TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 24.

Kulyk, Oksana and Gerber, Paul and Marky, Karola and Beckmann, Christopher and Volkamer, Melanie :
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users.
[Online-Edition: https://www.ndss-symposium.org/wp-content/uploads/2019/02/us...]
In: Workshop on Usable Security (USEC), San Diego, CA, USA. In: Workshop on Usable Security (USEC)
[Conference or Workshop Item] , (2019) (Unpublished)

Marky, Karola and Kulyk, Oksana and Volkamer, Melanie
Langweg, Hanno and Meier, Michael and Witt, Bernhard C. and Reinhardt, Delphine (eds.) :

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
[Online-Edition: https://dl.gi.de/handle/20.500.12116/16280]
SICHERHEIT 2018 Gesellschaft für Informatik e.V. , Bonn
[Conference or Workshop Item] , (2018)

Marky, Karola and Kulyk, Oksana and Renaud, Karen and Volkamer, Melanie :
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750]
In: Conference on Human Factors in Computing Systems (CHI '18) ACM
[Conference or Workshop Item] , (2018)

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie :
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion. Springer , pp. 83-98.
[Book Section] , (2018)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 pp. 88-99.
[Article] , (2017)

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max :
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE
[Conference or Workshop Item] , (2017)

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie :
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
12th International Conference on Availability, Reliability and Security - ARES 2017 ACM
[Conference or Workshop Item] , (2017)

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie :
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
International Conference on Human-Computer Interaction (HCII) Springer
[Conference or Workshop Item] , (2017)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) pp. 24-29.
[Article] , (2017)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Conference or Workshop Item] , (2017)

Kulyk, Oksana :
Extending the Helios Internet Voting Scheme Towards New Election Settings.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6211]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2017)

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[Conference or Workshop Item] , (2016)

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie :
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.

[Other] , (2016)

Kulyk, Oksana and Volkamer, Melanie :
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers Springer
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie :
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
NDSS Workshop on Usable Security (USEC) Internet Society.
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) :

Extending Helios Towards Private Eligibility Verifiability.
E-Voting and Identity: 5th International Conference - VoteID 2015 Springer
[Conference or Workshop Item] , (2015)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) :

A Socio-Technical Investigation into Smartphone Security.
Security and Trust Management: 11th International Workshop - STM 2015 Springer
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Other] , (2015)

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem :
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).

[Report] , (2015)

Kulyk, Oksana and Feier, Christian and Köster, Thorben :
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
6th International Conference on Electronic Voting - EVOTE 2014 IEEE
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie :
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014 IEEE
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie :
Towards a Practical Mobile Application for Election Authorities (Demo).
4th International Conference on e-Voting and Identity (VoteID13)
[Conference or Workshop Item] , (2013)

This list was generated on Tue Apr 16 00:51:43 2019 CEST.