TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 217.

German

Gerber, Paul and Ghiglieri, Marco and Henhapl, Birgit and Kulyk, Oksana and Marky, Karola and Mayer, Peter and Reinheimer, Benjamin and Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, pp. 83-98, [Book Section]

Reuter, Christian and Aal, Konstantin and Beham, Frank and Boden, Alexander and Brauner, Florian and Ludwig, Thomas and Lukosch, Stephan and Fiedrich, Frank and Fuchs-Kittowski, Frank and Geisler, Stefan and Gennen, Klaus and Herrmann, Dominik and Kaufhold, Marc-André and Klafft, Michael and Lipprandt, Myriam and Lo Iacono, Luigi and Pipek, Volkmar and Pottebaum, Jens and Mentler, Tilo and Nestler, Simon and Stieglitz, Stefan and Sturm, Christian and Rusch, Gebhard and Sackmann, Stefan and Volkamer, Melanie and Wulf, Volker
Reuter, Christian (ed.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, pp. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book Section]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie and Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), pp. 680-685, 42, (11), [Article]

Mayer, Peter and Kunz, Alexandra and Volkamer, Melanie (2017):
Analysis of the Security and Memorability of the Password Card.
In: ACSAC 2017 Posters, Orlando, Florida, [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, pp. 88-99, 71, DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kulyk, Oksana and Reinheimer, Benjamin and Gerber, Paul and Volk, Florian and Volkamer, Melanie and Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Kulyk, Oksana and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
In: International Conference on Human-Computer Interaction (HCII), Springer, 10292, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Neumann, Stephan and Reinheimer, Benjamin and Volkamer, Melanie (2017):
Don't be Deceived: The Message Might be Fake.
In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), Springer, 10442, ISBN 978-3-319-64482-0,
DOI: 10.1007/978-3-319-64483-7_13,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, [Conference or Workshop Item]

Zimmermann, Verena and Volkamer, Melanie and Vogt, Joachim and Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, pp. 308-313, 41, [Article]

Mayer, Peter and Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters, [Conference or Workshop Item]

Rehfeld, Silke and Volkamer, Melanie and Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Gerber, Paul and Volkamer, Melanie and Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Reinheimer, Benjamin and Braun, Kristoffer and Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Kulyk, Oksana and Marky, Karola and Neumann, Stephan and Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Budurushi, Jurlind and Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie and Mayer, Peter and Kunz, Alexandra and Rack, Philipp and Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Schochlow, Verena and Neumann, Stephan and Braun, Kristoffer and Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
In: Datenschutz und Datensicherheit, 5/2016, DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Budurushi, Jurlind and Hilt, Annika and Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, pp. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Bernhard, David and Kulyk, Oksana and Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Budurushi, Jurlind and Reanaud, Karen and Volkamer, Melanie and Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, pp. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Marky, Karola and Gutmann, Andreas and Rack, Philipp and Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, 1575, [Conference or Workshop Item]

Wolf, Peter and Barrat, Jordi and Bolo, Eden and Bravo, Alejandro and Krimmer, Robert and Neumann, Stephan and Parreño, Al and Schürmann, Carsten and Volkamer, Melanie (2015):
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance, 1, [Book]

Renaud, Karen and Flowerday, Stephen and Othmane, Lotfi Ben and Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie and Strube, Moritz and Jung, Wolfgang and Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, pp. 747-752, 11/2015, DOI: 10.1007/s11623-015-0512-7,
[Article]

Gerber, Paul and Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, pp. 108 - 113, 2/2015, DOI: 10.1007/s11623-015-0375-y,
[Article]

Maseberg, Sönke and Bodden, Eric and Kus, Mehmet and Brucker, Achim and Rasthofer, Siegfried and Berger, Bernhard and Huber, Stephan and Sohr, Karsten and Gerber, Paul and Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), IEEE, [Conference or Workshop Item]

Stockhardt, Simon and Reinheimer, Benjamin and Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, [Conference or Workshop Item]

Budurushi, Jurlind and Neumann, Stephan and Shala, Genc and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Bartsch, Steffen and Boos, Carina and Canova, Gamze and Dyck, Dominic and Henhapl, Birgit and Schultheis, Michael and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind and Volkamer, Melanie
Parycek, Peter and Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Sohr, Karsten and Bartsch, Steffen and Volkamer, Melanie and Berger, Bernhard and Bodden, Eric and Brucker, Achim and Maseberg, Sönke and Kus, Mehmet and Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: GI Sicherheit 2014, Gesellschaft für Informatik e.V., Wien, In: Lecture Notes in Informatics, 228, ISBN 978-3-88579-622-0,
[Conference or Workshop Item]

Boos, Carina and Bartsch, Steffen and Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, pp. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference or Workshop Item]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Henning, Maria and Budurushi, Jurlind and Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158, [Article]

Bartsch, Steffen and Boos, Carina and Dyck, Dominic and Schwarz, Christopher and Theuerling, Heike and Henhapl, Birgit and Volkamer, Melanie
Zeisig, Anja and Draude, Claude and Schelhowe, Heidi and Maaß, Susanne (eds.) (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik - Ein Beitrag zu Selbstverständnis und Außenwirkung, Bremen, pp. 168-171, [Online-Edition: http://suche.suub.uni-bremen.de/peid=B81685388&LAN=DE&CID=29...],
[Book Section]

Braun, Kristoffer and Budurushi, Jurlind and Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Jonker, Hugo and Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, [Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), [Conference or Workshop Item]

Henning, Maria and Demirel, Denise and Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), Salzburg, Austria, [Conference or Workshop Item]

Demirel, Denise and Frankland, Richard and Popovic, Darko and Volkamer, Melanie
Parycek, Peter and Kripp, Melanie J and Noella, Edelmann (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11 Proceedings of the International Conference for E-Democracy and Open Government, Edition Donau-Universität Krems, [Conference or Workshop Item]

Fischer-Hübner, Simone and Grimm, Rüdiger and Lo Iacono, Luigi and Möller, Sebastian and Müller, Günter and Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14, [Article]

Schryen, Guido and Volkamer, Melanie and Habib, Sheikh Mahbub and Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, ACM, Taichung, Taiwan, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference or Workshop Item]

Lo Iocano, Luigi and Kauer, Michaela and Volkamer, Melanie (2011):
Gebrauchstaugliche Nutzerauthentifizierung.
In: digma, pp. 166-169, (4), [Article]

Olembo, Maina and Schmidt, Patrick and Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), IEEE Computer Society, Vienna, Austria, [Conference or Workshop Item]

Dubuis, Eric and Spycher, Oliver and Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, [Conference or Workshop Item]

Richter, Philipp and Langer, Lucie and Hupf, Katharina and Volkamer, Melanie and Buchmann, Johannes
Schweighöfer, Erich and Geist, Anton and Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, [Conference or Workshop Item]

Volkamer, Melanie
Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) (2010):
Data Protection in a Profiled World.
Springer, pp. 177-190, [Book Section]

Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, GI, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, pp. 169-172, it 3/2010, DOI: 10.1524/itit.2010.0587,
[Article]

Grimm, Rüdiger and Hupf, Katharina and Volkamer, Melanie
Krimmer, Robert and Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, 167, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Volkamer, Melanie and Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23, [Conference or Workshop Item]

Gharadaghy, Rojan and Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, In: LNI, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Langer, Lucie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), LNI, [Conference or Workshop Item]

Volkamer, Melanie and Schryen, Guido and Langer, Lucie and Schmidt, Axel and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., LNI, [Conference or Workshop Item]

Schmidt, Axel and Langer, Lucie and Buchmann, Johannes and Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: First International Workshop on Requirements Engineering for E-Voting Systems, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4, [Article]

Volkamer, Melanie and Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: First International Workshop on Requirements Engineering for E-Voting Systems, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie and Buchmann, Johannes
Prosser, Alexander and Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, OCG Verlag, [Conference or Workshop Item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting -Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Springer, ISBN 978-3-642-01661-5,
[Book]

Volkamer, Melanie
Wagner, Dorothea and Bernstein, Abraham (eds.) (2009):
Evaluation von Internetwahlsystemen.
In: Ausgezeichnete Informatikdissertationen 2008,, Gesellschaft für Informatik, In: LNI, D-9, [Conference or Workshop Item]

Schmidt, Axel and Volkamer, Melanie and Langer, Lucie and Buchmann, Johannes
Fischer, Stefan and Maehle, Erik and Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Gesellschaft für Informatik, In: LNI, 154, [Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Grimm, Rüdiger and Volkamer, Melanie
Hegering, Heinz-Gerd and Lehmann, Axel and Ohlbach, Hans Jürgen and Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: GI Jahrestagung, München, Band 1, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: Electronic Voting - 3rd International Conference, Gesellschaft für Informatik, In: LNI, 131, [Conference or Workshop Item]

Volkamer, Melanie and Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

Krimmer, Robert and Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimm, Rüdiger and Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, Boorberg Verlag, [Conference or Workshop Item]

Krimmer, Robert and Volkamer, Melanie
Krishna, Jaya and Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: E-Voting - Perspectives and Experiences, In: The Icfai University Press, [Conference or Workshop Item]

Jonker, Hugo and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: Proceedings of the 1st international conference on E-voting and identity, Springer-Verlag, Bochum, Germany, In: VOTE-ID'07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Oberender, Jens and Volkamer, Melanie and de Meer, Hermann (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
[Conference or Workshop Item]

Krimmer, Robert and Triessnig, Stefan and Volkamer, Melanie
Alkassar, Ammar and Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: E-Voting and Identity, First International Conference, VOTE-ID 2007, Springer-Verlag, Bochum, Germany, In: VOTE-ID'07, 4896, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Alkassar, Ammar and Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Volkamer, Melanie and Krimmer, Robert and Grimm, Rüdiger
Prosser, Alexander and Parycek, Peter (eds.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, In: OCG Verlag, [Conference or Workshop Item]

Volkamer, Melanie and McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, IEEE Computer Society, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert
Grönlund, Ake and Scholl, Jochen and Wimmer, Maria (eds.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Electronic Government 6th International EGOV Conference, Universitätsverlag Rudolf Trauner, In: Schriftreihe Informatik, 24, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Helbach, Jörg and Krimmer, Robert and Meletiadou, Anastasia and Meissner, Nils and Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, pp. 434-440, 31, (6), [Article]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, pp. 692-695, 9, [Article]

Volkamer, Melanie and Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, pp. 766-768, 10, [Article]

Volkamer, Melanie and Krimmer, Robert
Hochberger, Christian and Liskowsky, Rüdiger (eds.) (2006):
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
In: Informatik 2006 - Informatik f�ur Menschen, Dresden, 93, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, pp. 98-113, 29, (2), [Article]

Volkamer, Melanie and Krimmer, Robert (2006):
E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl.
[Report]

Volkamer, Melanie and Alkassar, Ammar and Sadeghi, Ahmad-Reza and Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf}, [Conference or Workshop Item]

Volkamer, Melanie and Reinhard, Walter and Vogt, Roland
Dittmann, Jana (ed.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), In: Springer LNI, 77, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Electronic Voting 2006 - $2^{nd}$ International Conference, In: Springer LNI, 86, [Conference or Workshop Item]

Volkamer, Melanie and Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf}, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Volkamer, Melanie and Krimmer, Robert (2006):
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
[Report]

Volkamer, Melanie and Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, In: {IEEE Computer Society} % todo eigenlich publisher, [Conference or Workshop Item]

Alkassar, Ammar and Krimmer, Robert and Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, pp. 480-482, 8, [Article]

Krimmer, Robert and Volkamer, Melanie
Schweighöfer, Erich and Liebwald, Doris and Augeneder, Silvia and Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, In: Boorberg Verlag, [Conference or Workshop Item]

Volkamer, Melanie and Hutter, Dieter
Prosser, Alexander and Krimmer, Robert (eds.) (2004):
From Legal Principles to an Internet Voting System.
In: Electronic Voting in Europe - Technology, Law, Politics and Society, In: Springer LNI, 47, [Conference or Workshop Item]

English

Gerber, Nina and Zimmermann, Verena and Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Marky, Karola and Beckmann, Christopher and Volkamer, Melanie (2019):
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users.
In: Workshop on Usable Security (USEC) in Conjuction with the Network and Distributed System Security Symposium (NDSS), In: Workshop on Usable Security (USEC) in Conjuction with the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24 February 2019, ISSN 1-891562-57-6,
DOI: 10.14722/usec.2019.23029,
[Online-Edition: https://www.ndss-symposium.org/wp-content/uploads/2019/02/us...],
[Conference or Workshop Item]

Gerber, Nina and Zimmermann, Verena and Henhapl, Birgit and Emeröz, Sinem and Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
In: International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference or Workshop Item]

Marky, Karola and Kulyk, Oksana and Volkamer, Melanie
Langweg, Hanno and Meier, Michael and Witt, Bernhard C. and Reinhardt, Delphine (eds.) (2018):
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
In: SICHERHEIT 2018, Bonn, Gesellschaft für Informatik e.V., Konstanz, Germany, DOI: 10.18420/sicherheit2018_15,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/16280],
[Conference or Workshop Item]

Marky, Karola and Kulyk, Oksana and Renaud, Karen and Volkamer, Melanie (2018):
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
In: Conference on Human Factors in Computing Systems (CHI), ACM, Montreal, QC, Canada, DOI: 10.1145/3173574.3173750,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3173750],
[Conference or Workshop Item]

Mayer, Peter and Volkamer, Melanie (2017):
Addressing Misconceptions About Password Security Effectively [to appear].
In: Workshop on Socio-Technical Aspects in Security and Trust, ACM, Orlando, Florida, ISBN 978-1-4503-6357-0/17/12,
DOI: 10.1145/3167996.3167998,
[Conference or Workshop Item]

Mayer, Peter and Kunz, Alexandra and Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security, DOI: 10.1145/3098954.3098986,
[Conference or Workshop Item]

Ghiglieri, Marco and Volkamer, Melanie and Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, pp. 24-29, 15, (3), DOI: 10.1109/MSP.2017.70,
[Article]

Neumann, Stephan and Noll, Manuel and Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, 502, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin and Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, pp. 100-113, 71, DOI: 10.1016/j.cose.2017.02.004,
[Article]

Mayer, Peter and Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, pp. 137-151, 25, (2), DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mayer, Peter and Berket, Hermann and Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords, Springer LNCS, [Conference or Workshop Item]

Gerber, Paul and Renaud, Karen and Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, pp. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Mayer, Peter and Neumann, Stephan and Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, In: CCS '16, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Renaud, Karen and Flowerday, Stephen and English, Rosanne and Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, pp. 400-415, 24, (4), DOI: 10.1108/ICS-06-2015-0024,
[Article]

Volkamer, Melanie and Renaud, Karen and Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, pp. 372-385, 24, (4), DOI: 10.1108/ICS-07-2015-0032,
[Article]

Gutmann, Andreas and Volkamer, Melanie and Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Kunz, Alexandra and Volkamer, Melanie and Stockhardt, Simon and Palberg, Sven and Lottermann, Tessa and Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Mayer, Peter and Neumann, Stephan and Storck, Daniel and Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gerber, Nina and McDermott, Ronja and Volkamer, Melanie and Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Marky, Karola and Budurushi, Jurlind and Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference or Workshop Item]

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Kulyk, Oksana and Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana and Gerber, Paul and Reinheimer, Benjamin and Renaud, Karen and Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Mayer, Peter and Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: Proceedings of the 31st Annual Computer Security Applications Conference, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Kulyk, Oksana and Teague, Vanessa and Volkamer, Melanie
Haenni, Rolf and Koenig, Reto and Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Braun, Kristoffer and Canova, Gamze and Reinheimer, Benjamin
Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kulyk, Oksana and Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie and Haenni, Rolf and Koenig, Reto and von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Volkamer, Melanie and Renaud, Karen and Kulyk, Oksana and Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Gutmann, Andreas and Renaud, Karen and Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland and Reinheimer, Benjamin and Stockhardt, Simon and Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference or Workshop Item]

Gerber, Paul and Volkamer, Melanie and Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, pp. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Mayer, Peter and Volkamer, Melanie and Kauer, Michaela
Prakash, Atul and Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Information Systems Security : International Conference on Information Systems Security (ICISS), Berlin, Cham, Springer International Publishing, In: International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, In: Lecture notes in computer science, 8880, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Budurushi, Jurlind and Renaud, Karen and Volkamer, Melanie and Woide, Marcel
Krimmer, Robert and Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Feier, Christian and Neumann, Stephan and Volkamer, Melanie
Plödereder, Erhard and Grunske, Lars and Schneider, Eric and Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Neumann, Stephan and Olembo, Maina and Renaud, Karen and Volkamer, Melanie
Kö, Andrea and Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Canova, Gamze and Volkamer, Melanie and Bergmann, Clemens and Borza, Roland
Mauw, Sjouke and Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Renkema-Padmos, Arne and Baum, Jerome and Renaud, Karen and Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance, Lulu Press, Raleigh, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen and Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Privacy Enhancing Technologies - 14th International Symposium, PETS, Springer, Amsterdam, The Netherlands, In: Lecture Notes in Computer Science, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Renaud, Karen and Volkamer, Melanie and Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: Human Aspects of Information Security, Privacy, and Trust, Springer, Heraklion, Crete, In: 8533, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Volkamer, Melanie and Stockhardt, Simon and Bartsch, Steffen and Kauer, Michaela (2014):
Adopting the CMU/APWG anti-phishing landing page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), IEEE Digital Library, [Online-Edition: http://www.stast2013.uni.lu/programme.html],
[Conference or Workshop Item]

Kolb, Nina and Bartsch, Steffen and Volkamer, Melanie and Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Springer, Cham, Heraklion, Greece, 8533, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Budurushi, Jurlind and Stockhardt, Simon and Woide, Marcel and Volkamer, Melanie
Tryfonas, Theo and Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Renkema-Padmos, Arne and Volkamer, Melanie and Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems, ACM Digital Library, New York, [Conference or Workshop Item]

Budurushi, Jurlind and Jöris, Roman and Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, pp. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Budurushi, Jurlind and Woide, Marcel and Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Olembo, Maina and Renaud, Karen and Bartsch, Steffen and Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Neumann, Stephan and Budurushi, Jurlind and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
IGI Global, pp. 27-61, [Book Section]

Neumann, Stephan and Volkamer, Melanie
Zissis, Dimitrios and Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
IGI Global, pp. 76-91, [Book Section]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: In: Cryptology ePrint Archive: Report 2013/464, 2013., Koblenz, [Conference or Workshop Item]

Neumann, Stephan and Feier, Christian and Volkamer, Melanie and Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference or Workshop Item]

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, pp. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Renaud, Karen and Mayer, Peter and Volkamer, Melanie and Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, Krakow, [Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Neumann, Stephan and Kahlert, Anna and Henning, Maria and Richter, Philipp and Jonker, Hugo and Volkamer, Melanie
Wimmer, Maria and Tambouris, Efthimios and Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, In: Lecture Notes in Computer Science, 8075, [Conference or Workshop Item]

Olembo, Maina and Bartsch, Steffen and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Northrop, Erik and Lipford, Heather Richter and Bartsch, Steffen and Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Other]

Nas, Aysegül and Filyanov, Atanas and Volkamer, Melanie and Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
Menlo Park, California, [Other]

Budurushi, Jurlind and Neumann, Stephan and Olembo, Maina and Volkamer, Melanie
Pernul, Günther and Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Bernhard, David and Neumann, Stephan and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Neumann, Stephan and Kulyk, Oksana and Murati, Lulzim and Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference or Workshop Item]

Budurushi, Jurlind and Henning, Maria and Volkamer, Melanie
Schneider, Steve and Heather, James and Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference or Workshop Item]

Volkamer, Melanie and Stockhardt, Simon and Bartsch, Steffen and Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie and Theuerling, Heike and Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Volkamer, Melanie and Bartsch, Steffen and Kauer, Michaela
University, Plymouth (ed.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), Lisbon, Spain, [Conference or Workshop Item]

Kauer, Michaela and Günther, Sebastian and Storck, Daniel and Volkamer, Melanie
Marinos, Louis and Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Springer, In: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, In: Lecture Notes in Computer Science, 8030, ISBN ISBN 978-3-642-39345-7,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11],
[Conference or Workshop Item]

Olembo, Maina and Volkamer, Melanie
Saeed, Saqib and Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
IGI Global, pp. 172 - 201, DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Moecke, Cristian Thiago and Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, pp. 41-52, 21, DOI: 10.1108/09685221311314419,
[Article]

Volkamer, Melanie and Bartsch, Steffen and Kauer, Michaela
HAISH 2013 (Corporate Creator) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: Seventh International Symposium on Human aspects of Information Security & Assurance, Lisbon, Portugal, 08.- 09. Mai 2013, [Conference or Workshop Item]

Olembo, Maina and Stockhardt, Simon and Hülsing, Andreas and Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), [Conference or Workshop Item]

Simić-Draws, Daniela and Neumann, Stephan and Kahlert, Anna and Richter, Philipp and Grimm, Rüdiger and Volkamer, Melanie and Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), pp. 16-35, 7, (3), DOI: 10.4018/jisp.2013070102,
[Article]

Tschofenig, Hannes and Volkamer, Melanie and Jentzsch, Nicola and Fischer-Hübner, Simone and Schiffner, Stefan and Tirtea, Rodica (2013):
On the security, privacy and usability of online seals.
[Report]

Olembo, Maina and Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Schläpfer, Michael and Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, In: ACM, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference or Workshop Item]

Bartsch, Steffen and Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference or Workshop Item]

Neumann, Stephan and Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Olembo, Maina and Kahlert, Anna and Neumann, Stephan and Volkamer, Melanie
Kripp, Melanie J and Volkamer, Melanie and Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, In: LNI - Lecture Notes in Informatics, 205, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Moecke, Cristian Thiago and Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85, DOI: 10.1108/09685221311314419,
[Article]

Neumann, Stephan and Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), ThinkMind Digital Library, Stuttgart. Germany, ICIMP 2012, The Seventh I, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Kauer, Michaela and Pfeiffer, Thomas (IAD) and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waudner, Michael (eds.) (2012):
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
In: GI-Edition Lecture Notes in Informatics, In: Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Darmstadt, 7. - 9. März 2012, [Conference or Workshop Item]

Kauer, Michaela and Pfeiffer, Thomas and Volkamer, Melanie and Theuerling, Heike and Bruder, Ralph
Suri, Neeraj and Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: Sicherheit, GI, Darmstadt, Germany, In: LNI, 195, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings, Berlin, Heidelberg, Springer, pp. 188-201, DOI: 10.1007/978-3-642-35386-4_15,
[Book Section]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage their Privacy Settings.
In: Proceedings of SocInfo, [Conference or Workshop Item]

Kauer, Michaela and Kiesel, Florian and Ueberschaer, Felix and Volkamer, Melanie and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, Berlin, Duncker & Humblot, pp. 215-220, [Book Section]

Volkamer, Melanie and Karayumak, Fatih and Kauer, Michaela and Halim, Dhanish and Bruder, Ralph
Jähnke, Jochen and Mühlen, Nicolas von zur and Rechert, Klaus and Suchodoletz, Dirk von (eds.)
Max-Planck Institut für ausländisches und internationales Strafrecht (Corporate Creator) (2012):
Security versus Trust Indicators in 2011 in Germany.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, Berlin, Duncker & Humblot, pp. 80-96, [Book Section]

Volkamer, Melanie and Karayumak, Fatih and Kauer, Michaela and Halim, Dhanish and Bruder, Ralph (2012):
Security versus Trust Indicators in 2011 in Germany.
In: Current Issues in IT Security 2012, Duncker & Humblot, Freiburg, I, ISBN 978-3-86113-115-1,
[Conference or Workshop Item]

Karayumak, Fatih and Kauer, Michaela and Olembo, Maina and Volkamer, Melanie (2011):
Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System.
In: Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, Juli 2011, [Conference or Workshop Item]

Karayumak, Fatih and Kauer, Michaela and Olembo, Maina and Volk, Tobias and Volkamer, Melanie (2011):
User Study of the Improved Helios Voting System Interface.
In: Socio-Technical Aspects in Security and Trust (STAST), Milan (Italy), 06. - 08. September 2011, [Conference or Workshop Item]

Demirel, Denise and Henning, Maria and Ryan, Peter Y. A. and Schneider, Steve and Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, Tallinn, Estonia, 7187 2012, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Demirel, Denise and Frankland, Richard and Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]

Olembo, Maina and Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Karayumak, Fatih and Olembo, Maina and Kauer, Michaela and Volkamer, Melanie (2011):
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE), San Francisco (USA, CSA), August 2011, [Online-Edition: http://www.usenix.org/events/evtwote11/tech/],
[Conference or Workshop Item]

Volkamer, Melanie
Gutwirth, Serge and Poullet, Yves and Hert, Paul De (eds.) (2010):
Electronic Voting in Germany.
In: Data Protection in a Profiled World, Germany, [Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Weber, Stefan and Schmidt, Axel and Buchmann, Johannes
Davies, Jim and Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, 322, [Conference or Workshop Item]

Grimm, Rüdiger and Volkamer, Melanie
Ferro, Enrico and Scholl, Jochen and Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
In: Electronic Government 7th International Conference EGOV 2008, Koblenz, 27, [Conference or Workshop Item]

Hutter, Dieter and Volkamer, Melanie
Clark, John and Paige, Richard and Polack, Fiona and Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, York, UK, [Conference or Workshop Item]

Volkamer, Melanie and Krimmer, Robert
Horster, Patrick (ed.) (2006):
Overview Online-Wahlen.
In: D-A-CH Security 2006, [Conference or Workshop Item]

Hutter, Dieter and Klusch, Matthias and Volkamer, Melanie
Stormer, Henrik and Meier, Andreas and Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
In: Proceedings of the ECEH'06, Freiburg (Schweiz), 91, [Conference or Workshop Item]

Grimm, Rüdiger and Krimmer, Robert and Meißner, Nils and Reinhard, Kai and Volkamer, Melanie and Weinand, Marcel
Krimmer, Robert (ed.)
LNI, GI (Corporate Creators) (2006):
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006, Bonn, Gesellschaft für Informatik, pp. 203-212, [Book Section]

Krimmer, Robert and Volkamer, Melanie (2005):
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
In: Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005, Kopenhagen, 13, [Conference or Workshop Item]

["languages_typename_1" not defined]

Shirazi, Fatemeh and Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference or Workshop Item]

Vigil, Martín and Moecke, Cristian Thiago and Custódio, Ricardo Felipe and Volkamer, Melanie
De Capitani di Vimercati, Sabrina and Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: EuroPKI 2012, September 13-14, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Paul, Thomas and Stopczynski, Martin and Puscher, Daniel and Volkamer, Melanie and Strufe, Thorsten (2012):
C4PS: colors for privacy settings.
In: Proceedings of the 21st international conference companion on World Wide Web, ACM, Lyon, France, WWW '12 Companion, ISBN 978-1-4503-1230-1,
DOI: 10.1145/2187980.2188139,
[Conference or Workshop Item]

Shirazi, Fatemeh and Neumann, Stephan and Ciolacu, Ines and Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference or Workshop Item]

Frankland, Richard and Demirel, Denise and Budurushi, Jurlind and Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Volkamer, Melanie and Budurushi, Jurlind and Demirel, Denise (2011):
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045910,
[Conference or Workshop Item]

Volkamer, Melanie and Spycher, Oliver and Dubuis, Eric (2011):
Measures to Establish Trust in Internet Voting.
In: ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, ACM, Tallinn, Estonia, In: ICEGOV '11, DOI: http://doi.acm.org/10.1145/2072069.2072071,
[Conference or Workshop Item]

Spycher, Oliver and Volkamer, Melanie and Koenig, Reto
Lipmaa, Helger and Kiayias, Aggelos (eds.) (2011):
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: 3rd international conference on e-voting and identity (VoteID 2011), Springer, In: Springer LNCS, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_2,
[Conference or Workshop Item]

Langer, Lucie and Volkamer, Melanie and Schmidt, Axel and Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010), IEEE Computer Society, Krakow, Poland, ISBN 978-0-7695-3965-2,
[Conference or Workshop Item]

Schmidt, Axel and Heinson, Dennis and Langer, Lucie and Opitz-Talidou, Zoi and Richter, Philipp and Volkamer, Melanie and Buchmann, Johannes
Ryan, Johannes Y. A. and Schoenmakers, Berry (eds.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, Springer, Luxembourg, In: LNCS, 5767, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference or Workshop Item]

Langer, Lucie and Schmidt, Axel and Buchmann, Johannes and Volkamer, Melanie and Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: First International Workshop on Requirements Engineering for E-Voting Systems, Atlanta, GA, USA, In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, ISBN 978-0-7695-4100-6,
DOI: http://doi.ieeecomputersociety.org/10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

This list was generated on Tue Nov 19 00:11:19 2019 CET.