Karola Marky

Research Assistant

Technische Universität Darmstadt
Department of Computer Science
Building S4|14
Mornewegstr. 30
D-64293 Darmstadt
Germany

Room: 3.1.19
Tel: +49(0)6151/16-20810
Email: karola.marky(a-t)secuso.org

PGP-Key: Key
Fingerprint: B37C 17AC 462D 0261 92AA D058 5866 9970 0308 9EF7

Curriculum Vitae

Karola Marky is a research assistant in the SECUSO Research Group of Prof. Dr. Melanie Volkamer since July 2017. In the past she graduated from the TU Kaiserslautern with a Bachelor's degree in Applied Computer Science and has been at the National Institute of Informatics in Tokyo as Visiting Researcher. After that she graduated from TU Darmstadt with a Master's degree in Computer Science in June 2017. In her master studies she focussed on IT Security and had psychology as a minor. During her master studies Karola Marky has been student assistant in the SECUSO research group.

Research Projects

Research Interests

  • Remote Electronic Voting
  • Proxy Voting
  • Usable Security

Publications

Coercion-resistant Proxy Voting

Autor Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
Datum Juni 2016
Art Inproceedings
HerausgeberSpringer
Buchtitel31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016
Seiten3-16
OrtGhent, Belgium
SchlüsselTUD-CS-2016-0055
Forschungsgebiete CASED, Theoretische Informatik - Kryptographie und Computeralgebra, Security, Usability and Society, Secure Data, CYSEC
Abstrakt In general, most elections follow the principle of equality, or as it came to be known, the principle of “one man – one vote”. However, this principle might pose difficulties for voters, who are not well informed regarding the particular matter that is voted on. In order to address this issue, a new form of voting has been proposed, namely proxy voting. In proxy voting, each voter has the possibility to delegate her voting right to another voter, so called proxy, that she considers a trusted expert on the matter. In this paper we propose an end-to-end verifiable Internet voting scheme, which to the best of our knowledge is the first scheme to address voter coercion in the proxy voting setting.
Webseite http://link.springer.com/chapter/10.1007/978-3-319-33630-5_1
Vollständiges Paper (pdf)
[Diesen Eintrag nach BibTeX exportieren]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Talks

Usability of End-to-End Verifiable E-Voting Schemes
In: PHD Colloquium of the 2nd International Joint Conference on Electronic Voting (E-VOTE-ID) - Bregenz (10/2017)

Human Factors and Awareness in IT Security
In: International IDEA Roundtable on Cybersecurity in Elections  - The Hague (06/2017)

Sicherheitsindikatoren in Browsern und Mobilgeräten
In: Safer Internet Day - Polizeipräsidium Mittelhessen - Gießen (02/2017)

Privacy Friendly Apps - Making Developers Aware of Privacy Violations
In: 1st International Workshop on Innovations in Mobile Privacy and Security 2016 - London (04/2016)

Requirements for an Internet Proxy Voting System
In: 16th International E-Voting Phd Seminar - Tarragona (04/2016)

Analysis of the Liquid Democracy implementations
In: 15th International E-Voting Phd Seminar - Tallinn (03/2015)

Scientific services

External Reviewer: Financial Cryptography, 2nd Workshop on Advances in Secure Electronic Voting Schemes (VOTING'17)

External Reviewer: IEEE Transactions on Emerging Topics in Computing, Special Issue/Section on eGovernment Development and Applications (SIEGDA) (Third Issue 2018)

External Reviewer:  Jahrestagung des Fachbereichs Sicherheit – Schutz und Zuverlässigkeit der Gesellschaft für Informatik (SICHERHEIT 2018)

Program Committee: 6th Workshop on Interacting with Smart Objects (SmartObjects'18)

Teaching

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang