Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes

Type

Spot the phish by checking the pruned URL

Melanie Volkamer, Karen Renaud, Paul Gerber
In: Information and Computer Security, Vol. 24, p. 372-385, September 2016
[Article]

Introducing Proxy Voting to Helios

Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, p. 98 - 106, September 2016
IEEE
[Online-Edition: http://ieeexplore.ieee.org/document/7784560/]
[Inproceedings]

Memorable And Secure: How Do You Choose Your PIN?

Andreas Gutmann, Melanie Volkamer, Karen Renaud
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p. 156-166, July 2016
University of Plymouth
[Online-Edition: http://haisa.org/]
[Inproceedings]

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p. 67-77, July 2016
University of Plymouth
[Online-Edition: http://haisa.org/?page=cfp]
[Inproceedings]

Understanding information security compliance - Why goal setting and rewards might be a bad idea

Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Vol. 10., p. 145-155, July 2016
University of Plymouth
[Online-Edition: http://haisa.org/?page=cfp]
[Inproceedings]

NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks

Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert
In: Jahrestagung der Gesellschaft für Informatik, p. 509--518, July 2016
Lecture Notes in Informatics (LNI)
[Online-Edition: http://www.informatik2016.de/1193.html]
[Inproceedings]

Coercion-resistant Proxy Voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p. 3-16, June 2016
Springer
[Online-Edition: http://link.springer.com/chapter/10.1007/978-3-319-33630-5_1]
[Inproceedings]

TORPEDO: TOoltip-poweRed Phishing Email DetectiOn

Melanie Volkamer, Karen Renaud, Benjamin Reinheimer
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p. 161-175, June 2016
Springer
[Online-Edition: http://ifipsec.org/2016/]
[Inproceedings]

Teaching Phishing-Security: Which Way is Best?

Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p. 135-149, June 2016
Springer
[Online-Edition: http://ifipsec.org/2016/]
[Inproceedings]

SecIVo: a quantitative security evaluation framework for internet voting schemes

Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini
In: Annals of Telecommunications, p. 1-16, June 2016
[Online-Edition: file:34874]
[Article]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang