Papers and Articles published by Members of the SECUSO Research Group

  • Marco Ghiglieri, Melanie Volkamer, Karen Renaud: Exploring Consumers' Attitudes of Smart TV Related Privacy Risks   International Conference on Human-Computer Interaction,    July 2017
    [Article] URL BibTeX

  • Oksana Kulyk, Benjamin Reinheimer, Melanie Volkamer: Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information [to appear]   International Conference on Human-Computer Interaction,    July 2017
    [Inproceedings] BibTeX

  • Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Alexandra Kunz: User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn [to appear]   Computers & Security,    February 2017
    [Article] URL BibTeX

  • Silke Rehfeld, Melanie Volkamer, Stephan Neumann: Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug   Mittelstand 4.0 - Agentur Kommunikation,    January 2017
    [Article] URL BibTeX

  • Jurlind Budurushi, Melanie Volkamer, Oksana Kulyk, Stephan Neumann: Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?   IEEE Security & Privacy Special Issue on Electronic Voting,    2017
    [Article] URL BibTeX

  • Paul Gerber, Karen Renaud, Melanie Volkamer: The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions   Journal of Information Security and Applications,    December 2016
    [Article] URL BibTeX

  • Peter Mayer, Hermann Berket, Melanie Volkamer: Enabling Automatic Password Change in Password Managers Through Crowdsourcing   Passwords,    Springer LNCS December 2016
    [Inproceedings] BibTeX

  • Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer: Why don’t UK citizens protest against privacy-invading dragnet surveillance?   Information and Computer Security,    Vol. 24, p. 400-415, October 2016
    [Article] BibTeX

  • Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer: Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung   Mensch und Computer 2016 – Workshopbeiträge,    Gesellschaft für Informatik e.V. September 2016
    [Inproceedings] URL BibTeX

  • Melanie Volkamer, Karen Renaud, Paul Gerber: Spot the phish by checking the pruned URL   Information and Computer Security,    Vol. 24, p. 372-385, September 2016
    [Article] BibTeX

  • Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer: Introducing Proxy Voting to Helios   11th International Conference on Availability, Reliability and Security - ARES 2016,    IEEE p. 98 - 106, September 2016
    [Inproceedings] URL BibTeX

  • Andreas Gutmann, Melanie Volkamer, Karen Renaud: Memorable And Secure: How Do You Choose Your PIN?   International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016),    University of Plymouth p. 156-166, July 2016
    [Inproceedings] URL BibTeX

  • Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer: Supporting Decision Makers in Choosing Suitable Authentication Schemes   International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016),    University of Plymouth p. 67-77, July 2016
    [Inproceedings] URL PDF   BibTeX

  • Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt: Understanding information security compliance - Why goal setting and rewards might be a bad idea   International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016),    University of Plymouth Vol. 10., p. 145-155, July 2016
    [Inproceedings] URL BibTeX

  • Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert: NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks   Jahrestagung der Gesellschaft für Informatik,    Lecture Notes in Informatics (LNI) p. 509--518, July 2016
    [Inproceedings] URL PDF   BibTeX

  • Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer: Coercion-resistant Proxy Voting   31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016,    Springer p. 3-16, June 2016
    [Inproceedings] URL BibTeX

  • Melanie Volkamer, Karen Renaud, Benjamin Reinheimer: TORPEDO: TOoltip-poweRed Phishing Email DetectiOn   31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016,    Springer p. 161-175, June 2016
    [Inproceedings] URL BibTeX

  • Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann: Teaching Phishing-Security: Which Way is Best?   31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016,    Springer p. 135-149, June 2016
    [Inproceedings] URL BibTeX

  • Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini: SecIVo: a quantitative security evaluation framework for internet voting schemes   Annals of Telecommunications,    p. 1-16, June 2016
    [Article] URL BibTeX

  • David Bernhard, Oksana Kulyk, Melanie Volkamer: Security Proofs for Participation Privacy and Stronger Verifiability for Helios      May 2016
    [Misc] URL BibTeX

  • Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer: Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung   Datenschutz und Datensicherheit,    Vol. 5/2016, p. 295-299, May 2016
    [Inproceedings] URL BibTeX

  • Jurlind Budurushi, Annika Hilt, Melanie Volkamer: "E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern   Datenschutz und Datensicherheit,    Springer Fachmedien Wiesbaden Vol. 40, p. 300-304, May 2016
    [Article] URL BibTeX

  • Jurlind Budurushi, Karen Reanaud, Melanie Volkamer, Marcel Woide: An Investigation into the Usability of Electronic Voting Systems for Complex Elections   Journal of Annals of Telecommunications: The role of telecommunications in electronic voting,    Springer Paris Vol. 71, p. 309–322, April 2016
    [Article] URL BibTeX

  • Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer: Privacy Friendly Apps-Making Developers Aware of Privacy Violations   1st International Workshop on Innovations in Mobile Privacy and Security,    p. 46-48, April 2016
    [Inproceedings] URL BibTeX

  • Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade: ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology   2016 IEEE European Symposium on Security and Privacy (EuroS&P),    IEEE p. 357-371, March 2016
    [Inproceedings] URL PDF   BibTeX

  • Oksana Kulyk, Melanie Volkamer: Efficiency Comparison of Various Approaches in E-Voting Protocols   Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers,    Springer p. 209-233, February 2016
    [Inproceedings] URL BibTeX

  • Oksana Kulyk, Paul Gerber, Benjamin Reinheimer, Karen Renaud, Melanie Volkamer: Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do   Usable Security Workshop (USEC),    February 2016
    [Inproceedings] URL PDF   BibTeX

  • Peter Mayer, Stephan Neumann, Melanie Volkamer: POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes   Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,    ACM p. 1817--1819, 2016
    [Inproceedings] BibTeX

  • Stephan Neumann: Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements      2016
    [Phdthesis] PDF   BibTeX

  • Peter Mayer, Melanie Volkamer: Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing   Proceedings of the 31st Annual Computer Security Applications Conference,    ACM p. 431-440, December 2015
    [Inproceedings] URL BibTeX

  • Peter Wolf, Jordi Barrat, Eden Bolo, Alejandro Bravo, Robert Krimmer, Stephan Neumann, Al Parreño, Carsten Schürmann, Melanie Volkamer: Certification of ICTs in Elections      International IDEA Vol. 1, December 2015
    [Book] URL BibTeX

  • Karen Renaud, Stephen Flowerday, Lotfi Othmane, Dr Melanie Volkamer: "I Am Because We Are": Developing and Nurturing an African Digital Security Culture   African Cyber Citizenship Conference 2015,    November 2015
    [Inproceedings] PDF   BibTeX

  • Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle: Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem   Datenschutz und Datensicherheit,    Vol. 11/2015, p. 747-752, October 2015
    [Article] URL PDF   BibTeX

  • Oksana Kulyk, Vanessa Teague, Melanie Volkamer: Extending Helios Towards Private Eligibility Verifiability   E-Voting and Identity: 5th International Conference - VoteID 2015,    Springer p. 57-73, September 2015
    [Inproceedings] URL BibTeX

  • Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz: A Socio-Technical Investigation into Smartphone Security   Security and Trust Management: 11th International Workshop - STM 2015,    Springer p. 265-273, September 2015
    [Inproceedings] URL BibTeX

  • Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon Bergen: Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting   10th International Conference on Availability, Reliability and Security - ARES 2015,    IEEE p. 224-229, August 2015
    [Inproceedings] URL PDF   BibTeX

  • Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon Bergen: Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting      August 2015
    [Misc] URL PDF   BibTeX

  • Melanie Volkamer, Karen Renaud, Kristoffer Braun, Gamze Canova, Benjamin Reinheimer: Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness   TRUST 2015,    Springer p. 104-121, August 2015
    [Inproceedings] URL BibTeX

  • Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz: An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given)      August 2015
    [Techreport] PDF   BibTeX

  • Andreas Gutmann, Karen Renaud, Melanie Volkamer: Nudging Bank Account Holders Towards More Secure PIN Management   Journal of Internet Technology and Secured Transaction (JITST),    Vol. 4, p. 380 - 386, June 2015
    [Inproceedings] URL BibTeX

  • Kristoffer Braun, Philipp Rack: Shoulder-surfing resistente Authentisierung an mobilen Endgeräten   Risiken kennen, Herausforderungen annehmen, Lösungen gestalten,    SecuMedia Verlag Vol. 14, p. 45-56, May 2015
    [Thesis (Master, Bachelor, Diploma)] URL BibTeX

  • Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg: Learn To Spot Phishing URLs with the Android NoPhish App   Information Security Education Across the Curriculum - 9th (IFIP),    Springer p. 87-100, May 2015
    [Inproceedings] URL BibTeX

  • Gamze Canova, Melanie Volkamer, Clemens Bergmann, Benjamin Reinheimer: NoPhish App Evaluation: Lab and Retention Study   NDSS Workshop on Usable Security 2015,    February 2015
    [Inproceedings] URL PDF   BibTeX

  • Paul Gerber, Melanie Volkamer: Usability und Privacy im Android Ökosystem   Datenschutz und Datensicherheit,    Vol. 2/2015, p. 108 - 113, February 2015
    [Article] URL BibTeX

  • Paul Gerber, Melanie Volkamer, Karen Renaud: Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy   ACM SIGCAS Computers and Society,    Vol. 45, p. 16-21, February 2015
    [Article] URL BibTeX

  • Sönke Maseberg, Eric Bodden, Mehmet Kus, Achim Brucker, Siegfried Rasthofer, Bernhard Berger, Stephan Huber, Karsten Sohr, Paul Gerber, Melanie Volkamer: Zertifizierte Apps   Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015,    SecuMedia p. 505-516, January 2015
    [Inproceedings] URL BibTeX

  • Karen Renaud, Dr Melanie Volkamer: Exploring Mental Models Underlying PIN Management Strategies   World Congress on Internet Security (WorldCIS 2015),    IEEE p. 18-23, 2015
    [Inproceedings] PDF   BibTeX

  • Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer: Über die Wirksamkeit von Anti-Phishing-Training   Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015,    A. Weisbecker, M. Burmester & A. Schmidt p. 647-655, 2015
    [Inproceedings] URL PDF   BibTeX

  • Montathar Faraon, Georg Stenberg, Jurlind Budurushi, Mauri Kaipainen: Positive but skeptical - A study of attitudes towards Internet voting in Sweden   CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government,    Münster: Edition Donau-Universität Krems p. 191-205, December 2014
    [Inproceedings] URL PDF   BibTeX

  • Peter Mayer, Melanie Volkamer, Michaela Kauer: Authentication Schemes - Comparison and Effective Password Spaces   Information Systems Security,    Springer International Publishing Vol. 8880, p. 204--225, December 2014
    [Inproceedings] URL PDF   BibTeX

  • Fatemeh Shirazi, Melanie Volkamer: What Deters Jane from Preventing Identification and Tracking on the Web?   13th ACM Workshop on Privacy in the Electronic Society (WPES 2014),    ACM p. 107-116, November 2014
    [Inproceedings] URL BibTeX

  • Gamze Canova, Melanie Volkamer, Simon Weiler: Poster: Password Entering and Transmission Security      November 2014
    [Misc] URL BibTeX

  • Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach: Pretty Understandable Democracy 2.0   6th International Conference on Electronic Voting (EVOTE),    TUT Press p. 69 - 72, October 2014
    [Inproceedings] URL PDF   BibTeX

  • Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide: Implementation and Evaluation of the EasyVote Tallying Component and Ballot   6th International Conference on Electronic Voting (EVOTE),    IEEE p. 1 - 8, October 2014
    [Inproceedings] URL PDF   BibTeX

  • Oksana Kulyk, Christian Feier, Thorben Köster: Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design   6th International Conference on Electronic Voting - EVOTE 2014,    IEEE p. 1-10, October 2014
    [Inproceedings] URL PDF   BibTeX

  • Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza: NoPhish: An Anti-Phishing Education App   10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014,    Springer International Publishing Vol. 8743, p. 188-192, September 2014
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Maina Olembo, Karen Renaud, Melanie Volkamer: Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?   3rd International Conference on Electronic Government and the Information Systems Perspective,    Springer Vol. 8650, p. 246-260, September 2014
    [Inproceedings] URL BibTeX

  • Steffen Bartsch, Carina Boos, Gamze Canova, Dominic Dyck, Birgit Henhapl, Michael Schultheis, Melanie Volkamer: Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten   Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014,    Gesellschaft für Informatik p. 2069-2078, September 2014
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Oksana Kulyk, Melanie Volkamer: A Usable Android Application Implementing Distributed Cryptography For Election Authorities   9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014,    IEEE p. 198-207, September 2014
    [Inproceedings] URL PDF   BibTeX

  • Christian Feier, Stephan Neumann, Melanie Volkamer: Coercion-Resistant Internet Voting in Practice   INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik,    Köllen Druck+Verlag GmbH, Bonn Vol. 232, p. 1401-1414, September 2014
    [Inproceedings] URL PDF   BibTeX

  • Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer: Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail   INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik,    Köllen Druck+Verlag GmbH, Bonn Vol. 232, p. 1415-1426, September 2014
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Karen Renaud, Arne Renkema-Padmos: Why doesn't Jane protect her privacy?   Privacy Enhancing Technologies - 14th International Symposium, PETS,    p. 244-262, July 2014
    [Inproceedings] URL PDF   BibTeX

  • Arne Renkema-Padmos, Jerome Baum, Karen Renaud, Melanie Volkamer: Shake hands to bedevil: Securing email with wearable technology   Proceedings of the eighth international symposium on human aspects of information security and assurance,    July 2014
    [Inproceedings] URL PDF   BibTeX

  • Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt: Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention   16th International Conference on Human-Computer Interaction (HCII 2014),    Springer June 2014
    [Inproceedings] URL BibTeX

  • Jurlind Budurushi, Simon Stockhardt, Marcel Woide, Melanie Volkamer: Paper Audit Trails and Voters' Privacy Concerns   Human Aspects of Information Security, Privacy and Trust,    Springer International Publishing Switzerland Vol. 8533, p. 400-409, June 2014
    [Inproceedings] URL PDF   BibTeX

  • Karen Renaud, Melanie Volkamer, Joseph Maguire: ACCESS: Describing and Contrasting Authentication Mechanisms   Human Aspects of Information Security, Privacy, and Trust,    p. 183-194, June 2014
    [Inproceedings] URL BibTeX

  • Jurlind Budurushi, Melanie Volkamer: Feasibility Analysis of Various Electronic Voting Systems for Complex Elections   International Conference for E-Democracy and Open Government 2014,    Edition Donau-Universität Krems p. 141-152, May 2014
    [Inproceedings] PDF   BibTeX

  • Steffen Bartsch, Melanie Volkamer: Expert Knowledge for Contextualized Warnings      May 2014
    [Techreport] URL PDF   BibTeX

  • Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud: Building Castles in Quicksand: Blueprints of a Crowdsourced Study   Extended abstracts of the 32nd CHI conference on human factors in computing systems,    ACM Digital Library April 2014
    [Inproceedings] URL PDF   BibTeX

  • Jurlind Budurushi, Roman Jöris, Melanie Volkamer: Implementing and evaluating a software-independent voting system for polling station elections   Journal of Information Security and Applications,    Vol. 19, p. 1-10, April 2014
    [Article] URL PDF   BibTeX

  • Karsten Sohr, Steffen Bartsch, Melanie Volkamer, Bernhard Berger, Eric Bodden, Achim Brucker, Sönke Maseberg, Mehmet Kus, Jens Heider: Zertifizierte Datensicherheit für mobile Anwendungen   GI Sicherheit 2014,    Vol. 228, p. 283--291, March 2014
    [Inproceedings] URL PDF   BibTeX

  • Jurlind Budurushi, Marcel Woide, Melanie Volkamer: Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote   Workshop on Usable Security (USEC),    Internet Society February 2014
    [Inproceedings] URL PDF   BibTeX

  • Maina Olembo, Karen Renaud, Steffen Bartsch, Melanie Volkamer: Voter, What Message Will Motivate You to Verify Your Vote?   Workshop on Usable Security (USEC),    Internet Society February 2014
    [Inproceedings] URL PDF   BibTeX

  • Carina Boos, Steffen Bartsch, Melanie Volkamer: Rechtliche und technische Nutzerunterstützung bei der Button-Lösung   Computer und Recht,    p. 119-127, February 2014
    [Article] URL BibTeX

  • Steffen Bartsch, Carina Boos, Dominic Dyck, Christopher Schwarz, Heike Theuerling, Birgit Henhapl, Melanie Volkamer: Unterstützung für ein risikobewusstes Verhalten im Internet   Vielfalt der Informatik,    p. 168-171, February 2014
    [Inproceedings] URL BibTeX

  • Jurlind Budurushi Maria Henning, Melanie Volkamer: Öffentlichkeitsgrundsatz und Stimmzettelbelege      January 2014
    [Techreport] PDF   BibTeX

  • Stephan Neumann, Jurlind Budurushi, Melanie Volkamer: Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting   Design, Development, and Use of Secure Electronic Voting Systems,    IGI Global p. 27-61, 2014
    [InBook] URL PDF   BibTeX

  • Johannes Buchmann, Stephan Neumann, Melanie Volkamer : Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland   Datenschutz und Datensicherheit,    Springer Gabler Verlag Vol. 38, p. 98-102, 2014
    [Article] PDF   BibTeX

  • Maria Henning, Jurlind Budurushi, Melanie Volkamer: Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen   MultiMedia und Recht (MMR),    p. 154-158, 2014
    [Article] URL PDF   BibTeX

  • Stephan Neumann, Melanie Volkamer: A Holistic Framework for the Evaluation of Internet Voting Systems   Design, Development, and Use of Secure Electronic Voting Systems,    IGI Global p. 76-91, 2014
    [InBook] URL PDF   BibTeX

  • Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig: Towards A Practical JCJ / Civitas Implementation   In: Cryptology ePrint Archive: Report 2013/464, 2013.,    p. 804-818, December 2013
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig: Towards A Practical JCJ / Civitas Implementation   INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl,    p. 804-818, December 2013
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Karen Renaud: Mental Models – General Introduction and Review of Their Application to Human-Centred Security   Number Theory and Cryptography,    Springer Berlin Heidelberg Vol. 8260, p. 255-280, November 2013
    [InCollection] URL PDF   BibTeX

  • Andreas Gutmann, Kanta Matsuura: The use of linguistics in cryptography and its application to improve the HB protocol      October 2013
    [Misc] URL BibTeX

  • Steffen Bartsch, Melanie Volkamer: Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions   RiskKom-Workshop, INFORMATIK 2013,    Gesellschaft für Informatik p. 1971-1984, September 2013
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer: Modeling the German Legal Latitude Principles   5th International Conference on eParticipation (ePart 2013),    Springer Vol. 8075, p. 49-56, September 2013
    [Inproceedings] URL PDF   BibTeX

  • Karen Renaud, Peter Mayer, Melanie Volkamer, Joseph Maguire: Are Graphical Authentication Mechanisms As Strong As Passwords?   Federated Conference on Computer Science and Information Systems 2013,    p. 837-844, September 2013
    [Inproceedings] URL BibTeX

  • Jurlind Budurushi, Stephan Neumann, Maina Olembo, Melanie Volkamer: Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme   8th International Conference on Availability, Reliability and Security (AReS 2013),    IEEE p. 198-207, July 2013
    [Inproceedings] URL PDF   BibTeX

  • David Bernhard, Stephan Neumann, Melanie Volkamer: Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs   4th International Conference on e-Voting and Identity (VoteID13),    Springer Vol. 7985, p. 176 - 192, July 2013
    [Inproceedings] URL PDF   BibTeX

  • Jurlind Budurushi, Maria Henning, Melanie Volkamer: Vote Casting in Any Preferred Constituency: A New Voting Channel   4th International Conference on e-Voting and Identity (VoteID13),    Springer Vol. 7985, p. 61-75, July 2013
    [Inproceedings] URL PDF   BibTeX

  • Maina Olembo, Steffen Bartsch, Melanie Volkamer: Mental Models of Verifiability in Voting   4th International Conference on e-Voting and Identity (VoteID13),    Springer Vol. 7985, p. 142 - 155, July 2013
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch, Bernhard Berger, Michaela Bunke, Karsten Sohr: The Transitivity-of-Trust Problem in Android Application Interaction   8th International Conference on Availability, Reliability and Security (ARES 2013),    IEEE p. 291 - 296, July 2013
    [Inproceedings] URL PDF   BibTeX

  • Kristoffer Braun, Jurlind Budurushi, Melanie Volkamer: Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt   INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl,    p. 752 - 766, July 2013
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Oksana Kulyk, Lulzim Murati, Melanie Volkamer: Towards a Practical Mobile Application for Election Authorities (Demo)   4th International Conference on e-Voting and Identity (VoteID13),    July 2013
    [Inproceedings] PDF   BibTeX

  • Aysegül Nas, Atanas Filyanov, Melanie Volkamer, Marcel Winandy: Poster: On the Usability of Secure GUIs      July 2013
    [Misc] URL PDF   BibTeX

  • Erik Northrop, Heather Richter Lipford, Steffen Bartsch, Melanie Volkamer: Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor      July 2013
    [Misc] URL PDF   BibTeX

  • Melanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer: Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany   3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013,    IEEE Digital Library p. 46-52, June 2013
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Steffen Bartsch, Michaela Kauer: Contextualized Security Interventions in Password Transmission Scenarios   European Information Security Multi-Conference (EISMC 2013),    p. 12-22, May 2013
    [Inproceedings] URL PDF   BibTeX

  • Michaela Kauer, Sebastian Günther, Daniel Storck, Melanie Volkamer: A Comparison of American and German Folk Models of Home Computer Security   Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013,    Springer LNCS Vol. 8030, p. 100-109, March 2013
    [Inproceedings] URL PDF   BibTeX

  • Maina Olembo, Melanie Volkamer: E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria      IGI Global p. 172 - 201, February 2013
    [InBook] URL PDF   BibTeX

  • Stephan Neumann, Anna Kahlert, Maria Henning, Hugo Jonker, Melanie Volkamer: Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme   Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013),    p. 277-284, February 2013
    [Inproceedings] URL PDF   BibTeX

  • Cristian Thiago Moecke, Melanie Volkamer: Usable secure email communications: criteria and evaluation of existing approaches   Information Management & Computer Security,    Vol. 21, p. 41-52, January 2013
    [Article] URL PDF   BibTeX

  • Maina Olembo, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer: Developing and Testing a Visual Hash Scheme   European Information Security Multi-Conference (EISMC 2013),    p. 91-100, 2013
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak: Contextualized Web warnings, and how they cause distrust   Trust and Trustworthy Computing (TRUST 2013),    Springer p. 205-222, 2013
    [Inproceedings] URL PDF   BibTeX

  • Daniela Simić-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Rossnagel: Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA   International Journal of Information Security and Privacy (IJISP),    Vol. 7, p. 16-35, 2013
    [Article] URL PDF   BibTeX

  • Hannes Tschofenig, Melanie Volkamer, Nicola Jentzsch, Simone Fischer-Hübner, Stefan Schiffner, Rodica Tirtea: On the security, privacy and usability of online seals      2013
    [Techreport] URL PDF   BibTeX

  • Maina Olembo, Melanie Volkamer: Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria      October 2012
    [Techreport] URL PDF   BibTeX

  • Michael Schläpfer, Melanie Volkamer: The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem   Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance,    p. 410-418, October 2012
    [Inproceedings] URL PDF   BibTeX

  • Martín Vigil, Cristian Thiago Moecke, Ricardo Felipe Custódio, Melanie Volkamer: The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents   EuroPKI 2012, September 13-14,    Springer p. 85-97, September 2012
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch, Melanie Volkamer: Towards the Systematic Development of Contextualized Security Interventions   Designing Interactive Secure Systems (DISS), BCS HCI 2012,    September 2012
    [Inproceedings] URL PDF   BibTeX

  • Stephan Neumann, Melanie Volkamer: Civitas and the Real World: Problems and Solutions from a Practical Point of View   7th International Conference on Availability, Reliability and Security (ARES),    p. 180-185, August 2012
    [Inproceedings] URL PDF   BibTeX

  • Maina Olembo, Anna Kahlert, Stephan Neumann, Melanie Volkamer: Partial Verifiability in POLYAS for the GI Elections   5th International Conference on Electronic Voting 2012 (EVOTE2012),    Gesellschaft für Informatik Vol. 205, p. 95-109, July 2012
    [Inproceedings] URL PDF   BibTeX

  • Cristian Thiago Moecke, Melanie Volkamer: Usable Secure Email Communications - Criteria and evaluation of existing approaches   Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012),    p. 75-85, June 2012
    [Article] URL PDF   BibTeX

  • Stefan Katzenbeisser, Edgar Weippl, Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang: Trust and Trustworthy Computing      Springer June 2012
    [Book] URL BibTeX

  • Stephan Neumann, Melanie Volkamer: Formal Treatment of Distributed Trust in Electronic Voting   The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012),    Vol. ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, p. 30-39, May 2012
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch: Policy Override in Practice: Model, Evaluation, and Decision Support   Security and Communication Networks,    May 2012
    [Article] URL BibTeX

  • Steffen Bartsch, Angela Sasse: How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization      May 2012
    [Techreport] URL BibTeX

  • Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe: C4PS - Colors for Privacy Settings   Proceedings of the World Wide Web Conference (WWW),    p. 585-586, April 2012
    [Inproceedings] URL BibTeX

  • Michaela Kauer, Thomas Pfeiffer, Melanie Volkamer, Heike Theuerling, Ralph Bruder: It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately   Sicherheit,    GI Vol. 195, p. 187-198, March 2012
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch, Angela Sasse: Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support   Proceedings of the 27th Annual ACM Symposium on Applied Computing,    ACM p. 1502-1507, 2012
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Fatih Karayumak, Michaela Kauer, Dhanish Halim, Ralph Bruder: Security versus Trust Indicators in 2011 in Germany   Current Issues in IT Security 2012,    Duncker & Humblot Vol. I, p. 79-96, 2012
    [Inproceedings] URL PDF   BibTeX

  • Michaela Kauer, Florian Kiesel, Felix Ueberschaer, Melanie Volkamer, Ralph Bruder: The Influence of trustworthiness of website layout on security perception of websites   Current Issues in IT Security 2012,    Duncker & Humblot Vol. I, p. 215-220, 2012
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch, Karsten Sohr, Michaela Bunke, Oliver Hofrichter, Bernhard Berger: The Transitivity of Trust Problem in the Interaction of Android Applications      2012
    [Techreport] URL BibTeX

  • Steffen Bartsch: Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization      2012
    [Phdthesis] URL BibTeX

  • Steffen Bartsch, Angela Sasse: How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization   Proceedings of the 21st European Conference on Information Systems (ECIS 2013),    2012
    [Inproceedings] URL BibTeX

  • Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe: C4PS - Helping Facebookers Manage their Privacy Settings   Proceedings of SocInfo,    p. 188-201, 2012
    [Inproceedings] PDF   BibTeX

  • Maria Henning, Denise Demirel, Dr Melanie Volkamer: Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl   Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012),    p. 213-220, 2012
    [Inproceedings] URL PDF   BibTeX

  • Luigi LoN Iocano, Michaela Kauer, Dr Melanie Volkamer: Gebrauchstaugliche Nutzerauthentifizierung   digma, Zeitschrift für Datenrecht und Informationssicherheit,    Vol. 11, p. 172-175, December 2011
    [Article] BibTeX

  • Hendri Nogueira, Ricardo Felipe Custódio, Cristian Thiago Moecke, Michelle Wangham: Using Notary Based Public Key Infrastructure in Shibboleth Federation   Workshop de Gestão de Identidades - WGID/SBSeg,    p. 405-414, November 2011
    [Inproceedings] URL PDF   BibTeX

  • Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider: AmazonIA: When Elasticity Snaps Back   18th ACM Conference on Computer and Communications Security (CCS'11),    ACM p. 17-21, October 2011
    [Inproceedings] PDF   BibTeX

  • Peter Ryan Denise Demirel, Melanie Volkamer: Feasibility Analysis of Pret a Voter for German Federal Elections   3rd international conference on e-voting and identity (VoteID 2011),    Springer Vol. 7187 2012, p. 158-173, September 2011
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch: Exploring Twisted Paths: Analyzing Authorization Processes in Organizations   NSS '11: Proceedings of the 5th International Conference on Network and System Security,    IEEE Computer Society September 2011
    [Inproceedings] URL BibTeX

  • Fatemeh Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer: Robust Electronic Voting: Introducing robustness in Civitas   International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011 ,    p. 47 -55, August 2011
    [Inproceedings] URL PDF   BibTeX

  • Steffen Bartsch: Practitioners Perspectives on Security in Agile Development   FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security,    IEEE Computer Society p. 479 - 484, August 2011
    [Inproceedings] URL BibTeX

  • Richard Frankland, Denise Demirel, Jurlind Budurushi, Dr Melanie Volkamer: Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements   International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11),    IEEE p. 37-46, August 2011
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Jurlind Budurushi, Denise Demirel: Vote casting device with VV-SV-PAT for elections with complicated ballot papers   International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11),    IEEE p. 1-8, August 2011
    [Inproceedings] PDF   BibTeX

  • Denise Demirel, Richard Frankland, Melanie Volkamer: Readiness of various eVoting systems for complex elections      July 2011
    [Techreport] URL BibTeX

  • Denise Demirel, Richard Frankland, Darko Popovic, Dr Melanie Volkamer: Voting software to support election preparation, counting, and tallying   CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government,    Edition Donau-Universität Krems p. 287-300, May 2011
    [Inproceedings] PDF   BibTeX

  • Simone Fischer-Hübner, Rüdiger Grimm, Luigi Lo Iacono, Sebastian Möller, Günter Müller, Melanie Volkamer: Gebrauchstaugliche Informationssicherheit   Die Zeitschrift für Informationssicherheit - Usable Security and Privacy,    p. 14, April 2011
    [Article] URL BibTeX

  • Guido Schryen, Dr Melanie Volkamer, Sheikh Mahbub Habib, Sebastian Ries: A Formal Approach Towards Measuring Trust in Distributed Systems   Proceedings of the 2011 ACM Symposium on Applied Computing,    ACM p. 1739-1745, March 2011
    [Inproceedings] PDF   BibTeX

  • Steffen Bartsch: An Authorization Enforcement Usability Case Study   ESSoS 2011,    Springer February 2011
    [Inproceedings] URL BibTeX

  • Maina Olembo, Melanie Volkamer: Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms      January 2011
    [Techreport] URL PDF   BibTeX

  • Eric Dubuis, Oliver Spycher, Melanie Volkamer: Vertrauensbildung bei Internetwahlen   Digma - Zeitschrift für Datenrecht und Informationssicherheit,    p. 126-129, 2011
    [Inproceedings] BibTeX

  • Dr Melanie Volkamer, Oliver Spycher, Eric Dubuis: Measures to Establish Trust in Internet Voting   ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance,    ACM p. 1-10, 2011
    [Inproceedings] PDF   BibTeX

  • Fatih Karayumak, Michaela Kauer, Maina Olembo, Tobias Volk, Dr Melanie Volkamer: User Study of the Improved Helios Voting System Interface   1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2011,    IEEE Digital Library p. 37-44, 2011
    [Inproceedings] PDF   BibTeX

  • Fatih Karayumak, Maina Olembo, Michaela Kauer, Dr Melanie Volkamer: Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.   Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE),    USENIX Association p. 5, 2011
    [Inproceedings] URL PDF   BibTeX

  • Maina Olembo, Patrick Schmidt, Dr Melanie Volkamer: Introducing Verifiability in the POLYAS Remote Electronic Voting System.   Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011) ,    IEEE Computer Society p. 127 - 134, 2011
    [Inproceedings] URL PDF   BibTeX

  • Fatih Karayumak, Michaela Kauer, Maina Olembo, Dr Melanie Volkamer: Poster: Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System   SOUPS - Symposium On Usable Privacy and Security,    2011
    [Inproceedings] URL PDF   BibTeX

  • Oliver Spycher, Dr Melanie Volkamer, Reto Koenig: Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting   3rd international conference on e-voting and identity (VoteID 2011),    Springer p. 19-35, 2011
    [Inproceedings] PDF   BibTeX

  • Cristian Thiago Moecke, Ricardo Felipe Custódio, Jonathan Kohler, Marcelo Carlomagno Carlos: Uma ICP baseada em certificados digitais autoassinados   X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais,    p. 91-104, October 2010
    [Inproceedings] URL BibTeX

  • Steffen Bartsch: A calculus for the qualitative risk assessment of policy override authorization   SIN: Proceedings of the 3rd international conference on Security of information and networks,    ACM p. 62--70, September 2010
    [Inproceedings] URL BibTeX

  • Lucie Langer, Dr Melanie Volkamer, Axel Schmidt, Johannes Buchmann: A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept   Fifth International Conference on Availability, Reliability and Security (ARES 2010),    IEEE Computer Society p. 475-480, February 2010
    [Inproceedings] PDF   BibTeX

  • Steffen Bartsch: Supporting Authorization Policy Modification in Agile Development of {Web} Applications   SecSE: Fourth International Workshop on Secure Software Engineering,    IEEE Computer Society February 2010
    [Inproceedings] URL BibTeX

  • Philipp Richter, Lucie Langer, Katharina Hupf, Melanie Volkamer, Johannes Buchmann: Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen   Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010,    p. 61-72, February 2010
    [Inproceedings] URL PDF   BibTeX

  • Dr Melanie Volkamer, Guido Schryen: Measuring eTrust in distributed systems - General Concept and Application to Internet Voting   23rd Bled eConference, Bled, Slovenia, June 20-23,    2010
    [Inproceedings] URL BibTeX

  • Axel Schmidt, Dr Melanie Volkamer, Johannes Buchmann: An Evaluation and Certification Approach to Enable Voting Service Providers   Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria,    GI Vol. 167, p. 135-148, 2010
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer: Evaluierungsverfahren für Internetwahlsysteme   IT-Information Technology,    Vol. it 3/2010, p. 169-172, 2010
    [Article] BibTeX

  • Dr Melanie Volkamer: Data Protection in a Profiled World   Data Protection in a Profiled World,    Springer p. 177-190, 2010
    [InBook] BibTeX

  • Rojan Gharadaghy, Dr Melanie Volkamer: Verifiability in Electronic Voting - Explanations for Non Security Experts   Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria,    p. 151-162, 2010
    [Inproceedings] PDF   BibTeX

  • Rüdiger Grimm, Katharina Hupf, Dr Melanie Volkamer: A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting   Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria,    Vol. 167, p. 89-107, 2010
    [Inproceedings] PDF   BibTeX

  • Melanie Volkamer: Electronic Voting in Germany   Data Protection in a Pro led World,    p. 177-190, 2010
    [Inproceedings] URL BibTeX

  • Lucie Langer, Stefan Weber, Axel Schmidt, Johannes Buchmann, Melanie Volkamer: Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model   Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009),    ACM Press p. 203-210, November 2009
    [Inproceedings] URL PDF   BibTeX

  • Lucie Langer, Melanie Volkamer, Stefan Weber, Axel Schmidt, Johannes Buchmann: Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model   ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance,    Vol. 322, p. 203-210, November 2009
    [Inproceedings] URL PDF   BibTeX

  • Axel Schmidt, Dennis Heinson, Lucie Langer, Zoi Opitz-Talidou, Philipp Richter, Dr Melanie Volkamer, Johannes Buchmann: Developing a Legal Framework for Remote Electronic Voting   E-Voting and Identity, Second International Conference, VOTE-ID 2009,    Springer Vol. 5767, p. 92-105, September 2009
    [Inproceedings] PDF   BibTeX

  • Lucie Langer, Axel Schmidt, Johannes Buchmann, Dr Melanie Volkamer, Alexander Stolfik: Towards a Framework on the Security Requirements for Electronic Voting Protocols   First International Workshop on Requirements Engineering for E-Voting Systems,    p. 61-68, August 2009
    [Inproceedings] PDF   BibTeX

  • Axel Schmidt, Lucie Langer, Johannes Buchmann, Dr Melanie Volkamer: Specification of a Voting Service Provider   First International Workshop on Requirements Engineering for E-Voting Systems,    p. 9-18, August 2009
    [Inproceedings] PDF   BibTeX

  • Melanie Volkamer, Guido Schryen, Lucie Langer, Axel Schmidt, Johannes Buchmann: Elektronische Wahlen: Verifizierung vs. Zertifizierung   Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V.,    Vol. LNI, p. 1827-1836, August 2009
    [Inproceedings] URL PDF   BibTeX

  • Lucie Langer, Axel Schmidt, Melanie Volkamer, Johannes Buchmann: Classifying Privacy and Verifiability Requirements for Electronic Voting   Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI),    Vol. LNI, p. 1837-1846, August 2009
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Rüdiger Grimm: Determine the Resilience of Evaluated Internet Voting Systems   First International Workshop on Requirements Engineering for E-Voting Systems,    p. 47-54, 2009
    [Inproceedings] BibTeX

  • Dr Melanie Volkamer: Evaluation von Internetwahlsystemen   Ausgezeichnete Informatikdissertationen 2008,,    Gesellschaft für Informatik Vol. D-9, p. 301-310, 2009
    [Inproceedings] BibTeX

  • Lucie Langer, Axel Schmidt, Dr Melanie Volkamer: Verifizierbarkeit elektronischer Wahlen   eGovernment Review,    Vol. 4, 2009
    [Article] PDF   BibTeX

  • Axel Schmidt, Dr Melanie Volkamer, Lucie Langer, Johannes Buchmann: Towards the impact of the operational environment on the security of e-voting   Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI),    Gesellschaft für Informatik Vol. 154, p. 1814-1826, 2009
    [Inproceedings] PDF   BibTeX

  • Lucie Langer, Axel Schmidt, Dr Melanie Volkamer, Johannes Buchmann: Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen   Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich,    OCG Verlag p. 243-253, 2009
    [Inproceedings] PDF   BibTeX

  • Steffen Bartsch, Karsten Sohr, Carsten Bormann: Supporting Agile Development of Authorization Rules for SME Applications   TrustCol: 3rd International Workshop on Trusted Collaboration,    Springer p. 461-471, 2009
    [Inproceedings] URL BibTeX

  • Dr Melanie Volkamer: Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities      Springer 2009
    [Book] BibTeX

  • Rüdiger Grimm, Melanie Volkamer: Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme   GI Jahrestagung,    Vol. Band 1, p. 429-436, September 2008
    [Inproceedings] URL PDF   BibTeX

  • Rüdiger Grimm, Dr Melanie Volkamer: Development of a Formal IT-Security Model for Remote Electronic Voting Systems   Electronic Voting - 3rd International Conference,    Gesellschaft für Informatik Vol. 131, p. 185-196, August 2008
    [Inproceedings] PDF   BibTeX

  • Steffen Bartsch, Carsten Bormann: Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU   D.A.CH. Security 2008,    syssec Verlag 2008
    [Inproceedings] BibTeX

  • Kai-Oliver Detken, Stephan Gitz, Steffen Bartsch, Richard Sethmann: Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}   D.A.CH. Security 2008,    syssec Verlag 2008
    [Inproceedings] URL BibTeX

  • Rüdiger Krimm, Melanie Volkamer: Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme   Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008,    Boorberg Verlag p. 145-156, 2008
    [Inproceedings] PDF   BibTeX

  • Rüdiger Grimm, Melanie Volkamer: Trust Models for Remote Electronic Voting   Electronic Government 7th International Conference EGOV 2008,    Vol. 27, p. 197-204, 2008
    [Inproceedings] PDF   BibTeX

  • Melanie Volkamer Robert Krimmer, Dr Melanie Volkamer: Observing Threats to Voters Anonymity: Election Observation of Electronic Voting   E-Voting - Perspectives and Experiences,    2008
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Robert Krimmer: Requirements and Evaluation Techniques for Online-Voting   Electronic Government 6th International EGOV Conference,    Universitätsverlag Rudolf Trauner Vol. 24, p. 37-46, 2007
    [Inproceedings] PDF   BibTeX

  • Dirk Kutscher, Jorg Ott, Steffen Bartsch: Supporting network access and service location in dynamic environments   Campus-Wide Information Systems,    Vol. 24, p. 225--251, 2007
    [Article] URL BibTeX

  • Hugo Jonker, Dr Melanie Volkamer: Compliance of RIES to the proposed e-voting protection profile   Proceedings of the 1st international conference on E-voting and identity,    Springer-Verlag Vol. 4896, p. 50--61, 2007
    [Inproceedings] URL BibTeX

  • Robert Krimmer, Stefan Triessnig, Dr Melanie Volkamer: The Development of Remote E-Voting Around the World: A Review of Roads and Directions   E-Voting and Identity, First International Conference, VOTE-ID 2007,    Springer-Verlag Vol. 4896, p. 1-15, 2007
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Margaret McGaley: Requirements and Evaluation Procedures for eVoting   Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice,    IEEE Computer Society p. 895-902, 2007
    [Inproceedings] BibTeX

  • Dr Melanie Volkamer, Robert Krimmer, Rüdiger Grimm: Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile   Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich,    p. 115-126, 2007
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Harald Hauff: Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II)   Datenschutz und Datensicherheit,    Vol. 10, p. 766-768, 2007
    [Article] BibTeX

  • Dr Melanie Volkamer, Harald Hauff: Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I)   Datenschutz und Datensicherheit,    Vol. 9, p. 692-695, 2007
    [Article] BibTeX

  • Jörg Helbach, Melanie Volkamer Robert Krimmer, Anastasia Meletiadou, Nils Meissner, Dr Melanie Volkamer: Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen   Datenschutz und Datensicherheit,    Vol. 31, p. 434-440, 2007
    [Article] BibTeX

  • Melanie Volkamer, Robert Krimmer: Ver-/Misstrauen Schaffende Maßnahme beim e-Voting   Informatik 2006 - Informatik fur Menschen,    Vol. 93, p. 418-425, October 2006
    [Inproceedings] URL PDF   BibTeX

  • Dieter Hutter, Melanie Volkamer: Information Flow Control to Secure Dynamic Web Service Composition   Security in Pervasive Computing,    p. 196-210, April 2006
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Robert Krimmer: Overview Online-Wahlen   D-A-CH Security 2006,    p. 339-350, March 2006
    [Inproceedings] URL PDF   BibTeX

  • Dieter Hutter, Matthias Klusch, Melanie Volkamer: Information Flow Analysis Based Security Checking of Health Service Composition Plans   Proceedings of the ECEH'06,    Vol. 91, p. 59-70, January 2006
    [Inproceedings] URL PDF   BibTeX

  • Melanie Volkamer, Robert Krimmer: E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl      2006
    [Techreport] BibTeX

  • melanie volkamer, Robert Krimmer: Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen      2006
    [Techreport] URL BibTeX

  • Rüdiger Grimm, Dr Melanie Volkamer: Multiple Cast in Online Voting - Analyzing Chances   Electronic Voting 2006 - $2^{nd}$ International Conference,    Vol. 86, p. 97-106, 2006
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Ammar Alkassar, Ahmad-Reza Sadeghi, Stefan Schulz: Enabling the Application of Open Systems like PCs for Online Voting   Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},    2006
    [Inproceedings] BibTeX

  • Dr Melanie Volkamer, Robert Krimmer: Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols   Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice,    p. 340-347, 2006
    [Inproceedings] BibTeX

  • Dr Melanie Volkamer, Walter Reinhard, Roland Vogt: FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen   Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI),    Vol. 77, p. 159-170, 2006
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Roland Vogt: New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness   In Frontiers in Electronic Elections - FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf},    2006
    [Inproceedings] BibTeX

  • Rüdiger Grimm, Robert Krimmer, Nils Meißner, Kai Reinhard, Dr Melanie Volkamer, Marcel Weinand: Security Requirements for Non-political Internet Voting   Electronic Voting (EVOTE) 2006,    Vol. 86, p. 203-212, 2006
    [Inproceedings] PDF   BibTeX

  • Dr Melanie Volkamer, Melanie Volkamer Robert Krimmer: Die Online-Wahl auf dem Weg zum Durchbruch   Informatik Spektrum,    Vol. 29, p. 98-113, 2006
    [Article] PDF   BibTeX

  • Robert Krimmer, Melanie Volkamer: Bits or Paper? Comparing Remote Electronic Voting to Postal Voting   Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005,    Vol. 13, p. 225-232, 2005
    [Inproceedings] URL PDF   BibTeX

  • Robert Krimmer, Dr Melanie Volkamer: Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren   Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005,    p. 256-262, 2005
    [Inproceedings] PDF   BibTeX

  • Ammar Alkassar, Melanie Volkamer Robert Krimmer, Dr Melanie Volkamer: Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz   Datenschutz und Datensicherheit,    Vol. 8, p. 480-482, 2005
    [Article] PDF   BibTeX

  • Dr Melanie Volkamer, Dieter Hutter: From Legal Principles to an Internet Voting System   Electronic Voting in Europe - Technology, Law, Politics and Society,    Vol. 47, p. 111-120, 2004
    [Inproceedings] BibTeX

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang