Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Stephan
    Last name: Neumann
    DBLP: 21/10370
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 32  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Stephan Neumann, Manuel Noll, Melanie Volkamer.
    Election-Dependent Security Evaluation of Internet Voting Schemes.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-Resistant Proxy Voting.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer.
    Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer.
    Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini.
    SecIVo: a quantitative security evaluation framework for internet voting schemes.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Melanie Volkamer.
    POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer.
    Introducing Proxy Voting to Helios.
    11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015 2015 (0) 2015
    Conference paper
    Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle.
    Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
    Datenschutz und Datensicherheit 2015, Volume 39 (0) 2015
    Show item 1 to 10 of 32  

    Your query returned 32 matches in the database.