Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Melanie
    Last name: Volkamer
    DBLP: v/MelanieVolkamer
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 135  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Verena Zimmermann, Birgit Henhapl, Melanie Volkamer, Joachim Vogt 0002.
    Ende-zu-Ende sichere E-Mail-Kommunikation.
    Datenschutz und Datensicherheit 2017, Volume 41 (0) 2017
    Conference paper
    Stephan Neumann, Manuel Noll, Melanie Volkamer.
    Election-Dependent Security Evaluation of Internet Voting Schemes.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    David Bernhard, Oksana Kulyk, Melanie Volkamer.
    Security Proofs for Participation Privacy and Stronger Veri ability for Helios.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Melanie Volkamer, Karen Renaud, Benjamin Reinheimer.
    TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann.
    Teaching Phishing-Security: Which Way is Best?
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-Resistant Proxy Voting.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade.
    ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
    IEEE European Symposium on Security and Privacy, EuroSP 2016, Saarbrücken, Germany, March 21-24, 2016 2016 (0) 2016
    Conference paper
    Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer.
    Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Jurlind Budurushi, Annika Hilt, Melanie Volkamer.
    "E-Mail made in Germany".
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Melanie Volkamer.
    E-Mail-Sicherheit.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Andreas Gutmann, Melanie Volkamer, Karen Renaud.
    Memorable and Secure: How Do You Choose Your PIN?.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer.
    Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt 0002.
    Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini.
    SecIVo: a quantitative security evaluation framework for internet voting schemes.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide.
    An investigation into the usability of electronic voting systems for complex elections.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer.
    Privacy Friendly Apps - Making Developers Aware of Privacy Violations.
    Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016. 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Melanie Volkamer.
    Efficiency Comparison of Various Approaches in E-Voting Protocols.
    Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 2016 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Melanie Volkamer.
    POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer.
    Why don't UK citizens protest against privacy-invading dragnet surveillance?
    Inf. Comput. Security 2016, Volume 24 (0) 2016
    Conference paper
    Melanie Volkamer, Karen Renaud, Paul Gerber.
    Spot the phish by checking the pruned URL.
    Inf. Comput. Security 2016, Volume 24 (0) 2016
    Conference paper
    Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert.
    Nophish: evaluation of a web application that teaches people being aware of phishing attacks.
    Informatik 2016, 46. Jahrestagung der Gesellschaft für Informatik, 26.-30. September 2016, Klagenfurt, Österreich 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer.
    Introducing Proxy Voting to Helios.
    11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 2016 (0) 2016
    Conference paper
    Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer.
    Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
    Mensch und Computer 2016 - Workshopband, Aachen, Germany, September 4-7, 2016 2016 (0) 2016
    Journal article
    Paul Gerber, Melanie Volkamer.
    Usability und Privacy im Android Ökosystem.
    Datenschutz und Datensicherheit 2015, Volume 39 (0) 2015
    Conference paper
    Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg.
    Learn to Spot Phishing URLs with the Android NoPhish App.
    Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Oksana Kulyk, Vanessa Teague, Melanie Volkamer.
    Extending Helios Towards Private Eligibility Verifiability.
    E-Voting and Identity - 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Melanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun.
    Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
    Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz.
    A Socio-Technical Investigation into Smartphone Security.
    Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer.
    Über die Wirksamkeit von Anti-Phishing-Training.
    Mensch und Computer 2015 - Workshopband, Stuttgart, 6.-9. September 2015 2015 (0) 2015
    Conference paper
    Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen.
    Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
    10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015 2015 (0) 2015
    Conference paper
    Peter Mayer, Melanie Volkamer.
    Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
    Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015 2015 (0) 2015
    Conference paper
    Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle.
    Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
    Datenschutz und Datensicherheit 2015, Volume 39 (0) 2015
    Conference paper
    Karen Renaud, Melanie Volkamer.
    Exploring mental models underlying PIN management strategies.
    2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015 2015 (0) 2015
    Journal article
    Paul Gerber, Melanie Volkamer, Karen Renaud.
    Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
    SIGCAS Computers and Society 2015, Volume 45 (0) 2015
    Conference paper
    Johannes A. Buchmann, Stephan Neumann, Melanie Volkamer.
    Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
    Datenschutz und Datensicherheit 2014, Volume 38 (0) 2014
    Conference paper
    Katharina Bräunlich, Rüdiger Grimm, Melanie Volkamer.
    Praxis von Internetwahlen.
    Datenschutz und Datensicherheit 2014, Volume 38 (0) 2014
    Conference paper
    Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud.
    Building castles in quicksand: blueprint for a crowdsourced study.
    CHI Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts 2014 (0) 2014
    Conference paper
    Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer.
    Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
    Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich 2014 (0) 2014
    Conference paper
    Karen Renaud, Melanie Volkamer, Joseph Maguire.
    ACCESS: Describing and Contrasting - Authentication Mechanisms.
    Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt.
    Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
    Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Jurlind Budurushi, Simon Stockhardt, Marcel Woide, Melanie Volkamer.
    Paper Audit Trails and Voters' Privacy Concerns.
    Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos.
    Why Doesn't Jane Protect Her Privacy?
    Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud.
    Shake Hands to Bedevil: Securing Email with Wearable Technology.
    Eighth International Symposium on Human Aspects of Information Security Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Jurlind Budurushi, Roman Jöris, Melanie Volkamer.
    Implementing and evaluating a software-independent voting system for polling station elections.
    J. Inf. Sec. Appl. 2014, Volume 19 (0) 2014
    Conference paper
    Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer.
    Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
    Electronic Government and the Information Systems Perspective - Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza.
    NoPhish: An Anti-Phishing Education App.
    Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings 2014 (0) 2014
    Conference paper
    David Kelm, Melanie Volkamer.
    Towards a Social Engineering Test Framework.
    WOSIS 2014 - Proceedings of the 11th International Workshop on Security in Information Systems, Lisbon, Portugal, 27 April, 2014 2014 (0) 2014
    Conference paper
    Christian Feier, Stephan Neumann, Melanie Volkamer.
    Coercion-Resistant Internet Voting in Practice.
    44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland 2014 (0) 2014
    Conference paper
    Steffen Bartsch, Carina Boos, Gamze Canova, Dominic Dyck, Birgit Henhapl, Michael Schultheis, Melanie Volkamer.
    Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
    44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland 2014 (0) 2014
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer.
    Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
    44. Jahrestagung der Gesellschaft für Informatik, Informatik 2014, Big Data - Komplexität meistern, 22.-26. September 2014 in Stuttgart, Deutschland 2014 (0) 2014
    Conference paper
    Gamze Canova, Melanie Volkamer, Simon Weiler.
    POSTER: Password Entering and Transmission Security.
    Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 2014 (0) 2014
    Conference paper
    Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer.
    Developing and testing SCoP - a visual hash scheme.
    Inf. Manag. Comput. Security 2014, Volume 22 (0) 2014
    Conference paper
    Peter Mayer, Melanie Volkamer, Michaela Kauer.
    Authentication Schemes - Comparison and Effective Password Spaces.
    Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings 2014 (0) 2014
    Conference paper
    Oksana Kulyk, Stephan Neumann, Melanie Volkamer, Christian Feier, Thorben Koster.
    Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
    6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau / Bregenz, Austria, October 29-31, 2014 2014 (0) 2014
    Conference paper
    Jurlind Budurushi, Melanie Volkamer, Karen Renaud, Marcel Woide.
    Implementation and evaluation of the EasyVote tallying component and ballot.
    6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau / Bregenz, Austria, October 29-31, 2014 2014 (0) 2014
    Conference paper
    Fatemeh Shirazi, Melanie Volkamer.
    What Deters Jane from Preventing Identification and Tracking on the Web?
    Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014 2014 (0) 2014
    Conference paper
    Stephan Neumann, Oksana Kulyk, Melanie Volkamer.
    A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
    Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014 2014 (0) 2014
    Journal article
    Cristian Thiago Moecke, Melanie Volkamer.
    Usable secure email communications: criteria and evaluation of existing approaches.
    Inf. Manag. Comput. Security 2013, Volume 21 (0) 2013
    Conference paper
    Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak.
    Contextualized Web Warnings, and How They Cause Distrust.
    Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    David Bernhard, Stephan Neumann, Melanie Volkamer.
    Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Michaela Kauer, Sebastian Günther, Daniel Storck, Melanie Volkamer.
    A Comparison of American and German Folk Models of Home Computer Security.
    Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Maina M. Olembo, Steffen Bartsch, Melanie Volkamer.
    Mental Models of Verifiability in Voting.
    E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Jurlind Budurushi, Maria Henning, Melanie Volkamer.
    Vote Casting in Any Preferred Constituency: A New Voting Channel.
    E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    David Bernhard, Stephan Neumann, Melanie Volkamer.
    Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
    E-Voting and Identify - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo L. Jonker, Melanie Volkamer.
    Modeling the German Legal Latitude Principles.
    Electronic Participation - 5th IFIP WG 8.5 International Conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig.
    Towards A Practical JCJ / Civitas Implementation.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Melanie Volkamer, Steffen Bartsch, Michaela Kauer.
    Contextualized Security Interventions in Password Transmission Scenarios.
    European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer.
    Developing and Testing a Visual Hash Scheme.
    European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire.
    Are Graphical Authentication Mechanisms As Strong As Passwords?
    Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, Kraków, Poland, September 8-11, 2013. 2013 (0) 2013
    Conference paper
    Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig.
    Towards A Practical JCJ / Civitas Implementation.
    Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland 2013 (0) 2013
    Conference paper
    Kristoffer Braun, Jurlind Budurushi, Melanie Volkamer, Reto E. Koenig.
    Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4.
    Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland 2013 (0) 2013
    Conference paper
    Steffen Bartsch, Melanie Volkamer.
    Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
    Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz, Deutschland 2013 (0) 2013
    Conference paper
    Melanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer.
    Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany.
    Third Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013, New Orleans, LA, USA, June 29, 2013 2013 (0) 2013
    Conference paper
    Stephan Neumann, Melanie Volkamer.
    Formal Treatment of Distributed Trust in Electronic Voting.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Melanie Volkamer, Karen Renaud.
    Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
    Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday 2013 (0) 2013
    Conference paper
    Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel.
    Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
    IJISP 2013, Volume 7 (0) 2013
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer.
    Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
    2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 2013 (0) 2013
    Conference paper
    Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe.
    C4PS: colors for privacy settings.
    Proceedings of the 21st World Wide Web Conference, WWW 2012, Lyon, France, April 16-20, 2012 (Companion Volume) 2012 (0) 2012
    Conference paper
    Michaela Kauer, Thomas Pfeiffer, Melanie Volkamer, Heike Theuerling, Ralph Bruder.
    It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
    Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt 2012 (0) 2012
    Conference paper
    Manuel J. Kripp, Melanie Volkamer, Rüdiger Grimm.
    Overview.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Jurlind Budurushi, Stephan Neumann, Melanie Volkamer.
    Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Denise Demirel, Hugo L. Jonker, Melanie Volkamer.
    Random Block Verification: Improving the Norwegian Electoral Mix-Net.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Maina M. Olembo, Anna Kahlert, Stephan Neumann, Melanie Volkamer.
    Partial Verifiability in POLYAS for the GI Elections.
    5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria 2012 (0) 2012
    Conference paper
    Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe.
    C4PS - Helping Facebookers Manage Their Privacy Settings.
    Social Informatics - 4th International Conference, SocInfo 2012, Lausanne, Switzerland, December 5-7, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Denise Demirel, Melanie Volkamer, Hugo L. Jonker.
    Efficient Mix-Net Veri cation by Proofs of Random Blocks.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Michael Schläpfer, Melanie Volkamer.
    The secure platform problem taxonomy and analysis of existing proposals to address this problem.
    6th International Conference on Theory and Practice of Electronic Governance, ICEGOV '12, Albany, NY, USA, October 22-25, 2012 2012 (0) 2012
    Conference paper
    Martín A. Gagliotti Vigil, Cristian Thiago Moecke, Ricardo Felipe Custódio, Melanie Volkamer.
    The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents.
    Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers 2013 (0) 2012
    Conference paper
    Cristian Thiago Moecke, Melanie Volkamer.
    Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches.
    6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Stephan Neumann, Melanie Volkamer.
    Civitas and the Real World: Problems and Solutions from a Practical Point of View.
    Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012 2012 (0) 2012
    Conference paper
    Guido Schryen, Melanie Volkamer, Sebastian Ries, Sheikh Mahbub Habib.
    A formal approach towards measuring trust in distributed systems.
    Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011 2011 (0) 2011
    Conference paper
    Fateme Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer.
    Robust electronic voting: Introducing robustness in Civitas.
    2011 International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011, Trento, Italy, August 29, 2011 2011 (0) 2011
    Conference paper
    Richard Frankland, Denise Demirel, Jurlind Budurushi, Melanie Volkamer.
    Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
    2011 International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011, Trento, Italy, August 29, 2011 2011 (0) 2011
    Conference paper
    Melanie Volkamer, Jurlind Budurushi, Denise Demirel.
    Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
    2011 International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011, Trento, Italy, August 29, 2011 2011 (0) 2011
    Conference paper
    Maina M. Olembo, Patrick Schmidt, Melanie Volkamer.
    Introducing Verifiability in the POLYAS Remote Electronic Voting System.
    Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011 2011 (0) 2011
    Conference paper
    Melanie Volkamer, Oliver Spycher, Eric Dubuis.
    Measures to establish trust in internet voting.
    ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, Tallinn, Estonia, September 26-28, 2011 2011 (0) 2011
    Conference paper
    Oliver Spycher, Melanie Volkamer, Reto E. Koenig.
    Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
    E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Denise Demirel, Maria Henning, Peter Y. A. Ryan, Steve A. Schneider, Melanie Volkamer.
    Feasibility Analysis of Prêt à Voter for German Federal Elections.
    E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Fatih Karayumak, Michaela Kauer, Maina M. Olembo, Tobias Volk, Melanie Volkamer.
    User study of the improved Helios voting system interfaces.
    1st Workshop on Socio-Technical Aspects in Security and Trust, STAST 2011, Milan, Italy, September 8, 2011 2011 (0) 2011
    Conference paper
    Fatih Karayumak, Maina M. Olembo, Michaela Kauer, Melanie Volkamer.
    Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
    2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '11, San Francisco, CA, USA, August 8-9, 2011 2011 (0) 2011
    Show item 1 to 100 of 135  

    Your query returned 135 matches in the database.