Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes

Type

Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung

Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer
In: MuC-Workshop „Usable Security and Privacy“, September 2016
Gesellschaft für Informatik e.V.
[Online-Edition: http://dl.mensch-und-computer.de/bitstream/handle/123456789/5070/Reinheimer_Volkamer_2016.pdf?sequence=1]
[Inproceedings]

Let’s get physical: Lässt sich User Experience physiologisch erfassen?

Nina Kolb
In: Mensch und Computer 2016 - Tagungsband, September 2016
Gesellschaft für Informatik e.V.
[Online-Edition: http://dl.mensch-und-computer.de/handle/123456789/5000]
[Inproceedings]

Branchenreport UX/Usability 2016

Stefan Tretter, Sarah Diefenbach, Daniel Ullrich, Nina Gerber
In: Mensch und Computer 2016 - Usability Professionals, September 2016
Gesellschaft für Informatik e.V. und die German UPA e.V.
[Online-Edition: http://dl.mensch-und-computer.de/handle/123456789/5167]
[Inproceedings]

Spot the phish by checking the pruned URL

Melanie Volkamer, Karen Renaud, Paul Gerber
In: Information and Computer Security, Vol. 24, p. 372-385, September 2016
[Article]

Introducing Proxy Voting to Helios

Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, p. 98 - 106, September 2016
IEEE
[Online-Edition: http://ieeexplore.ieee.org/document/7784560/]
[Inproceedings]

Memorable And Secure: How Do You Choose Your PIN?

Andreas Gutmann, Melanie Volkamer, Karen Renaud
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p. 156-166, July 2016
University of Plymouth
[Online-Edition: https://www.cscan.org/default.asp?page=openaccess&eid=17&id=286]
[Inproceedings]

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), p. 67-77, July 2016
University of Plymouth
[Online-Edition: https://www.cscan.org/default.asp?page=openaccess&eid=17&id=291]
[Inproceedings]

Understanding information security compliance - Why goal setting and rewards might be a bad idea

Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Vol. 10., p. 145-155, July 2016
University of Plymouth
[Online-Edition: http://haisa.org/?page=cfp]
[Inproceedings]

NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks

Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert
In: Jahrestagung der Gesellschaft für Informatik, p. 509--518, July 2016
Lecture Notes in Informatics (LNI)
[Online-Edition: http://www.informatik2016.de/1193.html]
[Inproceedings]

Coercion-resistant Proxy Voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p. 3-16, June 2016
Springer
[Online-Edition: http://link.springer.com/chapter/10.1007/978-3-319-33630-5_1]
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang