TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 40.

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion resistant proxy voting.
In: Computers & Security, 71 pp. 88-99.
[Article] , (2017)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie :
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3) pp. 24-29.
[Article] , (2017)

Neumann, Stephan and Reinheimer, Benjamin and Volkamer, Melanie :
Don't be Deceived: The Message Might be Fake.
14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus) Springer
[Conference or Workshop Item] , (2017)

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie :
Election-Dependent Security Evaluation of Internet Voting Schemes.
ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology Springer
[Conference or Workshop Item] , (2017)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie :
Enabling Vote Delegation in Boardroom Voting.
Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017 Springer
[Conference or Workshop Item] , (2017)

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan :
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation
[Article] , (2017)

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie :
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16 . ACM
[Conference or Workshop Item] , (2016)

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie :
Introducing Proxy Voting to Helios.
11th International Conference on Availability, Reliability and Security - ARES 2016 IEEE
[Conference or Workshop Item] , (2016)

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie :
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) University of Plymouth
[Conference or Workshop Item] , (2016)

Neumann, Stephan :
Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5375]
Technische Universität Darmstadt , Darmstadt
[Ph.D. Thesis], (2016)

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie :
Coercion-resistant Proxy Voting.
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 Springer
[Conference or Workshop Item] , (2016)

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco :
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications pp. 1-16.
[Article] , (2016)

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie :
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Datenschutz und Datensicherheit
[Conference or Workshop Item] , (2016)

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie:
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance
[Book] , (2015)

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim :
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 11/2015 pp. 747-752.
[Article] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
10th International Conference on Availability, Reliability and Security - ARES 2015 IEEE
[Conference or Workshop Item] , (2015)

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon :
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.

[Other] , (2015)

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian :
Pretty Understandable Democracy 2.0.
6th International Conference on Electronic Voting (EVOTE) TUT Press
[Conference or Workshop Item] , (2014)

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) :

Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Conference or Workshop Item] , (2014)

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) :

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI) , 232 . Köllen Druck+Verlag GmbH, Bonn
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) :

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science , 8650 . Springer
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie :
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014 IEEE
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) :

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: UNSPECIFIED Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 27-61.
[Book Section] , (2014)

Neumann, Stephan :
Automotive Interfaces Using an Interactive Armrest.
TU Darmstadt
[Bachelor Thesis] , (2014)

Neumann, Stephan and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) :

A Holistic Framework for the Evaluation of Internet Voting Systems.
In: UNSPECIFIED Design, Development, and Use of Secure Electronic Voting Systems. IGI Global , pp. 76-91.
[Book Section] , (2014)

Buchmann, Johannes and Neumann, Stephan :
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2) pp. 98-102.
[Article] , (2014)

Braun, Andreas and Schmidt, Sönke and Kuijper, Arjan and Neumann, Stephan and Wichert, Reiner :
Towards Interactive Car Interiors - the Active Armrest.
In: NordiCHI '14. ACM, New York
[Conference or Workshop Item] , (2014)

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto :
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive: Report 2013/464, 2013.
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto
Horbach, Matthias (ed.) :

Towards A Practical JCJ / Civitas Implementation.
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) :

Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science , 8075 . Springer
[Conference or Workshop Item] , (2013)

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) :

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
8th International Conference on Availability, Reliability and Security (AReS 2013) IEEE
[Conference or Workshop Item] , (2013)

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) :

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science , 7985 . Springer
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie :
Towards a Practical Mobile Application for Election Authorities (Demo).
4th International Conference on e-Voting and Identity (VoteID13)
[Conference or Workshop Item] , (2013)

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie :
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013)
[Conference or Workshop Item] , (2013)

Simić-Draws, Daniela and Neumann, Stephan and Kahlert, Anna and Richter, Philipp and Grimm, Rüdiger and Volkamer, Melanie and Roßnagel, Alexander :
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3) pp. 16-35.
[Article] , (2013)

Neumann, Stephan and Volkamer, Melanie :
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
7th International Conference on Availability, Reliability and Security (ARES) IEEE
[Conference or Workshop Item] , (2012)

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) :

Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics , 205 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2012)

Neumann, Stephan and Volkamer, Melanie :
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012) , ICIMP 2012, The Seventh I ThinkMind Digital Library
[Conference or Workshop Item] , (2012)

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie :
Robust Electronic Voting: Introducing robustness in Civitas.
International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011
[Conference or Workshop Item] , (2011)

Neumann, Stephan :
Universeller Maximum-Likelihood-Schätzer zum Bestimmen des Frequenz- und Phasenoffsets eines Übertragungssystems.
Shaker , Aachen
[Ph.D. Thesis]

This list was generated on Sat May 25 02:20:50 2019 CEST.