Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Stephan
    Last name: Neumann
    DBLP: 21/10370
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 36  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Stephan Neumann, Manuel Noll, Melanie Volkamer.
    Election-Dependent Security Evaluation of Internet Voting Schemes.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer.
    Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
    IEEE Security Privacy 2017, Volume 15 (0) 2017
    Conference paper
    Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer.
    Don't Be Deceived: The Message Might Be Fake.
    Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings 2017 (0) 2017
    Journal article
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-resistant proxy voting.
    Computers Security 2017, Volume 71 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer.
    Enabling Vote Delegation for Boardroom Voting.
    Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers 2017 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-Resistant Proxy Voting.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer.
    Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer.
    Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini.
    SecIVo: a quantitative security evaluation framework for internet voting schemes.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Melanie Volkamer.
    POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Show item 1 to 10 of 36  

    Your query returned 36 matches in the database.