TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 40.

Article

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, 71pp. 88-99, DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29, DOI: 10.1109/MSP.2017.70,
[Article]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 11/2015pp. 747-752, DOI: 10.1007/s11623-015-0512-7,
[Article]

Buchmann, Johannes and Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2), Springer Gabler Verlag, pp. 98-102, [Article]

Simić-Draws, Daniela and Neumann, Stephan and Kahlert, Anna and Richter, Philipp and Grimm, Rüdiger and Volkamer, Melanie and Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), 7 (3), pp. 16-35, DOI: 10.4018/jisp.2013070102,
[Article]

Book Section

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, pp. 27-61, [Book Section]

Neumann, Stephan and Volkamer, Melanie Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Design, Development, and Use of Secure Electronic Voting Systems, IGI Global, pp. 76-91, [Book Section]

Book

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
1nternational Institute for Democracy and Electoral Assistance, [Book]

Conference or Workshop Item

Neumann, Stephan and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Don't be Deceived: The Message Might be Fake.
10442In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), Springer, pp. 199-214, ISBN 978-3-319-64482-0,
DOI: 10.1007/978-3-319-64483-7_13,
[Conference or Workshop Item]

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, pp. 371-382, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, pp. 419-433, [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, pp. 1817-1819, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, pp. 98 - 106, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, pp. 67-77, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, pp. 3-16, [Conference or Workshop Item]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016In: Datenschutz und Datensicherheit, pp. 295-299, DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, pp. 224-229, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Sahin, Perihan and Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), TUT Press, Lochau, pp. 69 - 72, [Conference or Workshop Item]

Feier, Christian and Neumann, Stephan and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
232In: Lecture Notes in Informatics (LNI), In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, pp. 1401-1414, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
232In: Lecture Notes in Informatics (LNI), In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, pp. 1415-1426, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
8650In: Lecture Notes in Computer Science, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, pp. 246-260, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, pp. 198-207, [Conference or Workshop Item]

Braun, Andreas and Schmidt, Sönke and Kuijper, Arjan and Neumann, Stephan and Wichert, Reiner (2014):
Towards Interactive Car Interiors - the Active Armrest.
ACM, New York, In: NordiCHI '14, pp. 911-914, DOI: 10.1145/2639189.2670191,
[Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: In: Cryptology ePrint Archive: Report 2013/464, 2013., Koblenz, pp. 804-818, [Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, pp. 804-818, [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
8075In: Lecture Notes in Computer Science, In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, pp. 49-56, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, pp. 198-207, [Conference or Workshop Item]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
7985In: Lecture Notes in Computer Science, In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, pp. 176 - 192, [Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, pp. 277-284, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, pp. 180-185, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
205In: LNI - Lecture Notes in Informatics, In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, pp. 95-109, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh IIn: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), ThinkMind Digital Library, Stuttgart. Germany, pp. 30-39, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, pp. 47 -55, DOI: 10.1109/REVOTE.2011.6045915,
[Conference or Workshop Item]

Ph.D. Thesis

Neumann, Stephan (2016):
Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5375],
[Ph.D. Thesis]

Neumann, Stephan (2005):
Universeller Maximum-Likelihood-Schätzer zum Bestimmen des Frequenz- und Phasenoffsets eines Übertragungssystems.
Aachen, Shaker, TU Darmstadt, ISBN 3-8322-3849-2,
[Ph.D. Thesis]

Bachelor Thesis

Neumann, Stephan (2014):
Automotive Interfaces Using an Interactive Armrest.
TU Darmstadt, [Bachelor Thesis]

Other

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

This list was generated on Tue Jul 7 01:38:02 2020 CEST.