Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes

Type

Coercion resistant proxy voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
In: Computers & Security, Vol. 71, p. 88-99, November 2017
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0167404817301268]
[Article]

Advancing Trust Visualisations for Wider Applicability and User Acceptance

Oksana Kulyk, Benjamin Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), p. 562-569, August 2017
IEEE
[Online-Edition: http://ieeexplore.ieee.org/abstract/document/8029488/]
[Inproceedings]

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme

David Bernhard, Oksana Kulyk, Melanie Volkamer
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, p. 1-10, August 2017
ACM
[Online-Edition: https://dl.acm.org/citation.cfm?id=3098990]
[Inproceedings]

Reliable Behavioural Factors in the Information Security Context

Peter Mayer, Alexandra Kunz, Melanie Volkamer
In: International Conference on Availability, Reliability and Security, August 2017
[Online-Edition: https://dl.acm.org/citation.cfm?id=3098986]
[Inproceedings]

Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information

Oksana Kulyk, Benjamin Reinheimer, Melanie Volkamer
In: International Conference on Human-Computer Interaction (HCII), Vol. 10292, p. 675-690, July 2017
Springer
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-58460-7_46]
[Inproceedings]

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016

Peter Mayer, Jan Kirchner, Melanie Volkamer
In: Thirteenth Symposium on Usable Privacy and Security, July 2017
Usenix
[Online-Edition: https://www.usenix.org/conference/soups2017/technical-sessions/presentation/mayer]
[Inproceedings]

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer
In: IEEE Security & Privacy, Vol. 15, p. 24-29, June 2017
[Online-Edition: http://ieeexplore.ieee.org/abstract/document/7945211/]
[Article]

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks

Marco Ghiglieri, Melanie Volkamer, Karen Renaud
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vol. 10292, p. 656-674, May 2017
Springer International Publishing
[Online-Edition: http://2017.hci.international/]
[Inproceedings]

Election-Dependent Security Evaluation of Internet Voting Schemes

Stephan Neumann, Manuel Noll, Melanie Volkamer
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Vol. 502, p. 371-382, May 2017
Springer
[Online-Edition: http://ifipsec.org/2017/]
[Inproceedings]

Poster: Secure Storage of Masked Passwords

Peter Mayer, Melanie Volkamer
In: IEEE European Symposium on Security and Privacy Posters, April 2017
[Online-Edition: www.ieee-security.org/TC/EuroSP2017/posters/poster3.pdf]
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang