Papers and Articles published by Members of the SECUSO Research Group

Additional Attributes


Security Proofs for Participation Privacy and Stronger Verifiability for Helios

David Bernhard, Oksana Kulyk, Melanie Volkamer
May 2016

Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung

Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer
In: Datenschutz und Datensicherheit, Vol. 5/2016, p. 295-299, May 2016

"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern

Jurlind Budurushi, Annika Hilt, Melanie Volkamer
In: Datenschutz und Datensicherheit, Vol. 40, p. 300-304, May 2016
Springer Fachmedien Wiesbaden

An Investigation into the Usability of Electronic Voting Systems for Complex Elections

Jurlind Budurushi, Karen Reanaud, Melanie Volkamer, Marcel Woide
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Vol. 71, p. 309–322, April 2016
Springer Paris
[Online-Edition: file:34884]

Privacy Friendly Apps-Making Developers Aware of Privacy Violations

Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer
In: 1st International Workshop on Innovations in Mobile Privacy and Security, Vol. 1575, p. 46-48, April 2016
CEUR Workshop Proceedings

ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology

Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), p. 357-371, March 2016

Efficiency Comparison of Various Approaches in E-Voting Protocols

Oksana Kulyk, Melanie Volkamer
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, p. 209-233, February 2016

Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do

Oksana Kulyk, Paul Gerber, Benjamin Reinheimer, Karen Renaud, Melanie Volkamer
In: NDSS Workshop on Usable Security (USEC), February 2016
Internet Society.

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing

Peter Mayer, Melanie Volkamer
In: Proceedings of the 31st Annual Computer Security Applications Conference, p. 431-440, December 2015
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang