Karola Marky

Research Assistant

Technische Universität Darmstadt
Department of Computer Science
Building S4|14
Mornewegstr. 30
D-64293 Darmstadt
Germany

Room: 3.1.19
Tel: +49(0)6151/16-20810
Email: karola.marky(a-t)secuso.org

PGP-Key: Key
Fingerprint: B37C 17AC 462D 0261 92AA D058 5866 9970 0308 9EF7

Curriculum Vitae

Karola Marky is a research assistant in the SECUSO Research Group of Prof. Dr. Melanie Volkamer since July 2017. In the past she graduated from the TU Kaiserslautern with a Bachelor's degree in Applied Computer Science and has been at the National Institute of Informatics in Tokyo as Visiting Researcher. After that she graduated from TU Darmstadt with a Master's degree in Computer Science in June 2017. In her master studies she focussed on IT Security and had psychology as a minor. During her master studies Karola Marky has been student assistant in the SECUSO research group.

Research Projects

Research Interests

  • Remote Electronic Voting
  • Proxy Voting
  • Usable Security

Publications

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting [to appear]

Autor Karola Marky, Oksana Kulyk, Melanie Volkamer
Datum April 2018
Art Inproceedings
BuchtitelSICHERHEIT 2018
OrtKonstanz, Germany
KeywordsE-Voting, Cast-as-intended Verifiability, Usability Evaluation
SchlüsselTUD-CS-2018-0028
Forschungsgebiete SECUSO - Security, Usability and Society
Abstrakt Internet Voting promises benefits like the support for voters from abroad and an overall improved accessibility. But it is accompanied by security risks like the manipulation of votes by malware. Enabling the voters to verify that their voting device casts their intended votes is a possible solution to address such a manipulation - the so-called cast-as-intended verifiability. <br />Several different approaches for providing cast-as-intended verifiability have been proposed or put into practice. Each approach makes various assumptions about the voters' capabilities that are required in order to provide cast-as-intended verifiability. In this paper we investigate these assumptions of four chosen cast-as-intended approaches and report the impact if those are violated.<br />Our findings indicate that the assumptions of cast-as-intended approaches (e.g. voters being capable of comparing long strings) have an impact on the security of the Internet Voting systems. We discuss this impact and provide recommendations how to address the identified assumptions and give important directions in future research on usable and verifiable Internet Voting systems.
[Diesen Eintrag nach BibTeX exportieren]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Talks

Usability of End-to-End Verifiable E-Voting Schemes
In: PHD Colloquium of the 2nd International Joint Conference on Electronic Voting (E-VOTE-ID) - Bregenz (10/2017)

Human Factors and Awareness in IT Security
In: International IDEA Roundtable on Cybersecurity in Elections  - The Hague (06/2017)

Sicherheitsindikatoren in Browsern und Mobilgeräten
In: Safer Internet Day - Polizeipräsidium Mittelhessen - Gießen (02/2017)

Privacy Friendly Apps - Making Developers Aware of Privacy Violations
In: 1st International Workshop on Innovations in Mobile Privacy and Security 2016 - London (04/2016)

Requirements for an Internet Proxy Voting System
In: 16th International E-Voting Phd Seminar - Tarragona (04/2016)

Analysis of the Liquid Democracy implementations
In: 15th International E-Voting Phd Seminar - Tallinn (03/2015)

Scientific services

External Reviewer: Financial Cryptography, 2nd Workshop on Advances in Secure Electronic Voting Schemes (VOTING'17)

External Reviewer: IEEE Transactions on Emerging Topics in Computing, Special Issue/Section on eGovernment Development and Applications (SIEGDA) (Third Issue 2018)

External Reviewer:  Jahrestagung des Fachbereichs Sicherheit – Schutz und Zuverlässigkeit der Gesellschaft für Informatik (SICHERHEIT 2018)

Program Committee: 6th Workshop on Interacting with Smart Objects (SmartObjects'18)

Teaching

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang