TU Darmstadt / ULB / TUbiblio

Items in division

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | Z
Number of items at this level: 259.

A

Alkassar, Ammar and Volkamer, Melanie :
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
In:
[Article] , (2007)

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie :
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8 pp. 480-482.
[Article] , (2005)

B

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Conference or Workshop Item] , (2017)

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Other] , (2016)

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie :
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5) pp. 300-304.
[Article] , (2016)

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel :
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7) 309–322.
[Article] , (2016)

Braun, Kristoffer and Rack, Philipp :
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag
[Master Thesis] , (2015)

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) :

Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
6th International Conference on Electronic Voting (EVOTE) IEEE
[Conference or Workshop Item] , (2014)

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Conference or Workshop Item] , (2014)

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) :

Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014 Gesellschaft für Informatik
[Conference or Workshop Item] , (2014)

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) :

Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS , 8533 . Springer International Publishing Switzerland
[Conference or Workshop Item] , (2014)

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) :

Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
International Conference for E-Democracy and Open Government 2014 Edition Donau-Universität Krems
[Conference or Workshop Item] , (2014)

Bartsch, Steffen and Volkamer, Melanie :
Expert Knowledge for Contextualized Warnings.

[Report] , (2014)

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie :
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2) pp. 1-10.
[Article] , (2014)

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie :
Unterstützung für ein risikobewusstes Verhalten im Internet.
Vielfalt der Informatik
[Conference or Workshop Item] , (2014)

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie :
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht (2) pp. 119-127.
[Article] , (2014)

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie :
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Workshop on Usable Security (USEC) Internet Society
[Conference or Workshop Item] , (2014)

Buchmann, Johannes and Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) pp. 98-102.
[Article] , (2014)

Bartsch, Steffen and Volkamer, Melanie :
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
RiskKom-Workshop, INFORMATIK 2013 Gesellschaft für Informatik
[Conference or Workshop Item] , (2013)

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Conference or Workshop Item] , (2013)

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) :

Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Conference or Workshop Item] , (2013)

Bartsch, Steffen and Berger, Bernhard and Bunke, Michaela and Sohr, Karsten
Pernul, Günther and Sandhu, Ravi (eds.) :

The Transitivity-of-Trust Problem in Android Application Interaction.
8th International Conference on Availability, Reliability and Security (ARES 2013) IEEE
[Conference or Workshop Item] , (2013)

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) :

Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science , 7985 . Springer
[Conference or Workshop Item] , (2013)

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[Conference or Workshop Item] , (2013)

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) :

Contextualized Web warnings, and how they cause distrust.
In: TRUST 2013, 17. - 19. Juni 2013, London, UK. Trust and Trustworthy Computing (TRUST 2013) Springer
[Conference or Workshop Item] , (2013)

Bartsch, Steffen and Volkamer, Melanie :
Towards the Systematic Development of Contextualized Security Interventions.
Designing Interactive Secure Systems (DISS), BCS HCI 2012
[Conference or Workshop Item] , (2012)

Bartsch, Steffen :
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
[Article] , (2012)

Bartsch, Steffen and Sasse, Angela :
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.

[Report] , (2012)

Bartsch, Steffen and Sohr, Karsten and Bunke, Michaela and Hofrichter, Oliver and Berger, Bernhard :
The Transitivity of Trust Problem in the Interaction of Android Applications.

[Report] , (2012)

Bartsch, Steffen :
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
[Ph.D. Thesis]

Bartsch, Steffen and Sasse, Angela :
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Conference or Workshop Item] , (2012)

Bartsch, Steffen and Sasse, Angela
Ossowski, Sascha and Lecca, Paola (eds.) :

Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12 . ACM
[Conference or Workshop Item] , (2012)

Bartsch, Steffen :
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
NSS '11: Proceedings of the 5th International Conference on Network and System Security IEEE Computer Society
[Conference or Workshop Item] , (2011)

Bartsch, Steffen :
Practitioners Perspectives on Security in Agile Development.
FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security IEEE Computer Society
[Conference or Workshop Item] , (2011)

Bartsch, Steffen :
An Authorization Enforcement Usability Case Study.
ESSoS 2011 Springer
[Conference or Workshop Item] , (2011)

Bartsch, Steffen :
A calculus for the qualitative risk assessment of policy override authorization.
SIN: Proceedings of the 3rd international conference on Security of information and networks ACM
[Conference or Workshop Item] , (2010)

Bartsch, Steffen :
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
SecSE: Fourth International Workshop on Secure Software Engineering IEEE Computer Society
[Conference or Workshop Item] , (2010)

Bartsch, Steffen and Sohr, Karsten and Bormann, Carsten :
Supporting Agile Development of Authorization Rules for SME Applications.
TrustCol: 3rd International Workshop on Trusted Collaboration Springer
[Conference or Workshop Item] , (2009)

Bartsch, Steffen and Bormann, Carsten
Horster, Patrick (ed.) :

Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
D.A.CH. Security 2008 syssec Verlag
[Conference or Workshop Item] , (2008)

C

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf :
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology . Springer
[Conference or Workshop Item] , (2015)

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin :
NoPhish App Evaluation: Lab and Retention Study.
NDSS Workshop on Usable Security 2015 Internet Society
[Conference or Workshop Item] , (2015)

Canova, Gamze and Volkamer, Melanie and Weiler, Simon :
Poster: Password Entering and Transmission Security.

[Other] , (2014)

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) :

NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science , 8743 . Springer International Publishing
[Conference or Workshop Item] , (2014)

D

Diefenbach, Sarah and Tretter, Stefan and Ullrich, Daniel and Kolb, Nina
Endmann, Anja and Fischer, Holger and Krökel, Malte (eds.) :

Branchenreport UX/Usability 2015.
Mensch und Computer 2015 – Usability Professionals De Gruyter Oldenbourg
[Conference or Workshop Item] , (2015)

Diefenbach, Sarah and Kolb, Nina and Hassenzahl, Marc :
The 'Hedonic' in Human-Computer Interaction – History, Contributions, and Future Research Directions.
Designing interactive systems ACM
[Conference or Workshop Item] , (2014)

Diefenbach, Sarah and Kolb, Nina and Ullrich, Daniel
Brau, Henning and Lehmann, Andreas and Petrovic, Kostanija and Schroeder, Daniel C. (eds.) :

Branchenreport UX/Usability 2013.
Tagungsband UP13 German UPA e.V.
[Conference or Workshop Item] , (2013)

Diefenbach, Sarah and Ullrich, Daniel and Kolb, Nina
Brau, Henning and Lehmann, Andreas and Petrovic, Kostanija and Schroeder, Nina C. (eds.) :

Branchenreport Usability 2012.
Usability Professionals 2012 German UPA e.V.
[Conference or Workshop Item] , (2012)

Demirel, Denise and Henning, Maria and Ryan, Peter Y. A. and Schneider, Steve and Volkamer, Melanie :
Feasibility Analysis of Pret a Voter for German Federal Elections.
3rd international conference on e-voting and identity (VoteID 2011) Springer
[Conference or Workshop Item] , (2011)

Demirel, Denise and Frankland, Richard and Volkamer, Melanie :
Readiness of various eVoting systems for complex elections.

[Report] , (2011)

Demirel, Denise and Frankland, Richard and Popovic, Darko and Volkamer, Melanie
Parycek, Peter and Kripp, Melanie J and Noella, Edelmann (eds.) :

Voting software to support election preparation, counting, and tallying.
CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government Edition Donau-Universität Krems
[Conference or Workshop Item] , (2011)

Dubuis, Eric and Spycher, Oliver and Volkamer, Melanie :
Vertrauensbildung bei Internetwahlen.
Digma - Zeitschrift für Datenrecht und Informationssicherheit
[Conference or Workshop Item] , (2011)

Detken, Kai-Oliver and Gitz, Stephan and Bartsch, Steffen and Sethmann, Richard
Horster, Patrick (ed.) :

Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
D.A.CH. Security 2008 syssec Verlag
[Conference or Workshop Item] , (2008)

F

Faraon, Montathar and Stenberg, Georg J. H. and Budurushi, Jurlind and Kaipainen, Mauri
Parycek, Peter and Sachs, Michael and Skoric, Marko (eds.) :

Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government Münster: Edition Donau-Universität Krems
[Conference or Workshop Item] , (2014)

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) :

Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Conference or Workshop Item] , (2014)

Frankland, Richard and Demirel, Denise and Budurushi, Jurlind and Volkamer, Melanie :
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11) IEEE
[Conference or Workshop Item] , (2011)

Fischer-Hübner, Simone and Grimm, Rüdiger and Lo Iacono, Luigi and Möller, Sebastian and Müller, Günter and Volkamer, Melanie :
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy p. 14.
[Article] , (2011)

G

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Book Section] , (2018)

Gerber, Nina and Gerber, Paul and Drews, Hannah and Kirchner, Elisa and Schlegel, Noah and Schmidt, Tim and Scholz, Lena :
FoxIT: Enhancing Mobile Users' Privacy Behavior by Increasing Knowledge and Awareness [to appear].
Workshop on Socio-Technical Aspects in Security and Trust ACM
[Conference or Workshop Item] , (2017)

Gerber, Nina and Zimmermann, Verena
Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa (eds.) :

Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Usable Security: Ziele der Usability und Security ausbalancieren (MuC Workshop) Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2017)

Gerber, Nina and Gerber, Paul and Hernando, Maria
Tryfonas, Theo (ed.) :

Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[Conference or Workshop Item] , (2017)

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen :
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust / 5th International Conference, HAS 2017, Held as Part of HCI International 2017 , 10292 Springer, Cham
[Conference or Workshop Item] , (2017)

Ghiglieri, Marco :
Smart TV Privacy Risks and Protection Measures.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6187]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2017)

Gerber, Paul and Volkamer, Melanie and Gerber, Nina :
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing Springer Fachmedien Wiesbaden
[Conference or Workshop Item] , (2017)

Gerber, Paul and Renaud, Karen and Volkamer, Melanie :
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1) pp. 8-26.
[Article] , (2016)

Ghiglieri, Marco and Stopczynski, Martin :
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE
[Conference or Workshop Item] , (2016)

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim :
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Conference or Workshop Item] , (2016)

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen :
Memorable And Secure: How Do You Choose Your PIN?
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Conference or Workshop Item] , (2016)

Ghiglieri, Marco and Waidner, Michael :
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, vol. 14, no. (IEEE 14/3) pp. 61-67.
[Article] , (2016)

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Conference or Workshop Item] , (2016)

Ghiglieri, Marco and Hansen, Marit and Nebel, Maxi and Pörschke, Julia Victoria and Fhom, Hervais Simo :
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.

[Report] , (2016)

Ghiglieri, Marco and Lange, Benjamin and Simo, Hervais and Waidner, Michael :
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken .
[Conference or Workshop Item] , (2015)

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie :
Nudging Bank Account Holders Towards More Secure PIN Management.
Journal of Internet Technology and Secured Transaction (JITST) Infonomics Society
[Conference or Workshop Item] , (2015)

Ghiglieri, Marco and Müller, Jan :
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
14. Deutscher IT-Sicherheitskongress
[Conference or Workshop Item] , (2015)

Ghiglieri, Marco and Oswald, Florian :
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
14. Deutscher IT-Sicherheitskongress
[Conference or Workshop Item] , (2015)

Gerber, Paul and Volkamer, Melanie and Renaud, Karen :
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1) pp. 16-21.
[Article] , (2015)

Gerber, Paul and Volkamer, Melanie :
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2/2015 108 - 113.
[Article] , (2015)

Ghiglieri, Marco :
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
IEEE CCNC
[Conference or Workshop Item] , (2015)

Ghiglieri, Marco
Schiele, Otto and Schön, Willi (eds.) :

HbbTV – aktueller Stand 2014.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Conference or Workshop Item] , (2014)

Ghiglieri, Marco :
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.

[Other] , (2014)

Ghiglieri, Marco :
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.

[Report] , (2014)

Ghiglieri, Marco and Stopczynski, Martin and Waidner, Michael :
Personal DLP for Facebook.
In: 6 . IEEE
[Conference or Workshop Item] , (2014)

Ghiglieri, Marco and Tews, Erik :
A Privacy Protection System for HbbTV in Smart TVs.
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) IEEE
[Conference or Workshop Item] , (2014)

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) :

HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Conference or Workshop Item] , (2013)

Gutmann, Andreas and Matsuura, Kanta :
The use of linguistics in cryptography and its application to improve the HB protocol.

[Other] , (2013)

Ghiglieri, Marco and Oswald, Florian and Tews, Erik :
HbbTV - I Know What You Are Watching.
13. Deutschen IT-Sicherheitskongresses SecuMedia Verlags-GmbH
[Conference or Workshop Item] , (2013)

Ghiglieri, Marco and Kalabis, Lukas and Kelm, David :
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
13. Deutschen IT-Sicherheitskongress SecuMedia Verlags-GmbH
[Conference or Workshop Item] , (2013)

Ghiglieri, Marco and Simo, Hervais and Waidner, Michael :
Technical Aspects of Online Privacy.

[Report] , (2012)

Grimm, Rüdiger and Hupf, Katharina and Volkamer, Melanie
Krimmer, Robert and Grimm, Rüdiger (eds.) :

A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI , 167 .
[Conference or Workshop Item] , (2010)

Gharadaghy, Rojan and Volkamer, Melanie :
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI (167).
[Conference or Workshop Item] , (2010)

Ghiglieri, Marco and Fürnkranz, Johannes :
Learning to Recognize Missing E-mail Attachments.
In: Applied Artificial Intelligence, 24 (5) pp. 443-462.
[Article] , (2010)

Ghiglieri, Marco and Fürnkranz, Johannes :
Learning To Recognize Missing E-mail Attachments.

[Report] , (2009)

Ghiglieri, Marco and Fürnkranz, Johannes :
Learning To Recognize Missing E-mail Attachments.
[Online-Edition: http://www.ke.informatik.tu-darmstadt.de/publications/report...]

[Report] , (2009)

Ghiglieri, Marco :
Thunderbird-Plugin zur Attachment-Prüfung.
[Online-Edition: http://www.ke.informatik.tu-darmstadt.de/lehre/arbeiten/mast...]
TU Darmstadt
[Master Thesis] , (2009)

Grimm, Rüdiger and Volkamer, Melanie
Hegering, Heinz-Gerd and Lehmann, Axel and Ohlbach, Hans Jürgen and Scheideler, Christian (eds.) :

Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
GI Jahrestagung
[Conference or Workshop Item] , (2008)

Grimm, Rüdiger and Volkamer, Melanie :
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI , 131 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2008)

Grimm, Rüdiger and Volkamer, Melanie
Ferro, Enrico and Scholl, Jochen and Wimmer, Maria (eds.) :

Trust Models for Remote Electronic Voting.
Electronic Government 7th International Conference EGOV 2008
[Conference or Workshop Item] , (2008)

Grimm, Rüdiger and Volkamer, Melanie :
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.

[Report] , (2007)

Ghiglieri, Marco :
Flexible - Eine erweiterbare {GUI} für den FlexiProvider (Frontend).
Technische Universität Darmstadt
[Master Thesis] , (2007)

Grimm, Rüdiger and Krimmer, Robert and Meißner, Nils and Reinhard, Kai and Volkamer, Melanie and Weinand, Marcel
Krimmer, Robert (ed.)
LNI, GI (eds.) :

Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006. Gesellschaft für Informatik, Bonn , pp. 203-212. ISBN 978-3-88579-180-5
[Book Section] , (2006)

Grimm, Rüdiger and Volkamer, Melanie
Krimmer, Robert (ed.) :

Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI , 86 .
[Conference or Workshop Item] , (2006)

H

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie :
Öffentlichkeitsgrundsatz und Stimmzettelbelege.

[Report] , (2014)

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie :
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR) pp. 154-158.
[Article] , (2014)

Henning, Maria and Demirel, Denise and Volkamer, Melanie :
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012)
[Conference or Workshop Item] , (2012)

Helbach, Jörg and Krimmer, Robert and Meletiadou, Anastasia and Meissner, Nils and Volkamer, Melanie :
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6) pp. 434-440.
[Article] , (2007)

Hutter, Dieter and Volkamer, Melanie
Clark, John and Paige, Richard and Polack, Fiona and Brooke, Phillip (eds.) :

Information Flow Control to Secure Dynamic Web Service Composition.
Security in Pervasive Computing
[Conference or Workshop Item] , (2006)

Hutter, Dieter and Klusch, Matthias and Volkamer, Melanie
Stormer, Henrik and Meier, Andreas and Schumacher, Michael (eds.) :

Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Proceedings of the ECEH'06
[Conference or Workshop Item] , (2006)

J

Jonker, Hugo and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) :

Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[Conference or Workshop Item] , (2007)

K

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 pp. 88-99.
[Article] , (2017)

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[Conference or Workshop Item] , (2017)

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[Conference or Workshop Item] , (2017)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) pp. 24-29.
[Article] , (2017)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Conference or Workshop Item] , (2017)

Kolb, Nina
Prinz, Wolfgang and Borchers, Jan and Jarke, Matthias (eds.) :

Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Mensch und Computer 2016 - Tagungsband Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Conference or Workshop Item] , (2016)

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric :
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Jahrestagung der Gesellschaft für Informatik Lecture Notes in Informatics (LNI)
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[Conference or Workshop Item] , (2016)

Kolb, Nina and Diefenbach, Sarah and Niklas, Susanne
Endmann, Anja and Fischer, Holger and Krökel, Malte (eds.) :

3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
Mensch und Computer 2015 – Usability Professionals De Gruyter Oldenbourg
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) :

Extending Helios Towards Private Eligibility Verifiability.
E-Voting and Identity: 5th International Conference - VoteID 2015 Springer
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Other] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Feier, Christian and Köster, Thorben :
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
6th International Conference on Electronic Voting - EVOTE 2014 IEEE
[Conference or Workshop Item] , (2014)

Kolb, Nina and Bartsch, Steffen and Volkamer, Melanie and Vogt, Joachim :
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science Springer, Cham
[Conference or Workshop Item] , (2014)

Kolb, Nina and Diefenbach, Sarah and Ullrich, Daniel :
Berichte aus der Usability/UX Branche: Ausbildungswege, Arbeitsfeld und aktuelle Diskussionen.
In: i-com Zeitschrift für interaktive und kooperative Medien, 13 (1)
[Article] , (2014)

Kauer, Michaela and Günther, Sebastian and Storck, Daniel and Volkamer, Melanie
Marinos, Louis and Askoxylakis, Ioannis (eds.) :

A Comparison of American and German Folk Models of Home Computer Security.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11]
In: First International Conference, HAS 2013, Held as Part of HCI International 2013, 21.07.2013 - 26.07.2013, Las Vegas, USA. In: Lecture Notes in Computer Science , 8030 . Springer
[Conference or Workshop Item] , (2013)

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Book] , (2012)

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) :

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI , 195 . GI
[Conference or Workshop Item] , (2012)

Kauer, Michaela and Kiesel, Florian and Ueberschaer, Felix and Volkamer, Melanie and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (ed.) :

The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie. Duncker & Humblot, Berlin , pp. 215-220. ISBN 978-3-428-13887-6 ISSN 978-3-428-13887-6
[Book Section] , (2012)

Krimmer, Robert and Volkamer, Melanie :
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.

[Report] , (2008)

Krimmer, Robert and Volkamer, Melanie
Krishna, Jaya and Agarwal, Naveen Kumar (eds.) :

Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press .
[Conference or Workshop Item] , (2008)

Krimm, Rüdiger and Volkamer, Melanie :
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008 Boorberg Verlag
[Conference or Workshop Item] , (2008)

Kutscher, Dirk and Ott, Jörg and Bartsch, Steffen :
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4) p. 225.
[Article] , (2007)

Krimmer, Robert and Triessnig, Stefan and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) :

The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07 , 4896 . Springer-Verlag
[Conference or Workshop Item] , (2007)

Krimmer, Robert and Volkamer, Melanie
Schweighöfer, Erich and Liebwald, Doris and Augeneder, Silvia and Menzel, Thomas (eds.) :

Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag .
[Conference or Workshop Item] , (2005)

Krimmer, Robert and Volkamer, Melanie :
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005
[Conference or Workshop Item] , (2005)

L

Langer, Lucie and Volkamer, Melanie and Schmidt, Axel and Buchmann, Johannes :
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Fifth International Conference on Availability, Reliability and Security (ARES 2010) IEEE Computer Society
[Conference or Workshop Item] , (2010)

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie :
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009) ACM Press
[Conference or Workshop Item] , (2009)

Langer, Lucie and Volkamer, Melanie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes
Davies, Jim and Janowski, Tomasz (eds.) :

Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance
[Conference or Workshop Item] , (2009)

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander :
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9 .
[Conference or Workshop Item] , (2009)

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) :

Classifying Privacy and Verifiability Requirements for Electronic Voting.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
[Conference or Workshop Item] , (2009)

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie :
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
[Article] , (2009)

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Prosser, Alexander and Parycek, Peter (eds.) :

Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich OCG Verlag
[Conference or Workshop Item] , (2009)

M

Marky, Karola and Kulyk, Oksana and Renaud, Karen and Volkamer, Melanie :
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750]
In: Conference on Human Factors in Computing Systems (CHI '18) ACM
[Conference or Workshop Item] , (2018)

Marky, Karola and Kulyk, Oksana and Volkamer, Melanie
Langweg, Hanno and Meier, Michael and Witt, Bernhard C. and Reinhardt, Delphine (eds.) :

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/16280]
SICHERHEIT 2018 Gesellschaft für Informatik e.V. , Bonn
[Conference or Workshop Item] , (2018)

Mayer, Peter and Volkamer, Melanie :
Addressing Misconceptions About Password Security Effectively [to appear].
Workshop on Socio-Technical Aspects in Security and Trust ACM
[Conference or Workshop Item] , (2017)

Mayer, Peter and Kunz, Alexandra and Volkamer, Melanie :
Analysis of the Security and Memorability of the Password Card.
ACSAC 2017 Posters
[Conference or Workshop Item] , (2017)

Mayer, Peter and Kunz, Alexandra and Volkamer, Melanie :
Reliable Behavioural Factors in the Information Security Context.
International Conference on Availability, Reliability and Security
[Conference or Workshop Item] , (2017)

Mayer, Peter and Volkamer, Melanie :
Poster: Secure Storage of Masked Passwords.
IEEE European Symposium on Security and Privacy Posters
[Conference or Workshop Item] , (2017)

Mayer, Peter and Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim :
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2) pp. 137-151.
[Article] , (2017)

Mayer, Peter and Berket, Hermann and Volkamer, Melanie :
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
International Conference on Passwords Springer LNCS
[Conference or Workshop Item] , (2016)

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16 . ACM
[Conference or Workshop Item] , (2016)

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie :
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Conference or Workshop Item] , (2016)

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie :
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1st International Workshop on Innovations in Mobile Privacy and Security CEUR Workshop Proceedings
[Conference or Workshop Item] , (2016)

Mayer, Peter and Volkamer, Melanie :
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015 . ACM
[Conference or Workshop Item] , (2015)

Maseberg, Sönke and Bodden, Eric and Kus, Mehmet and Brucker, Achim and Rasthofer, Siegfried and Berger, Bernhard and Huber, Stephan and Sohr, Karsten and Gerber, Paul and Volkamer, Melanie :
Zertifizierte Apps.
Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015 SecuMedia
[Conference or Workshop Item] , (2015)

Mayer, Peter and Volkamer, Melanie and Kauer, Michaela
Prakash, Atul and Shyamasundar, Rudrapatna (eds.) :

Authentication Schemes - Comparison and Effective Password Spaces.
In: International Conference on Information Systems Security (ICISS), 16-20.12.2014, Hyderabad, India. In: Lecture notes in computer science , 8880 . Springer International Publishing , Berlin, Cham
[Conference or Workshop Item] , (2014)

Moecke, Cristian Thiago and Volkamer, Melanie :
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21 pp. 41-52.
[Article] , (2013)

Moecke, Cristian Thiago and Volkamer, Melanie :
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security pp. 75-85.
[Article] , (2012)

Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Kohler, Jonathan and Carlos, Marcelo Carlomagno :
Uma ICP baseada em certificados digitais autoassinados.
X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais
[Conference or Workshop Item] , (2010)

N

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie :
Election-Dependent Security Evaluation of Internet Voting Schemes.
ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology Springer
[Conference or Workshop Item] , (2017)

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco :
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications pp. 1-16.
[Article] , (2016)

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim :
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 11/2015 pp. 747-752.
[Article] , (2015)

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian :
Pretty Understandable Democracy 2.0.
6th International Conference on Electronic Voting (EVOTE) TUT Press
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie :
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014 IEEE
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) :

A Holistic Framework for the Evaluation of Internet Voting Systems.
In: UNSPECIFIED Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 76-91.
[Book Section] , (2014)

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) :

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: UNSPECIFIED Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 27-61.
[Book Section] , (2014)

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto :
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive: Report 2013/464, 2013.
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto
Horbach, Matthias (ed.) :

Towards A Practical JCJ / Civitas Implementation.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) :

Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science , 8075 . Springer
[Conference or Workshop Item] , (2013)

Northrop, Erik and Lipford, Heather Richter and Bartsch, Steffen and Volkamer, Melanie :
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.

[Other] , (2013)

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel :
Poster: On the Usability of Secure GUIs.

[Other] , (2013)

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie :
Towards a Practical Mobile Application for Election Authorities (Demo).
4th International Conference on e-Voting and Identity (VoteID13)
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie :
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013)
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Volkamer, Melanie :
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
7th International Conference on Availability, Reliability and Security (ARES) IEEE
[Conference or Workshop Item] , (2012)

Neumann, Stephan and Volkamer, Melanie :
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012) , ICIMP 2012, The Seventh I ThinkMind Digital Library
[Conference or Workshop Item] , (2012)

Nogueira, Hendri and Custódio, Ricardo Felipe and Moecke, Cristian Thiago and Wangham, Michelle :
Using Notary Based Public Key Infrastructure in Shibboleth Federation.
Workshop de Gestão de Identidades - WGID/SBSeg
[Conference or Workshop Item] , (2011)

O

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie :
Voter, What Message Will Motivate You to Verify Your Vote?
Workshop on Usable Security (USEC) Internet Society
[Conference or Workshop Item] , (2014)

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) :

Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science , 7985 . Springer
[Conference or Workshop Item] , (2013)

Olembo, Maina and Volkamer, Melanie
Saeed, Saqib and Reddick, Christopher (eds.) :

E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
In: UNSPECIFIED IGI Global , 172 - 201. ISBN 978-1-4666-3640-8
[Book Section] , (2013)

Olembo, Maina and Stockhardt, Simon and Hülsing, Andreas and Volkamer, Melanie
University, Plymouth (ed.) :

Developing and Testing a Visual Hash Scheme.
European Information Security Multi-Conference (EISMC 2013)
[Conference or Workshop Item] , (2013)

Olembo, Maina and Volkamer, Melanie :
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.

[Report] , (2012)

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) :

Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics , 205 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2012)

Olembo, Maina and Volkamer, Melanie :
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.

[Report] , (2011)

Olembo, Maina and Schmidt, Patrick and Volkamer, Melanie :
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011) IEEE Computer Society
[Conference or Workshop Item] , (2011)

Oberender, Jens and Volkamer, Melanie and de Meer, Hermann :
Denial-of-Service Flooding Detection in Anonymity Networks.

[Conference or Workshop Item] , (2007)

P

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten :
C4PS - Colors for Privacy Settings.
Proceedings of the World Wide Web Conference (WWW)
[Conference or Workshop Item] , (2012)

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten :
C4PS - Helping Facebookers Manage their Privacy Settings.
Proceedings of SocInfo
[Conference or Workshop Item] , (2012)

R

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan :
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
[Article] , (2017)

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie :
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4) pp. 400-415.
[Article] , (2016)

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie :
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
MuC-Workshop „Usable Security and Privacy“ Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2016)

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie :
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
African Cyber Citizenship Conference 2015
[Conference or Workshop Item] , (2015)

Renaud, Karen and Volkamer, Melanie :
Exploring Mental Models Underlying PIN Management Strategies.
World Congress on Internet Security (WorldCIS 2015) IEEE
[Conference or Workshop Item] , (2015)

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie :
Shake hands to bedevil: Securing email with wearable technology.
Proceedings of the eighth international symposium on human aspects of information security and assurance Lulu Press
[Conference or Workshop Item] , (2014)

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph :
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533 . Springer
[Conference or Workshop Item] , (2014)

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen :
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: CHI 2014 ACM Digital Library
[Conference or Workshop Item] , (2014)

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph :
Are Graphical Authentication Mechanisms As Strong As Passwords?
Federated Conference on Computer Science and Information Systems 2013
[Conference or Workshop Item] , (2013)

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes
Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) :

Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010
[Conference or Workshop Item] , (2010)

S

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel :
Teaching Phishing-Security: Which Way is Best?
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[Conference or Workshop Item] , (2016)

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie :
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Datenschutz und Datensicherheit
[Conference or Workshop Item] , (2016)

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie :
Über die Wirksamkeit von Anti-Phishing-Training.
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015 A. Weisbecker, M. Burmester & A. Schmidt
[Conference or Workshop Item] , (2015)

Shirazi, Fatemeh and Volkamer, Melanie :
What Deters Jane from Preventing Identification and Tracking on the Web?
13th ACM Workshop on Privacy in the Electronic Society (WPES 2014) ACM
[Conference or Workshop Item] , (2014)

Sohr, Karsten and Bartsch, Steffen and Volkamer, Melanie and Berger, Bernhard and Bodden, Eric and Brucker, Achim and Maseberg, Sönke and Kus, Mehmet and Heider, Jens :
Zertifizierte Datensicherheit für mobile Anwendungen.
In: Lecture Notes in Informatics , 228 . Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2014)

Simić-Draws, Daniela and Neumann, Stephan and Kahlert, Anna and Richter, Philipp and Grimm, Rüdiger and Volkamer, Melanie and Roßnagel, Alexander :
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3) pp. 16-35.
[Article] , (2013)

Stopczynski, Martin and Ghiglieri, Marco :
Smart Home Dashboard – Das intelligente Energiemanagement.
VDE KONGRESS 2012 Smart Grid VDE Verlag GmbH
[Conference or Workshop Item] , (2012)

Schläpfer, Michael and Volkamer, Melanie :
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: ACM .
[Conference or Workshop Item] , (2012)

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie :
Robust Electronic Voting: Introducing robustness in Civitas.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011
[Conference or Workshop Item] , (2011)

Schryen, Guido and Volkamer, Melanie and Habib, Sheikh Mahbub and Ries, Sebastian :
A Formal Approach Towards Measuring Trust in Distributed Systems.
Proceedings of the 2011 ACM Symposium on Applied Computing ACM
[Conference or Workshop Item] , (2011)

Spycher, Oliver and Volkamer, Melanie and Koenig, Reto
Lipmaa, Helger and Kiayias, Aggelos (eds.) :

Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: Springer LNCS . Springer
[Conference or Workshop Item] , (2011)

Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Krimmer, Robert and Grimm, Rüdiger (eds.) :

An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI , 167 . GI
[Conference or Workshop Item] , (2010)

Schmidt, Axel and Heinson, Dennis and Langer, Lucie and Opitz-Talidou, Zoi and Richter, Philipp and Volkamer, Melanie and Buchmann, Johannes
Ryan, Johannes Y. A. and Schoenmakers, Berry (eds.) :

Developing a Legal Framework for Remote Electronic Voting.
In: LNCS , 5767 . Springer
[Conference or Workshop Item] , (2009)

Schmidt, Axel and Langer, Lucie and Buchmann, Johannes and Volkamer, Melanie :
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8 .
[Conference or Workshop Item] , (2009)

Schmidt, Axel and Volkamer, Melanie and Langer, Lucie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) :

Towards the impact of the operational environment on the security of e-voting.
In: LNI , 154 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2009)

T

Tretter, Stefan and Diefenbach, Sarah and Ullrich, Daniel and Gerber, Nina
Hess, Stefan and Fischer, Holger (eds.) :

Branchenreport UX/Usability 2017.
Mensch und Computer 2017 - Usability Professionals Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2017)

Tretter, Stefan and Diefenbach, Sarah and Ullrich, Daniel and Gerber, Nina
Hess, Stefan and Fischer, Holger (eds.) :

Branchenreport UX/Usability 2016.
Mensch und Computer 2016 - Usability Professionals Gesellschaft für Informatik e.V. und die German UPA e.V.
[Conference or Workshop Item] , (2016)

Tschofenig, Hannes and Volkamer, Melanie and Jentzsch, Nicola and Fischer-Hübner, Simone and Schiffner, Stefan and Tirtea, Rodica :
On the security, privacy and usability of online seals.

[Report] , (2013)

V

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra :
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71 pp. 100-113.
[Article] , (2017)

Volkamer, Melanie and Renaud, Karen and Gerber, Paul :
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4) pp. 372-385.
[Article] , (2016)

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin :
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) Springer
[Conference or Workshop Item] , (2016)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) :

A Socio-Technical Investigation into Smartphone Security.
Security and Trust Management: 11th International Workshop - STM 2015 Springer
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem :
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

[Report] , (2015)

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) :

Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing . Springer
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Renkema-Padmos, Arne :
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science . Springer
[Conference or Workshop Item] , (2014)

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Book Section] , (2013)

Volkamer, Melanie and Stockhardt, Simon and Bartsch, Steffen and Kauer, Michaela :
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013 IEEE Digital Library
[Conference or Workshop Item] , (2013)

Volkamer, Melanie and Bartsch, Steffen and Kauer, Michaela
University, Plymouth (ed.) :

Contextualized Security Interventions in Password Transmission Scenarios.
European Information Security Multi-Conference (EISMC 2013)
[Conference or Workshop Item] , (2013)

Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) :

The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS (7868). Springer
[Conference or Workshop Item] , (2012)

Volkamer, Melanie and Karayumak, Fatih and Kauer, Michaela and Halim, Dhanish and Bruder, Ralph :
Security versus Trust Indicators in 2011 in Germany.
Current Issues in IT Security 2012 Duncker & Humblot
[Conference or Workshop Item] , (2012)

Volkamer, Melanie and Budurushi, Jurlind and Demirel, Denise :
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11) IEEE
[Conference or Workshop Item] , (2011)

Volkamer, Melanie and Spycher, Oliver and Dubuis, Eric :
Measures to Establish Trust in Internet Voting.
In: ICEGOV '11 . ACM
[Conference or Workshop Item] , (2011)

Volkamer, Melanie and Schryen, Guido :
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
23rd Bled eConference, Bled, Slovenia, June 20-23
[Conference or Workshop Item] , (2010)

Volkamer, Melanie :
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, it 3/2010 pp. 169-172.
[Article] , (2010)

Volkamer, Melanie
Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) :

Data Protection in a Profiled World.
In: UNSPECIFIED Springer , pp. 177-190.
[Book Section] , (2010)

Volkamer, Melanie
Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) :

Electronic Voting in Germany.
Data Protection in a Profiled World
[Conference or Workshop Item] , (2010)

Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) :

Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2009)

Volkamer, Melanie and Grimm, Rüdiger :
Determine the Resilience of Evaluated Internet Voting Systems.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2 .
[Conference or Workshop Item] , (2009)

Volkamer, Melanie
Wagner, Dorothea and Bernstein, Abraham (eds.) :

Evaluation von Internetwahlsystemen.
In: LNI , D-9 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2009)

Volkamer, Melanie:
Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Springer ISBN 978-3-642-01661-5
[Book] , (2009)

Volkamer, Melanie and Vogt, Roland :
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
In:
[Article] , (2008)

Volkamer, Melanie and McGaley, Margaret :
Requirements and Evaluation Procedures for eVoting.
Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice IEEE Computer Society
[Conference or Workshop Item] , (2007)

Volkamer, Melanie and Hauff, Harald :
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10 pp. 766-768.
[Article] , (2007)

Volkamer, Melanie and Hauff, Harald :
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9 pp. 692-695.
[Article] , (2007)

Volkamer, Melanie and Krimmer, Robert and Grimm, Rüdiger
Prosser, Alexander and Parycek, Peter (eds.) :

Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: OCG Verlag .
[Conference or Workshop Item] , (2007)

Volkamer, Melanie and Krimmer, Robert
Grönlund, Ake and Scholl, Jochen and Wimmer, Maria (eds.) :

Requirements and Evaluation Techniques for Online-Voting.
In: Schriftreihe Informatik , 24 . Universitätsverlag Rudolf Trauner
[Conference or Workshop Item] , (2007)

Volkamer, Melanie and Krimmer, Robert
Hochberger, Christian and Liskowsky, Rüdiger (eds.) :

Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Informatik 2006 - Informatik f�ur Menschen
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Krimmer, Robert
Horster, Patrick (ed.) :

Overview Online-Wahlen.
D-A-CH Security 2006
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Krimmer, Robert :
E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl.

[Report] , (2006)

Volkamer, Melanie and Krimmer, Robert :
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.

[Report] , (2006)

Volkamer, Melanie and Alkassar, Ammar and Sadeghi, Ahmad-Reza and Schulz, Stefan :
Enabling the Application of Open Systems like PCs for Online Voting.
Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf}
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Krimmer, Robert :
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: {IEEE Computer Society} % todo eigenlich publisher .
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Vogt, Roland :
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In Frontiers in Electronic Elections - FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf}
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Krimmer, Robert :
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.

[Report] , (2006)

Volkamer, Melanie and Krimmer, Robert :
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2) pp. 98-113.
[Article] , (2006)

Volkamer, Melanie and Reinhard, Walter and Vogt, Roland
Dittmann, Jana (ed.) :

FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Springer LNI , 77 .
[Conference or Workshop Item] , (2006)

Volkamer, Melanie and Hutter, Dieter
Prosser, Alexander and Krimmer, Robert (eds.) :

From Legal Principles to an Internet Voting System.
In: Springer LNI , 47 .
[Conference or Workshop Item] , (2004)

W

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie:
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance
[Book] , (2015)

Z

Zimmermann, Verena and Henhapl, Birgit and Gerber, Nina and Enzmann, Matthias
Burghardt, Manuel and Wimmer, Raphael and Wolff, Christian and Womser-Hacker, Christa (eds.) :

Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren. Gesellschaft für Informatik, Norderstedt Regensburg , pp. 269-277. ISBN 978-3-7460-8210-3
[Book Section] , (2017)

Zimmermann, Verena and Gerber, Nina
Tryfonas, Theo (ed.) :

“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science Springer, Cham
[Conference or Workshop Item] , (2017)

This list was generated on Sun May 19 01:07:27 2019 CEST.