TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 218.

Kulyk, Oksana ; Gerber, Nina ; Hilt, Annika ; Volkamer, Melanie (2020):
Has the GDPR hype affected users’ reaction to cookie disclaimers?
In: Journal of Cybersecurity, 6 (1), Oxford Academic, ISSN 2057-2085,
DOI: 10.1093/cybsec/tyaa022,
[Article]

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Marky, Karola ; Beckmann, Christopher ; Volkamer, Melanie (2019):
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users.
In: Workshop on Usable Security (USEC) in Conjuction with the Network and Distributed System Security Symposium (NDSS),
Workshop on Usable Security (USEC) in Conjuction with the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24 February 2019, ISSN 1-891562-57-6,
DOI: 10.14722/usec.2019.23029,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Marky, Karola ; Kulyk, Oksana ; Volkamer, Melanie
Langweg, Hanno ; Meier, Michael ; Witt, Bernhard C. ; Reinhardt, Delphine (eds.) (2018):
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
In: SICHERHEIT 2018, pp. 197-208,
Bonn, Gesellschaft für Informatik e.V., Konstanz, Germany, DOI: 10.18420/sicherheit2018_15,
[Conference or Workshop Item]

Marky, Karola ; Kulyk, Oksana ; Renaud, Karen ; Volkamer, Melanie (2018):
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
In: Conference on Human Factors in Computing Systems (CHI), pp. 176:1-176:13,
ACM, Montreal, QC, Canada, DOI: 10.1145/3173574.3173750,
[Conference or Workshop Item]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, pp. 621-630, Wiesbaden, Germany, Springer Vieweg, ISBN 978-3-658-19523-6,
DOI: 10.1007/978-3-658-19523-6_30,
[Book Section]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11), pp. 680-685. [Article]

Mayer, Peter ; Volkamer, Melanie (2017):
Addressing Misconceptions About Password Security Effectively [to appear].
In: Workshop on Socio-Technical Aspects in Security and Trust,
ACM, Orlando, Florida, ISBN 978-1-4503-6357-0/17/12,
DOI: 10.1145/3167996.3167998,
[Conference or Workshop Item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Analysis of the Security and Memorability of the Password Card.
In: ACSAC 2017 Posters,
Orlando, Florida, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, 71, pp. 88-99. DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security,
DOI: 10.1145/3098954.3098986,
[Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), pp. 675-690,
Springer, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29. DOI: 10.1109/MSP.2017.70,
[Article]

Neumann, Stephan ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Don't be Deceived: The Message Might be Fake.
10442, In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), pp. 199-214,
Springer, ISBN 978-3-319-64482-0,
DOI: 10.1007/978-3-319-64483-7_13,
[Conference or Workshop Item]

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502, In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, pp. 371-382,
Springer, Rome, Italy, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, pp. 419-433,
Springer, [Conference or Workshop Item]

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41, pp. 308-313. [Article]

Mayer, Peter ; Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71, pp. 100-113. DOI: 10.1016/j.cose.2017.02.004,
[Article]

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2), pp. 137-151. DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords,
Springer LNCS, [Conference or Workshop Item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1817-1819,
ACM, Vienna, Austria, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4), pp. 400-415. DOI: 10.1108/ICS-06-2015-0024,
[Article]

Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“,
Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, pp. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), pp. 372-385. DOI: 10.1108/ICS-07-2015-0032,
[Article]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, pp. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 67-77,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, pp. 3-16,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 161-175,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 135-149,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016, In: Datenschutz und Datensicherheit, pp. 295-299,
DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, pp. 46-48,
CEUR Workshop Proceedings, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, pp. 209-233,
Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015):
Certification of ICTs in Elections.
Stockholm, International Institute for Democracy and Electoral Assistance, ISBN 978-91-7671-028-9,
[Book]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 431-440,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Renaud, Karen ; Flowerday, Stephen ; Othmane, Lotfi Ben ; Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), pp. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, pp. 57-73,
Springer, Bern, Switzerland, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, pp. 265-273,
Springer, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), pp. 104-121,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, pp. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), pp. 1-19. International Association for Cryptologic Research (IACR), [Article]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, pp. 505-516,
SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Renaud, Karen ; Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), pp. 18-23,
IEEE, [Conference or Workshop Item]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, pp. 647-655,
A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, [Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Lecture notes in computer science, 8880, In: Information Systems Security : International Conference on Information Systems Security (ICISS), pp. 204-225,
Berlin, Cham, Springer International Publishing, International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]

Shirazi, Fatemeh ; Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), pp. 107-116,
ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference or Workshop Item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1401-1414,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: Lecture Notes in Informatics (LNI), 232, In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, pp. 1415-1426,
Köllen Druck+Verlag GmbH, Bonn, Stuttgart, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, pp. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, pp. 198-207,
IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance,
Lulu Press, Raleigh, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science, In: Privacy Enhancing Technologies - 14th International Symposium, PETS, pp. 244-262,
Springer, Amsterdam, The Netherlands, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533, In: Human Aspects of Information Security, Privacy, and Trust, pp. 183-194,
Springer, Heraklion, Crete, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2014):
Adopting the CMU/APWG anti-phishing landing page idea for Germany.
pp. 46-52, 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), IEEE Digital Library, [Conference or Workshop Item]

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
8533, In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science,
Springer, Cham, Heraklion, Greece, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems,
ACM Digital Library, New York, [Conference or Workshop Item]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Sohr, Karsten ; Bartsch, Steffen ; Volkamer, Melanie ; Berger, Bernhard ; Bodden, Eric ; Brucker, Achim ; Maseberg, Sönke ; Kus, Mehmet ; Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: Lecture Notes in Informatics, 228, In: GI Sicherheit 2014, pp. 283--291,
Gesellschaft für Informatik e.V., Wien, ISBN 978-3-88579-622-0,
[Conference or Workshop Item]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 27-61, IGI Global, [Book Section]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 76-91, IGI Global, [Book Section]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie
Zeisig, Anja ; Draude, Claude ; Schelhowe, Heidi ; Maaß, Susanne (eds.) (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik - Ein Beitrag zu Selbstverständnis und Außenwirkung, pp. 168-171, Bremen, [Book Section]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 804-818,
Koblenz, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Lecture Notes in Computer Science, 8260, In: Number Theory and Cryptography, pp. 255-280, Springer Berlin Heidelberg, ISBN 978-3-642-42000-9,
DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, pp. 837-844,
Krakow, [Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science, 8075, In: 5th International Conference on eParticipation (ePart 2013), pp. 49-56,
Springer, Koblenz, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464), pp. 1-12. International Association for Cryptologic Research (IACR), [Article]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 142 - 155,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Conference or Workshop Item]

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
pp. 1-2, Menlo Park, California, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13),
[Conference or Workshop Item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, pp. 46-52,
IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
University, Plymouth (ed.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), pp. 12-22,
Lisbon, Spain, [Conference or Workshop Item]

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Marinos, Louis ; Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Lecture Notes in Computer Science, 8030, In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, pp. 100-109,
Springer, First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, ISBN ISBN 978-3-642-39345-7,
[Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
pp. 172 - 201, IGI Global, ISBN 978-1-4666-3640-8,
DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), pp. 277-284,
Salzburg, Austria, [Conference or Workshop Item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21, pp. 41-52. DOI: 10.1108/09685221311314419,
[Article]

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
HAISH 2013 (Corporate Creator) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
pp. k.A-k.A, Seventh International Symposium on Human aspects of Information Security & Assurance, Lisbon, Portugal, 08.- 09. Mai 2013, [Conference or Workshop Item]

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), pp. 91-100,
[Conference or Workshop Item]

Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: 7, In: International Journal of Information Security and Privacy (IJISP), 7 (3), pp. 16-35. DOI: 10.4018/jisp.2013070102,
[Article]

Tschofenig, Hannes ; Volkamer, Melanie ; Jentzsch, Nicola ; Fischer-Hübner, Simone ; Schiffner, Stefan ; Tirtea, Rodica (2013):
On the security, privacy and usability of online seals.
[Report]

Olembo, Maina ; Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Schläpfer, Michael ; Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: ACM, In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, pp. 410-418,
Albany, NY, USA, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference or Workshop Item]

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS, In: EuroPKI 2012, September 13-14, pp. 85-97,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), pp. 180-185,
IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J ; Volkamer, Melanie ; Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics, 205, In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), pp. 95-109,
Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012):
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
In: Lecture notes in computer science, 7344, Berlin, Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85. DOI: 10.1108/09685221311314419,
[Article]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
WWW '12 Companion, In: Proceedings of the 21st international conference companion on World Wide Web, pp. 585--586,
ACM, Lyon, France, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh I, In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 30-39,
ThinkMind Digital Library, Stuttgart. Germany, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Kauer, Michaela ; Pfeiffer, Thomas (IAD) ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waudner, Michael (eds.) (2012):
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
In: GI-Edition Lecture Notes in Informatics,
Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Darmstadt, 7. - 9. März 2012, [Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), pp. 585-586,
[Conference or Workshop Item]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, pp. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Lecture Notes in Computer Science, In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, pp. 188-201, Berlin, Heidelberg, Springer, ISBN 978-3-642-35385-7,
DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage their Privacy Settings.
In: Proceedings of SocInfo, pp. 188-201,
[Conference or Workshop Item]

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von (eds.) Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, pp. 215-220, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book Section]

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von (eds.) Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
Security versus Trust Indicators in 2011 in Germany.
In: Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, 18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, pp. 80-96, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book Section]

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012):
Security versus Trust Indicators in 2011 in Germany.
I, In: Current Issues in IT Security 2012, pp. 79-96,
Duncker & Humblot, Freiburg, ISBN 978-3-86113-115-1,
[Conference or Workshop Item]

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), pp. 213-220,
Salzburg, Austria, [Conference or Workshop Item]

Karayumak, Fatih ; Kauer, Michaela ; Olembo, Maina ; Volkamer, Melanie (2011):
Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System.
Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, Juli 2011, [Conference or Workshop Item]

Karayumak, Fatih ; Kauer, Michaela ; Olembo, Maina ; Volk, Tobias ; Volkamer, Melanie (2011):
User Study of the Improved Helios Voting System Interface.
pp. 37-44, Socio-Technical Aspects in Security and Trust (STAST), Milan (Italy), 06. - 08. September 2011, [Conference or Workshop Item]

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 158-173,
Springer, Tallinn, Estonia, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, pp. 47 -55,
Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference or Workshop Item]

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 37-46,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Volkamer, Melanie ; Budurushi, Jurlind ; Demirel, Denise (2011):
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 1-8,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045910,
[Conference or Workshop Item]

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J ; Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, pp. 287-300,
Edition Donau-Universität Krems, [Conference or Workshop Item]

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14. [Article]

Schryen, Guido ; Volkamer, Melanie ; Habib, Sheikh Mahbub ; Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1739-1745,
ACM, Taichung, Taiwan, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Lo Iocano, Luigi ; Kauer, Michaela ; Volkamer, Melanie (2011):
Gebrauchstaugliche Nutzerauthentifizierung.
In: digma, (4), pp. 166-169. [Article]

Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 127 - 134,
IEEE Computer Society, Vienna, Austria, [Conference or Workshop Item]

Volkamer, Melanie ; Spycher, Oliver ; Dubuis, Eric (2011):
Measures to Establish Trust in Internet Voting.
In: ICEGOV '11, In: ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, pp. 1-10,
ACM, Tallinn, Estonia, DOI: http://doi.acm.org/10.1145/2072069.2072071,
[Conference or Workshop Item]

Spycher, Oliver ; Volkamer, Melanie ; Koenig, Reto
Lipmaa, Helger ; Kiayias, Aggelos (eds.) (2011):
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: Springer LNCS, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 19-35,
Springer, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_2,
[Conference or Workshop Item]

Karayumak, Fatih ; Olembo, Maina ; Kauer, Michaela ; Volkamer, Melanie (2011):
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE), San Francisco (USA, CSA), August 2011, [Conference or Workshop Item]

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, pp. 126-129,
[Conference or Workshop Item]

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), pp. 475-480,
IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
Schweighöfer, Erich ; Geist, Anton ; Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, pp. 61-72,
Salzburg, [Conference or Workshop Item]

Volkamer, Melanie
Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (eds.) (2010):
Data Protection in a Profiled World.
pp. 177-190, Springer, [Book Section]

Volkamer, Melanie
Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (eds.) (2010):
Electronic Voting in Germany.
In: Data Protection in a Profiled World, pp. 177-190,
Germany, [Conference or Workshop Item]

Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 135-148,
GI, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3), pp. 169-172. ISSN 2196-7032,
DOI: 10.1524/itit.2010.0587,
[Article]

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 89-107,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Volkamer, Melanie ; Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23,
[Conference or Workshop Item]

Gharadaghy, Rojan ; Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 151-162,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), pp. 203-210,
ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
322, In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, pp. 203-210,
Bogota, [Conference or Workshop Item]

Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
Ryan, Johannes Y. A. ; Schoenmakers, Berry (eds.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: LNCS, 5767, In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, pp. 92-105,
Springer, Luxembourg, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1837-1846,
[Conference or Workshop Item]

Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., pp. 1827-1836,
[Conference or Workshop Item]

Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 9-18,
ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 61-68,
Atlanta, GA, USA, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Volkamer, Melanie ; Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 47-54,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, pp. 243-253,
OCG Verlag, [Conference or Workshop Item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Berlin, Heidelberg, New York, Springer, ISBN 978-3-642-01661-5,
[Book]

Volkamer, Melanie
Wagner, Dorothea ; Bernstein, Abraham (eds.) (2009):
Evaluation von Internetwahlsystemen.
In: LNI, D-9, In: Ausgezeichnete Informatikdissertationen 2008,, pp. 301-310,
Gesellschaft für Informatik, [Conference or Workshop Item]

Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: LNI, 154, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1814-1826,
Gesellschaft für Informatik, [Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Band 1, In: GI Jahrestagung, pp. 429-436,
München, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, pp. 185-196,
Gesellschaft für Informatik, [Conference or Workshop Item]

Volkamer, Melanie ; Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

Krimmer, Robert ; Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimm, Rüdiger ; Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, pp. 145-156,
Boorberg Verlag, [Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press, In: E-Voting - Perspectives and Experiences,
[Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
27, In: Electronic Government 7th International Conference EGOV 2008, pp. 197-204,
Koblenz, [Conference or Workshop Item]

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07, 4896, In: Proceedings of the 1st international conference on E-voting and identity, pp. 50--61,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
pp. 1-6, [Conference or Workshop Item]

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07, 4896, In: E-Voting and Identity, First International Conference, VOTE-ID 2007, pp. 1-15,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Alkassar, Ammar ; Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Volkamer, Melanie ; Krimmer, Robert ; Grimm, Rüdiger
Prosser, Alexander ; Parycek, Peter (eds.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: OCG Verlag, In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, pp. 115-126,
[Conference or Workshop Item]

Volkamer, Melanie ; McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, pp. 895-902,
IEEE Computer Society, [Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert
Grönlund, Ake ; Scholl, Jochen ; Wimmer, Maria (eds.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Schriftreihe Informatik, 24, In: Electronic Government 6th International EGOV Conference, pp. 37-46,
Universitätsverlag Rudolf Trauner, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6), pp. 434-440. [Article]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9, pp. 692-695. [Article]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10, pp. 766-768. [Article]

Volkamer, Melanie ; Krimmer, Robert
Hochberger, Christian ; Liskowsky, Rüdiger (eds.) (2006):
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
93, In: Informatik 2006 - Informatik f�ur Menschen, pp. 418-425,
Dresden, [Conference or Workshop Item]

Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, pp. 196-210,
York, UK, [Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert
Horster, Patrick (ed.) (2006):
Overview Online-Wahlen.
In: D-A-CH Security 2006, pp. 339-350,
[Conference or Workshop Item]

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
91, In: Proceedings of the ECEH'06, pp. 59-70,
Freiburg (Schweiz), [Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2), pp. 98-113. [Article]

Volkamer, Melanie ; Krimmer, Robert (2006):
E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl.
[Report]

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},
[Conference or Workshop Item]

Volkamer, Melanie ; Reinhard, Walter ; Vogt, Roland
Dittmann, Jana (ed.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Springer LNI, 77, In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 159-170,
[Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, pp. 97-106,
[Conference or Workshop Item]

Volkamer, Melanie ; Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf},
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Volkamer, Melanie ; Krimmer, Robert (2006):
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
[Report]

Volkamer, Melanie ; Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: {IEEE Computer Society} % todo eigenlich publisher, In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, pp. 340-347,
[Conference or Workshop Item]

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert (ed.) LNI, GI (Corporate Creators) (2006):
Security Requirements for Non-political Internet Voting.
86, In: Electronic Voting (EVOTE) 2006, pp. 203-212, Bonn, Gesellschaft für Informatik, ISBN 978-3-88579-180-5,
[Book Section]

Krimmer, Robert ; Volkamer, Melanie (2005):
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
13, In: Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005, pp. 225-232,
Kopenhagen, [Conference or Workshop Item]

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8, pp. 480-482. [Article]

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag, In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, pp. 256-262,
[Conference or Workshop Item]

Volkamer, Melanie ; Hutter, Dieter
Prosser, Alexander ; Krimmer, Robert (eds.) (2004):
From Legal Principles to an Internet Voting System.
In: Springer LNI, 47, In: Electronic Voting in Europe - Technology, Law, Politics and Society, pp. 111-120,
[Conference or Workshop Item]

This list was generated on Tue Oct 26 04:53:00 2021 CEST.