Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Melanie
    Last name: Volkamer
    DBLP: v/MelanieVolkamer
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 135  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Verena Zimmermann, Birgit Henhapl, Melanie Volkamer, Joachim Vogt 0002.
    Ende-zu-Ende sichere E-Mail-Kommunikation.
    Datenschutz und Datensicherheit 2017, Volume 41 (0) 2017
    Conference paper
    Stephan Neumann, Manuel Noll, Melanie Volkamer.
    Election-Dependent Security Evaluation of Internet Voting Schemes.
    ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings 2017 (0) 2017
    Conference paper
    David Bernhard, Oksana Kulyk, Melanie Volkamer.
    Security Proofs for Participation Privacy and Stronger Veri ability for Helios.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Melanie Volkamer, Karen Renaud, Benjamin Reinheimer.
    TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann.
    Teaching Phishing-Security: Which Way is Best?
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer.
    Coercion-Resistant Proxy Voting.
    ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jörn Müller-Quade.
    ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
    IEEE European Symposium on Security and Privacy, EuroSP 2016, Saarbrücken, Germany, March 21-24, 2016 2016 (0) 2016
    Conference paper
    Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer.
    Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Jurlind Budurushi, Annika Hilt, Melanie Volkamer.
    "E-Mail made in Germany".
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Melanie Volkamer.
    E-Mail-Sicherheit.
    Datenschutz und Datensicherheit 2015, Volume 40 (0) 2016
    Conference paper
    Andreas Gutmann, Melanie Volkamer, Karen Renaud.
    Memorable and Secure: How Do You Choose Your PIN?.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer.
    Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt 0002.
    Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea.
    Tenth International Symposium on Human Aspects of Information Security Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. 2016 (0) 2016
    Conference paper
    Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini.
    SecIVo: a quantitative security evaluation framework for internet voting schemes.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Jurlind Budurushi, Karen Renaud, Melanie Volkamer, Marcel Woide.
    An investigation into the usability of electronic voting systems for complex elections.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer.
    Privacy Friendly Apps - Making Developers Aware of Privacy Violations.
    Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016. 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Melanie Volkamer.
    Efficiency Comparison of Various Approaches in E-Voting Protocols.
    Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers 2016 (0) 2016
    Conference paper
    Peter Mayer, Stephan Neumann, Melanie Volkamer.
    POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer.
    Why don't UK citizens protest against privacy-invading dragnet surveillance?
    Inf. Comput. Security 2016, Volume 24 (0) 2016
    Conference paper
    Melanie Volkamer, Karen Renaud, Paul Gerber.
    Spot the phish by checking the pruned URL.
    Inf. Comput. Security 2016, Volume 24 (0) 2016
    Conference paper
    Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert.
    Nophish: evaluation of a web application that teaches people being aware of phishing attacks.
    Informatik 2016, 46. Jahrestagung der Gesellschaft für Informatik, 26.-30. September 2016, Klagenfurt, Österreich 2016 (0) 2016
    Conference paper
    Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer.
    Introducing Proxy Voting to Helios.
    11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 2016 (0) 2016
    Conference paper
    Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer.
    Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
    Mensch und Computer 2016 - Workshopband, Aachen, Germany, September 4-7, 2016 2016 (0) 2016
    Journal article
    Paul Gerber, Melanie Volkamer.
    Usability und Privacy im Android Ökosystem.
    Datenschutz und Datensicherheit 2015, Volume 39 (0) 2015
    Conference paper
    Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg.
    Learn to Spot Phishing URLs with the Android NoPhish App.
    Information Security Education Across the Curriculum - 9th IFIP WG 11.8 World Conference, WISE9, Hamburg, Germany, May 26-28, 2015, Proceedings 2015 (0) 2015
    Show item 1 to 25 of 135  

    Your query returned 135 matches in the database.