers Aware of Privacy Violations. IMPS@ESSoS 2016: 46-48 - [c100]Andreas Gutmann, Karen Renaud
, Joseph Maguire
, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [c99]Oksana Kulyk, Melanie Volkamer:
Efficiency Comparison of Various Approaches in E-Voting Protocols. Financial Cryptography Workshops 2016: 209-223 - [c98]Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert:
Nophish: evaluation of a web application that teaches people being aware of phishing attacks. GI-Jahrestagung 2016: 509-518 - [c97]Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer:
Supporting Decision Makers in Choosing Suitable Authentication Schemes. HAISA 2016: 67-77 - [c96]Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea. HAISA 2016: 145-155 - [c95]Andreas Gutmann, Melanie Volkamer, Karen Renaud:
Memorable and Secure: How Do You Choose Your PIN?. HAISA 2016: 156-166 - [c94]Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer:
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung. Mensch & Computer Workshopband 2016 - [c93]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer:
Coercion-Resistant Proxy Voting. SEC 2016: 3-16 - [c92]Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann:
Teaching Phishing-Security: Which Way is Best? SEC 2016: 135-149 - [c91]Melanie Volkamer, Karen Renaud, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. SEC 2016: 161-175 - [e5]David Aspinall, Lorenzo Cavallaro, Mohamed Nassim Seghir, Melanie Volkamer:
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016. CEUR Workshop Proceedings 1575, CEUR-WS.org 2016 [contents] - [i5]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy and Stronger Veri ability for Helios. IACR Cryptol. ePrint Arch. 2016: 431 (2016) - 2015
- [j15]Paul Gerber, Melanie Volkamer:
Usability und Privacy im Android Ökosystem. Datenschutz und Datensicherheit 39(2): 108-113 (2015) - [j14]Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle:
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem. Datenschutz und Datensicherheit 39(11): 747-752 (2015) - [j13]Paul Gerber, Melanie Volkamer, Karen Renaud:
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy. SIGCAS Comput. Soc. 45(1): 16-21 (2015) - [c90]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. ARES 2015: 224-229 - [c89]Peter Mayer, Melanie Volkamer:
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. ACSAC 2015: 431-440 - [c88]Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg:
Learn to Spot Phishing URLs with the Android NoPhish App. World Conference on Information Security Education 2015: 87-100 - [c87]Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer:
Über die Wirksamkeit von Anti-Phishing-Training. Mensch & Computer Workshopband 2015: 647-655 - [c86]Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. STM 2015: 265-273 - [c85]Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015: 104-122 - [c84]Oksana Kulyk, Vanessa Teague, Melanie Volkamer:
Extending Helios Towards Private Eligibility Verifiability. VoteID 2015: 57-73 - [c83]Karen Renaud, Melanie Volkamer:
Exploring mental models underlying PIN management strategies. WorldCIS 2015: 18-23 - [i4]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. IACR Cryptol. ePrint Arch. 2015: 558 (2015) - 2014
- [j12]Carina Boos, Steffen Bartsch, Melanie Volkamer:
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung. Comput. und Recht 30(2): 119-127 (2014) - [j11]Katharina Bräunlich, Rüdiger Grimm, Melanie Volkamer:
Praxis von Internetwahlen. Datenschutz und Datensicherheit 38(2): 69 (2014) - [j10]Johannes Buchmann, Stephan Neumann, Melanie Volkamer:
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. Datenschutz und Datensicherheit 38(2): 98-102 (2014) - [j9]Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing
, Melanie Volkamer:
Developing and testing SCoP - a visual hash scheme. Inf. Manag. Comput. Secur. 22(4): 382-392 (2014) - [j8]Jurlind Budurushi, Roman Jöris, Melanie Volkamer:
Implementing and evaluating a software-independent voting system for polling station elections. J. Inf. Secur. Appl. 19(2): 105-114 (2014) - [c82]Stephan Neumann, Oksana Kulyk, Melanie Volkamer:
A Usable Android Application Implementing Distributed Cryptography for Election Authorities. ARES 2014: 207-216 - [c81]Gamze Canova, Melanie Volkamer, Simon Weiler:
POSTER: Password Entering and Transmission Security. CCS 2014: 1418-1420 - [c80]Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud:
Building castles in quicksand: blueprint for a crowdsourced study. CHI Extended Abstracts 2014: 643-652 - [c79]Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer:
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both? EGOVIS 2014: 246-260 - [c78]Jurlind Budurushi, Melanie Volkamer, Karen Renaud, Marcel Woide:
Implementation and evaluation of the EasyVote tallying component and ballot. EVOTE 2014: 1-8 - [c77]Oksana Kulyk, Stephan Neumann, Melanie Volkamer, Christian Feier, Thorben Koster:
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design. EVOTE 2014: 1-10 - [c76]Christian Feier, Stephan Neumann, Melanie Volkamer:
Coercion-Resistant Internet Voting in Practice. GI-Jahrestagung 2014: 1401-1414 - [c75]Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer:
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail. GI-Jahrestagung 2014: 1415-1426 - [c74]Steffen Bartsch, Carina Boos, Gamze Canova, Dominic Dyck, Birgit Henhapl, Michael Schultheis, Melanie Volkamer:
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten. GI-Jahrestagung 2014: 2069-2080 - [c73]