Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes

Type

Advancing Trust Visualisations for Wider Applicability and User Acceptance

Oksana Kulyk, Benjamin Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), p. 562-569, August 2017
IEEE
[Online-Edition: http://ieeexplore.ieee.org/abstract/document/8029488/]
[Inproceedings]

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme

David Bernhard, Oksana Kulyk, Melanie Volkamer
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, p. 1-10, August 2017
ACM
[Online-Edition: https://dl.acm.org/citation.cfm?id=3098990]
[Inproceedings]

Reliable Behavioural Factors in the Information Security Context

Peter Mayer, Alexandra Kunz, Melanie Volkamer
In: International Conference on Availability, Reliability and Security, August 2017
[Online-Edition: https://dl.acm.org/citation.cfm?id=3098986]
[Inproceedings]

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks

Marco Ghiglieri, Melanie Volkamer, Karen Renaud
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Vol. 10292, p. 656-674, July 2017
Springer, Cham
[Online-Edition: http://2017.hci.international/]
[Inproceedings]

Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information

Oksana Kulyk, Benjamin Reinheimer, Melanie Volkamer
In: International Conference on Human-Computer Interaction (HCII), Vol. 10292, p. 675-690, July 2017
Springer
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-58460-7_46]
[Inproceedings]

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook

Nina Gerber, Paul Gerber, Maria Hernando
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Vol. 10292, p. 640-655, July 2017
Springer, Cham
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-58460-7_44]
[Inproceedings]

“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies

Verena Zimmermann, Nina Gerber
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Vol. 10292, p. 265-283, July 2017
Springer, Cham
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-58460-7_18]
[Inproceedings]

A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016

Peter Mayer, Jan Kirchner, Melanie Volkamer
In: Thirteenth Symposium on Usable Privacy and Security, July 2017
Usenix
[Online-Edition: https://www.usenix.org/conference/soups2017/technical-sessions/presentation/mayer]
[Inproceedings]

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer
In: IEEE Security & Privacy, Vol. 15, p. 24-29, June 2017
[Online-Edition: http://ieeexplore.ieee.org/abstract/document/7945211/]
[Article]

Election-Dependent Security Evaluation of Internet Voting Schemes

Stephan Neumann, Manuel Noll, Melanie Volkamer
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Vol. 502, p. 371-382, May 2017
Springer
[Online-Edition: http://ifipsec.org/2017/]
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang