Karola Marky

Research Assistant

Technische Universität Darmstadt
Department of Computer Science
Building S4|14
Mornewegstr. 30
D-64293 Darmstadt
Germany

Room: 3.1.19
Tel: +49(0)6151/16-20810
Email: karola.marky(a-t)secuso.org

PGP-Key: Key
Fingerprint: B37C 17AC 462D 0261 92AA D058 5866 9970 0308 9EF7

Curriculum Vitae

Karola Marky is a research assistant in the SECUSO Research Group of Prof. Dr. Melanie Volkamer since July 2017. In the past she graduated from the TU Kaiserslautern with a Bachelor's degree in Applied Computer Science and has been at the National Institute of Informatics in Tokyo as Visiting Researcher. After that she graduated from TU Darmstadt with a Master's degree in Computer Science in June 2017. In her master studies she focussed on IT Security and had psychology as a minor. During her master studies Karola Marky has been student assistant in the SECUSO research group.

Research Projects

Research Interests

  • Remote Electronic Voting
  • Proxy Voting
  • Usable Security

Publications

What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes [to appear]

Autor Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer
Datum April 2018
Art Inproceedings
HerausgeberACM
BuchtitelConference on Human Factors in Computing Systems (CHI)
JournalConference on Human Factors in Computing Systems (CHI '18)
OrtMontreal, QC, Canada
DOIhttps://doi.org/10.1145/3173574.3173750
KeywordsE-voting, End-to-end verifiability, Cast-as-intended Verifiability, Usability Evaluation, Benaloh Challenge
SchlüsselTUD-CS-2018-0027
Forschungsgebiete SECUSO - Security, Usability and Society
Abstrakt E-voting has been embraced by a number of countries, delivering benefits in terms of efficiency and accessibility. End-to-end verifiable e-voting schemes facilitate verification of the integrity of individual votes during the election process. In particular, methods for cast-as-intended verification enable voters to confirm that their cast votes have not been manipulated by the voting client. A well-known technique for effecting cast-as-intended verification is the Benaloh Challenge. The usability of this challenge is crucial because voters have to be actively engaged in the verification process. In this paper, we report on a usability evaluation of three different approaches of the Benaloh Challenge in the remote e-voting context. We performed a comparative user study with 95 participants. We conclude with a recommendation for which approaches should be provided to afford verification in real-world elections and suggest usability improvements.
[Diesen Eintrag nach BibTeX exportieren]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Talks

Usability of End-to-End Verifiable E-Voting Schemes
In: PHD Colloquium of the 2nd International Joint Conference on Electronic Voting (E-VOTE-ID) - Bregenz (10/2017)

Human Factors and Awareness in IT Security
In: International IDEA Roundtable on Cybersecurity in Elections  - The Hague (06/2017)

Sicherheitsindikatoren in Browsern und Mobilgeräten
In: Safer Internet Day - Polizeipräsidium Mittelhessen - Gießen (02/2017)

Privacy Friendly Apps - Making Developers Aware of Privacy Violations
In: 1st International Workshop on Innovations in Mobile Privacy and Security 2016 - London (04/2016)

Requirements for an Internet Proxy Voting System
In: 16th International E-Voting Phd Seminar - Tarragona (04/2016)

Analysis of the Liquid Democracy implementations
In: 15th International E-Voting Phd Seminar - Tallinn (03/2015)

Scientific services

External Reviewer: Financial Cryptography, 2nd Workshop on Advances in Secure Electronic Voting Schemes (VOTING'17)

External Reviewer: IEEE Transactions on Emerging Topics in Computing, Special Issue/Section on eGovernment Development and Applications (SIEGDA) (Third Issue 2018)

External Reviewer:  Jahrestagung des Fachbereichs Sicherheit – Schutz und Zuverlässigkeit der Gesellschaft für Informatik (SICHERHEIT 2018)

Program Committee: 6th Workshop on Interacting with Smart Objects (SmartObjects'18)

Teaching

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang