Stephan Neumann

According to our database1, Stephan Neumann authored at least 37 papers between 2011 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Recent Developments in the Context of Online Elections and Digital Polls in Germany.
Proceedings of the Sicherheit, 2022

2021
Towards a data-driven assistance system for operating segment erectors in tunnel boring machines.
Proceedings of the 14th International Symposium on Computational Intelligence and Design, 2021

2020
SARS-CoV-2, a Threat to Privacy?
CoRR, 2020

2018
Introduction to special issue on e-voting.
J. Inf. Secur. Appl., 2018

Effektiver Schutz vor betrügerischen Nachrichten.
Datenschutz und Datensicherheit, 2018

2017
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
IEEE Secur. Priv., 2017

Coercion-resistant proxy voting.
Comput. Secur., 2017

Don't Be Deceived: The Message Might Be Fake.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Election-Dependent Security Evaluation of Internet Voting Schemes.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Enabling Vote Delegation for Boardroom Voting.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Evaluation and improvement of internet voting schemes based on legally-founded security requirements.
PhD thesis, 2016

Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Datenschutz und Datensicherheit, 2016

SecIVo: a quantitative security evaluation framework for internet voting schemes.
Ann. des Télécommunications, 2016

Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Introducing Proxy Voting to Helios.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
IACR Cryptol. ePrint Arch., 2015

Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Datenschutz und Datensicherheit, 2015

2014
Pretty Understandable Democracy 2.0.
IACR Cryptol. ePrint Arch., 2014

Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Datenschutz und Datensicherheit, 2014

Towards interactive car interiors: the active armrest.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Coercion-Resistant Internet Voting in Practice.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Int. J. Inf. Secur. Priv., 2013

Formal Treatment of Distributed Trust in Electronic Voting.
IACR Cryptol. ePrint Arch., 2013

Towards A Practical JCJ / Civitas Implementation.
IACR Cryptol. ePrint Arch., 2013

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
IACR Cryptol. ePrint Arch., 2013

Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Modeling the German Legal Latitude Principles.
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Partial Verifiability in POLYAS for the GI Elections.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Robust electronic voting: Introducing robustness in Civitas.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011


  Loading...