Melanie Volkamer

Orcid: 0000-0003-2674-4043

Affiliations:
  • Karlsruhe Institute of Technology, Germany


According to our database1, Melanie Volkamer authored at least 215 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video.
Comput. Secur., February, 2024

Cookie disclaimers: Dark patterns and lack of transparency.
Comput. Secur., January, 2024

2023
Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E‑Mails - Was bei Weiterleitungs-URLs in E‑Mails aus Marketinggründen zu beachten ist.
Comput. und Recht, December, 2023

Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen - Die Basis der Demokratie in der digitalen Dekade.
Comput. und Recht, November, 2023

Weiterleitungs-URLs in E-Mails.
Datenschutz und Datensicherheit (dud), May, 2023

Cookie-Nutzung nach Inkrafttreten des TTDSG.
Datenschutz und Datensicherheit (dud), May, 2023

A user-centred approach to facilitate locating company security policies.
Proceedings of the Mensch und Computer 2023, 2023

Usable Security: Security 'Warnings' 2.0.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Influence of URL Formatting on Users' Phishing URL Detection.
Proceedings of the 2023 European Symposium on Usable Security, 2023

Encouraging Organisational Information Security Incident Reporting.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
Manipulative Designs von Cookies.
Datenschutz und Datensicherheit, 2022

Increasing security without decreasing usability: A comparison of various verifiable voting systems.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Recent Developments in the Context of Online Elections and Digital Polls in Germany.
Proceedings of the Sicherheit, 2022

Shoulder-Surfing Resistant Authentication for Augmented Reality.
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022

PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022

"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?".
Proceedings of the Human Aspects of Information Security and Assurance, 2022

Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen.
Proceedings of the 52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26., 2022

German Voters' Attitudes Towards Voting Online with a Verifiable System.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Individual Verifiability with Return Codes: Manipulation Detection Efficacy.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

Council of Europe Guidelines on the Use of ICT in Electoral Processes.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

Why Is Online Voting Still Largely a Black Box?
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Cookie Disclaimers: Impact of Design and Users' Attitude.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass.
AIS Trans. Hum. Comput. Interact., December, 2021

NoPhish-Challenge-Karten.
Datenschutz und Datensicherheit, 2021

How to Increase Smart Home Security and Privacy Risk Perception.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evaluation der interaktiven NoPhish Präsenzschulung.
Proceedings of the Mensch und Computer 2021, 2021

"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Literature Review on Virtual Reality Authentication.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Vision: What Johnny learns about Password Security from Videos posted on YouTube.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

SMILE - Smart eMaIl Link Domain Extractor.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness.
Datenschutz und Datensicherheit, 2020

Sensibilisierung für Phishing und andere betrügerische Nachrichten.
Datenschutz und Datensicherheit, 2020

Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit.
Datenschutz und Datensicherheit, 2020

Has the GDPR hype affected users' reaction to cookie disclaimers?
J. Cybersecur., 2020

Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
CoRR, 2020

An investigation of phishing awareness and education over time: When and how to best remind users.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Proceedings of the Financial Cryptography and Data Security, 2020

Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.
Proceedings of the Financial Cryptography and Data Security, 2020

Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Analysing Simulated Phishing Campaigns for Staff.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2019
Investigating People's Privacy Risk Perception.
Proc. Priv. Enhancing Technol., 2019

Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen.
Datenschutz und Datensicherheit, 2019

Biggest Failures in Security (Dagstuhl Seminar 19451).
Dagstuhl Reports, 2019

E-Voting - An Overview of the Development in the Past 15 Years and Current Discussions.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Why Johnny Fails to Protect his Privacy.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Introduction to special issue on e-voting.
J. Inf. Secur. Appl., 2018

Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability.
IACR Cryptol. ePrint Arch., 2018

Effektiver Schutz vor betrügerischen Nachrichten.
Datenschutz und Datensicherheit, 2018

Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte.
Datenschutz und Datensicherheit, 2018

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
Datenschutz und Datensicherheit, 2018

Web Application Security (Dagstuhl Seminar 18321).
Dagstuhl Reports, 2018

Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
Comput. Secur., 2018

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Developing and Evaluating a Five Minute Phishing Awareness Video.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Proceedings of the Sicherheit 2018, 2018

Helping john to make informed decisions on using social login.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Motivating Users to Consider Recommendations on Password Management Strategies.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018

What Did I Really Vote For?
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure?
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
J. Inf. Secur. Appl., 2017

Productivity vs security: mitigating conflicting goals in organizations.
Inf. Comput. Secur., 2017

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
IEEE Secur. Priv., 2017

Ende-zu-Ende sichere E-Mail-Kommunikation.
Datenschutz und Datensicherheit, 2017

User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Comput. Secur., 2017

Coercion-resistant proxy voting.
Comput. Secur., 2017

Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Don't Be Deceived: The Message Might Be Fake.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Addressing misconceptions about password security effectively.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Election-Dependent Security Evaluation of Internet Voting Schemes.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Keys4All.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

Enabling Vote Delegation for Boardroom Voting.
Proceedings of the Financial Cryptography and Data Security, 2017

Reliable Behavioural Factors in the Information Security Context.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Spot the phish by checking the pruned URL.
Inf. Comput. Secur., 2016

Why don't UK citizens protest against privacy-invading dragnet surveillance?
Inf. Comput. Secur., 2016

Security Proofs for Participation Privacy and Stronger Veri ability for Helios.
IACR Cryptol. ePrint Arch., 2016

E-Mail-Sicherheit.
Datenschutz und Datensicherheit, 2016

Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Datenschutz und Datensicherheit, 2016

"E-Mail made in Germany".
Datenschutz und Datensicherheit, 2016

SecIVo: a quantitative security evaluation framework for internet voting schemes.
Ann. des Télécommunications, 2016

An investigation into the usability of electronic voting systems for complex elections.
Ann. des Télécommunications, 2016

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Teaching Phishing-Security: Which Way is Best?
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Proceedings of the Mensch und Computer 2016, 2016

Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Memorable and Secure: How Do You Choose Your PIN?.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

Nophish: evaluation of a web application that teaches people being aware of phishing attacks.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

Efficiency Comparison of Various Approaches in E-Voting Protocols.
Proceedings of the Financial Cryptography and Data Security, 2016

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Privacy Friendly Apps - Making Developers Aware of Privacy Violations.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Introducing Proxy Voting to Helios.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
SIGCAS Comput. Soc., 2015

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
IACR Cryptol. ePrint Arch., 2015

Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Datenschutz und Datensicherheit, 2015

Usability und Privacy im Android Ökosystem.
Datenschutz und Datensicherheit, 2015

Exploring mental models underlying PIN management strategies.
Proceedings of the 2015 World Congress on Internet Security, 2015

Extending Helios Towards Private Eligibility Verifiability.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

A Socio-Technical Investigation into Smartphone Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Über die Wirksamkeit von Anti-Phishing-Training.
Proceedings of the Mensch und Computer 2015, 2015

Learn to Spot Phishing URLs with the Android NoPhish App.
Proceedings of the Information Security Education Across the Curriculum, 2015

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Implementing and evaluating a software-independent voting system for polling station elections.
J. Inf. Secur. Appl., 2014

Developing and testing SCoP - a visual hash scheme.
Inf. Manag. Comput. Secur., 2014

Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Datenschutz und Datensicherheit, 2014

Praxis von Internetwahlen.
Datenschutz und Datensicherheit, 2014

Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Comput. und Recht, 2014

What Deters Jane from Preventing Identification and Tracking on the Web?
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

NoPhish: An Anti-Phishing Education App.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Towards a Social Engineering Test Framework.
Proceedings of the WOSIS 2014, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Why Doesn't Jane Protect Her Privacy?
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Authentication Schemes - Comparison and Effective Password Spaces.
Proceedings of the Information Systems Security - 10th International Conference, 2014

ACCESS: Describing and Contrasting - Authentication Mechanisms.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Paper Audit Trails and Voters' Privacy Concerns.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Shake Hands to Bedevil: Securing Email with Wearable Technology.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

Coercion-Resistant Internet Voting in Practice.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Implementation and evaluation of the EasyVote tallying component and ballot.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

Building castles in quicksand: blueprint for a crowdsourced study.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

POSTER: Password Entering and Transmission Security.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Usable secure email communications: criteria and evaluation of existing approaches.
Inf. Manag. Comput. Secur., 2013

Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Int. J. Inf. Secur. Priv., 2013

Formal Treatment of Distributed Trust in Electronic Voting.
IACR Cryptol. ePrint Arch., 2013

Towards A Practical JCJ / Civitas Implementation.
IACR Cryptol. ePrint Arch., 2013

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
IACR Cryptol. ePrint Arch., 2013

Mental Models of Verifiability in Voting.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Vote Casting in Any Preferred Constituency: A New Voting Channel.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Contextualized Web Warnings, and How They Cause Distrust.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

A Comparison of American and German Folk Models of Home Computer Security.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Are Graphical Authentication Mechanisms As Strong As Passwords?
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Modeling the German Legal Latitude Principles.
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013

Contextualized Security Interventions in Password Transmission Scenarios.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Developing and Testing a Visual Hash Scheme.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
Proceedings of the Number Theory and Cryptography, 2013

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
C4PS: colors for privacy settings.
Proceedings of the 21st World Wide Web Conference, 2012

C4PS - Helping Facebookers Manage Their Privacy Settings.
Proceedings of the Social Informatics, 2012

It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

The secure platform problem taxonomy and analysis of existing proposals to address this problem.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

Partial Verifiability in POLYAS for the GI Elections.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Overview.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Random Block Verification: Improving the Norwegian Electoral Mix-Net.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Feasibility Analysis of Prêt à Voter for German Federal Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

User study of the improved Helios voting system interfaces.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

A formal approach towards measuring trust in distributed systems.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Robust electronic voting: Introducing robustness in Civitas.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

Measures to establish trust in internet voting.
Proceedings of the ICEGOV 2011, 2011

Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Evaluierungsverfahren für Internetwahlsysteme (Evaluation Techniques for Internet Voting Systems).
it Inf. Technol., 2010

An Evaluation and Certification Approach to Enable Voting Service Providers.
Proceedings of the Electronic Voting 2010, 2010

A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Proceedings of the Electronic Voting 2010, 2010

Verifiability in Electronic Voting - Explanations for Non Security Experts.
Proceedings of the Electronic Voting 2010, 2010

Measuring eTrust in Distributed Systems: General Concept and Application to Internet Voting.
Proceedings of the 23rd Bled eConference: eTrust: Implications for the Individual, 2010

A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Proceedings of the ARES 2010, 2010

Electronic Voting in Germany.
Proceedings of the Data Protection in a Profiled World, 2010

2009
Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities
Lecture Notes in Business Information Processing 30, Springer, ISBN: 978-3-642-01661-5, 2009

Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities.
PhD thesis, 2009

Developing a Legal Framework for Remote Electronic Voting.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

Determine the Resilience of Evaluated Internet Voting Systems.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Specification of a Voting Service Provider.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model.
Proceedings of the ICEGOV 2009, 2009

Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Towards the impact of the operational environment on the security of e-voting.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Classifying Privacy and Verifiability Requirements for Electronic Voting.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
Evaluation von Internetwahlsystemen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2008, 2008

Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Development of a Formal IT Security Model for Remote Electronic Voting Systems.
Proceedings of the 3rd International Conference, 2008

2007
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
Datenschutz und Datensicherheit, 2007

Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
Datenschutz und Datensicherheit, 2007

Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Datenschutz und Datensicherheit, 2007

The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Proceedings of the E-Voting and Identity, First International Conference, 2007

Compliance of RIES to the Proposed e-Voting Protection Profile.
Proceedings of the E-Voting and Identity, First International Conference, 2007

Requirements and Evaluation Procedures for eVoting.
Proceedings of the The Second International Conference on Availability, 2007

2006
Die Online-Wahl auf dem Weg zum Durchbruch.
Inform. Spektrum, 2006

Information Flow Control to Secure Dynamic Web Service Composition.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006

Multiple Casts in Online Voting: Analyzing Chances.
Proceedings of the Electronic Voting 2006: 2nd International Workshop, 2006

Security Requirements for Non-political Internet Voting.
Proceedings of the Electronic Voting 2006: 2nd International Workshop, 2006

Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Proceedings of the European Conference on eHealth 2006, 2006

Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Proceedings of the The First International Conference on Availability, 2006

2005
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Proceedings of the Electronic Government, 2005

2004
From Legal Principles to an Internet Voting System.
Proceedings of the Electronic Voting in Europe, 2004


  Loading...