Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Stephan
    Last name: Neumann
    DBLP: 21/10370
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 35 of 35  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Stephan Neumann, Manuel Noll, Melanie Volkamer.
    Election-Dependent Security Evaluation of Internet Voting Schemes.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer.
    Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
    IEEE Security Privacy 2017, Volume 15 (0) 2017
    Conference paper
    Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer.
    Don't Be Deceived: The Message Might Be Fake.
    Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings 2017 (0) 2017
    Journal article
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-resistant proxy voting.
    Computers Security 2017, Volume 71 (0) 2017
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-Resistant Proxy Voting.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer.
    Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer.
    Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini.
    SecIVo: a quantitative security evaluation framework for internet voting schemes.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Melanie Volkamer.
    POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer.
    Introducing Proxy Voting to Helios.
    11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015 2015 (0) 2015
    Conference paper
    Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle.
    Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
    Datenschutz und Datensicherheit 2015, Volume 39 (0) 2015
    Conference paper
    Johannes A. Buchmann, Stephan Neumann, Melanie Volkamer.
    Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
    Datenschutz und Datensicherheit 2014, Volume 38 (0) 2014
    Conference paper
    Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer.
    Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
    Electronic Government and the Information Systems Perspective - Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach.
    Pretty Understandable Democracy 2.0.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach.
    Pretty Understandable Democracy 2.0.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Christian Feier, Stephan Neumann, Melanie Volkamer.
    Coercion-Resistant Internet Voting in Practice.
    44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland 2014 (0) 2014
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer.
    Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
    44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland 2014 (0) 2014
    Conference paper
    Oksana Kulyk, Stephan Neumann, Melanie Volkamer, Christian Feier, Thorben Koster.
    Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
    6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau / Bregenz, Austria, October 29-31, 2014 2014 (0) 2014
    Conference paper
    Stephan Neumann, Oksana Kulyk, Melanie Volkamer.
    A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
    Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014 2014 (0) 2014
    Conference paper
    Andreas Braun 0001, Stephan Neumann, Sönke Schmidt, Reiner Wichert, Arjan Kuijper.
    Towards interactive car interiors: the active armrest.
    Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, Helsinki, Finland, October 26-30, 2014 2014 (0) 2014
    Conference paper
    David Bernhard, Stephan Neumann, Melanie Volkamer.
    Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    David Bernhard, Stephan Neumann, Melanie Volkamer.
    Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
    E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo L. Jonker, Melanie Volkamer.
    Modeling the German Legal Latitude Principles.
    Electronic Participation - 5th IFIP WG 8.5 International Conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig.
    Towards A Practical JCJ / Civitas Implementation.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Johannes Hoffmann, Stephan Neumann, Thorsten Holz.
    Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
    Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig.
    Towards A Practical JCJ / Civitas Implementation.
    Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland 2013 (0) 2013
    Conference paper
    Stephan Neumann, Melanie Volkamer.
    Formal Treatment of Distributed Trust in Electronic Voting.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel.
    Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
    IJISP 2013, Volume 7 (0) 2013
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer.
    Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
    2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 2013 (0) 2013
    Conference paper
    Stephan Neumann, Melanie Volkamer.
    Civitas and the Real World: Problems and Solutions from a Practical Point of View.
    Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012 2012 (0) 2012
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Melanie Volkamer.
    Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Maina M. Olembo, Anna Kahlert, Stephan Neumann, Melanie Volkamer.
    Partial Verifiability in POLYAS for the GI Elections.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Fateme Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer.
    Robust electronic voting: Introducing robustness in Civitas.
    2011 International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011, Trento, Italy, August 29, 2011 2011 (0) 2011
    Show item 1 to 35 of 35  

    Your query returned 35 matches in the database.