Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes


Poster: Secure Storage of Masked Passwords

Peter Mayer, Melanie Volkamer
In: IEEE European Symposium on Security and Privacy Posters, April 2017

Enabling Vote Delegation in Boardroom Voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, p. 419-433, April 2017

User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn

Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Alexandra Kunz
In: Computers & Security, Vol. 71, p. 100-113, February 2017

Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen

Paul Gerber, Melanie Volkamer, Nina Gerber
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, p. 139-167, 2017
Springer Fachmedien Wiesbaden

Productivity vs. Security: Mitigating Conflicting Goals in Organizations

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt
In: Information and Computer Security, Vol. 25, p. 137-151, 2017

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions

Paul Gerber, Karen Renaud, Melanie Volkamer
In: Journal of Information Security and Applications, Vol. 34, p. 8-26, December 2016

Enabling Automatic Password Change in Password Managers Through Crowdsourcing

Peter Mayer, Hermann Berket, Melanie Volkamer
In: International Conference on Passwords, December 2016
Springer LNCS

Why don’t UK citizens protest against privacy-invading dragnet surveillance?

Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer
In: Information and Computer Security, Vol. 24, p. 400-415, October 2016

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Melanie Volkamer
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p. 1817--1819, October 2016
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang