TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | H | J | K | L | M | N | O | P | R | S | T | V | W | Z
Number of items at this level (without sub-levels): 260.

A

Alkassar, Ammar ; Volkamer, Melanie (2007):
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
[Article]

Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005):
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8, pp. 480-482. [Article]

B

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, pp. 1-10,
ACM, DOI: 10.1145/3098954.3098990,
[Conference or Workshop Item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), pp. 300-304. Springer Fachmedien Wiesbaden, DOI: 10.1007/s11623-016-0600-3,
[Article]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), pp. 309–322. Springer Paris, DOI: 10.1007/s12243-016-0510-2,
[Article]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Bachelor Thesis]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (eds.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 1 - 8,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: GI-Edition: Lecture Notes in Informatics, P-232, In: INFORMATIK 2014: Big Data - Komplexität meistern, pp. 1415-1426,
Gesellschaft für Informatik e.V., 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26.09.2014, ISSN 1617-5468, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, pp. 2069-2078,
Gesellschaft für Informatik, Bonn, [Conference or Workshop Item]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (eds.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: LNCS, 8533, In: Human Aspects of Information Security, Privacy and Trust, pp. 400-409,
Springer International Publishing Switzerland, Heraklion, Greece, [Conference or Workshop Item]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (eds.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, pp. 141-152,
Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2), pp. 1-10. DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference or Workshop Item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2), pp. 119-127. DOI: 10.9785/ovs-cr-2014-119,
[Article]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, pp. 168-171,
Bremen, [Conference or Workshop Item]

Buchmann, Johannes ; Neumann, Stephan (2014):
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2), pp. 98-102. Springer Gabler Verlag, [Article]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, pp. 1971-1984,
Gesellschaft für Informatik, Koblenz, [Conference or Workshop Item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 176 - 192,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), pp. 198-207,
IEEE, University of Regensburg, Germany, [Conference or Workshop Item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 61-75,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (eds.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), pp. 291 - 296,
IEEE, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (ed.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 752 - 766,
Koblenz, [Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (ed.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), pp. 205-222,
Springer, TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference or Workshop Item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012,
Birmingham, UK, [Conference or Workshop Item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012):
The Transitivity of Trust Problem in the Interaction of Android Applications.
(64-2012), ISBN 978-0-7695-5008-4,
DOI: 10.1109/ARES.2013.39,
[Report]

Bartsch, Steffen (2012):
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen,
[Ph.D. Thesis]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
In: Proceedings of the 21st European Conference on Information Systems (ECIS 2013),
London, UK, [Conference or Workshop Item]

Bartsch, Steffen ; Sasse, Angela
Ossowski, Sascha ; Lecca, Paola (eds.) (2012):
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
In: SAC '12, In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1502-1507,
ACM, Trento, Italy, ISBN 978-1-4503-0857-1,
DOI: 10.1145/2245276.2232015,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
In: NSS '11: Proceedings of the 5th International Conference on Network and System Security,
IEEE Computer Society, Milan, Italy, DOI: 10.1109/ICNSS.2011.6060003,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
Practitioners Perspectives on Security in Agile Development.
In: FARES: 6th International Workshop on Frontiers in Availability, Reliability and Security, pp. 479 - 484,
IEEE Computer Society, Vienna, Austria, DOI: 10.1109/ARES.2011.82,
[Conference or Workshop Item]

Bartsch, Steffen (2011):
An Authorization Enforcement Usability Case Study.
In: ESSoS 2011,
Springer, Madrid, Spain, DOI: 10.1007/978-3-642-19125-1_16,
[Conference or Workshop Item]

Bartsch, Steffen (2010):
A calculus for the qualitative risk assessment of policy override authorization.
In: SIN: Proceedings of the 3rd international conference on Security of information and networks, pp. 62--70,
ACM, Taganrog, Rostov-on-Don, Russian Federation, ISBN 978-1-4503-0234-0,
DOI: 10.1145/1854099.1854115,
[Conference or Workshop Item]

Bartsch, Steffen (2010):
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
In: SecSE: Fourth International Workshop on Secure Software Engineering,
IEEE Computer Society, Krakow, Poland, DOI: 10.1109/ARES.2010.19,
[Conference or Workshop Item]

Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009):
Supporting Agile Development of Authorization Rules for SME Applications.
In: TrustCol: 3rd International Workshop on Trusted Collaboration, pp. 461-471,
Springer, Orlando, FL, USA, DOI: 10.1007/978-3-642-03354-4_35,
[Conference or Workshop Item]

Bartsch, Steffen ; Bormann, Carsten
Horster, Patrick (ed.) (2008):
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]

C

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), pp. 87-100,
Springer, Hamburg, Germany, DOI: 10.1007/978-3-319-18500-2_8,
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015,
Internet Society, San Diego, [Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1418-1420,
New York, ACM, ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, November 3-7, 2014, ISBN 9781450334297,
DOI: 10.1145/2660267.2662387,
[Conference or Workshop Item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (eds.) (2014):
NoPhish: An Anti-Phishing Education App.
In: Lecture Notes in Computer Science, 8743, In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, pp. 188-192,
Springer International Publishing, Wroclaw, Poland, [Conference or Workshop Item]

D

Diefenbach, Sarah ; Tretter, Stefan ; Ullrich, Daniel ; Kolb, Nina
Endmann, Anja ; Fischer, Holger ; Krökel, Malte (eds.) (2015):
Branchenreport UX/Usability 2015.
In: Mensch und Computer 2015 – Usability Professionals, pp. 7-20,
De Gruyter Oldenbourg, [Conference or Workshop Item]

Diefenbach, Sarah ; Kolb, Nina ; Hassenzahl, Marc (2014):
The 'Hedonic' in Human-Computer Interaction – History, Contributions, and Future Research Directions.
In: Designing interactive systems, pp. 305-314,
ACM, Vancouver, Canada, ISBN 978-1-4503-2902-6,
DOI: 10.1145/2598510.2598549,
[Conference or Workshop Item]

Diefenbach, Sarah ; Kolb, Nina ; Ullrich, Daniel
Brau, Henning ; Lehmann, Andreas ; Petrovic, Kostanija ; Schroeder, Daniel C. (eds.) (2013):
Branchenreport UX/Usability 2013.
In: Tagungsband UP13,
German UPA e.V., [Conference or Workshop Item]

Diefenbach, Sarah ; Ullrich, Daniel ; Kolb, Nina
Brau, Henning ; Lehmann, Andreas ; Petrovic, Kostanija ; Schroeder, Nina C. (eds.) (2012):
Branchenreport Usability 2012.
In: Usability Professionals 2012, pp. 288-294,
German UPA e.V., [Conference or Workshop Item]

Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011):
Feasibility Analysis of Pret a Voter for German Federal Elections.
7187 2012, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 158-173,
Springer, Tallinn, Estonia, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_10,
[Conference or Workshop Item]

Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011):
Readiness of various eVoting systems for complex elections.
[Report]

Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (eds.) (2011):
Voting software to support election preparation, counting, and tallying.
In: CeDEM11: Proceedings of the International Conference for E-Democracy and Open Government, pp. 287-300,
Donau-Universität Krems, Conference for E-Democracy and Open Government (CeDEM11), Krems, Austria, 05.-06.05.2011, ISBN 978-3-902505-20-0,
[Conference or Workshop Item]

Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011):
Vertrauensbildung bei Internetwahlen.
In: Digma - Zeitschrift für Datenrecht und Informationssicherheit, pp. 126-129,
[Conference or Workshop Item]

Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
Horster, Patrick (ed.) (2008):
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
In: D.A.CH. Security 2008,
syssec Verlag, [Conference or Workshop Item]

F

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (eds.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, pp. 191-205,
Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference or Workshop Item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (eds.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: GI-Edition: Lecture Notes in Informatics, 232, In: INFORMATIK 2014: Big Data - Komplexität meistern, pp. 1401-1414,
Gesellschaft für Informatik e.V., 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26.09.2014, ISSN 1617-5468, ISBN 978-3-88579-626-8,
[Conference or Workshop Item]

Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011):
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 37-46,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045914,
[Conference or Workshop Item]

Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011):
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, p. 14. [Article]

G

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference or Workshop Item]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, pp. 83-98, Springer, [Book Section]

Gerber, Nina ; Gerber, Paul ; Drews, Hannah ; Kirchner, Elisa ; Schlegel, Noah ; Schmidt, Tim ; Scholz, Lena (2017):
FoxIT: Enhancing Mobile Users' Privacy Behavior by Increasing Knowledge and Awareness [to appear].
In: Workshop on Socio-Technical Aspects in Security and Trust,
ACM, Orlando, Florida, ISBN 978-1-4503-6357-0/17/12,
DOI: 10.1145/3167996.3167999,
[Conference or Workshop Item]

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Usable Security: Ziele der Usability und Security ausbalancieren (MuC Workshop),
Gesellschaft für Informatik e.V., Regensburg, [Conference or Workshop Item]

Gerber, Nina ; Gerber, Paul ; Hernando, Maria
Tryfonas, Theo (ed.) (2017):
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 640-655,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_44,
[Conference or Workshop Item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 656-674,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference or Workshop Item]

Ghiglieri, Marco (2017):
Smart TV Privacy Risks and Protection Measures.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, pp. 139-167,
Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference or Workshop Item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), pp. 8-26. DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference or Workshop Item]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 156-166,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10., In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 145-155,
University of Plymouth, Frankfurt, Germany, [Conference or Workshop Item]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, 14 (3), pp. pp. 61-67. [Article]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, pp. 67-84,
Dreseden, [Conference or Workshop Item]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4, In: Journal of Internet Technology and Secured Transaction (JITST), pp. 380 - 386,
Infonomics Society, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference or Workshop Item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress,
[Conference or Workshop Item]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2), pp. 108 - 113. DOI: 10.1007/s11623-015-0375-y,
[Article]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1), pp. 16-21. DOI: 10.1145/2738210.2738214,
[Article]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC,
Las Vegas, NV, [Conference or Workshop Item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (eds.) (2014):
HbbTV – aktueller Stand 2014.
11/2014, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien,
[Conference or Workshop Item]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy, San Jose, California, 18.5.2014, [Conference or Workshop Item]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: 6, In: Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 629 - 634,
IEEE, Budapest, Hungary, DOI: 10.1109/PerComW.2014.6815279,
[Conference or Workshop Item]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
In: Computer Security Symposium 2013, pp. 518-525,
Tokyo, Jōhō Shori Gakkai, Computer Security Symposium 2013, Kagawa, Japan, 21-23 October, 2013, [Conference or Workshop Item]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012):
Technical Aspects of Online Privacy.
[Report]

Ghiglieri, Marco ; Fürnkranz, Johannes (2010):
Learning to Recognize Missing E-mail Attachments.
In: Applied Artificial Intelligence, 24 (5), pp. 443-462. [Article]

Gharadaghy, Rojan ; Volkamer, Melanie (2010):
Verifiability in Electronic Voting - Explanations for Non Security Experts.
In: LNI, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 151-162,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 89-107,
ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Ghiglieri, Marco ; Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
(TUD-KE-2009-05), [Report]

Ghiglieri, Marco (2009):
Thunderbird-Plugin zur Attachment-Prüfung.
TU Darmstadt, [Master Thesis]

Ghiglieri, Marco ; Fürnkranz, Johannes (2009):
Learning To Recognize Missing E-mail Attachments.
[Report]

Grimm, Rüdiger ; Volkamer, Melanie
Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (eds.) (2008):
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Band 1, In: GI Jahrestagung, pp. 429-436,
München, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie (2008):
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
In: LNI, 131, In: Electronic Voting - 3rd International Conference, pp. 185-196,
Gesellschaft für Informatik, [Conference or Workshop Item]

Grimm, Rüdiger ; Volkamer, Melanie
Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (eds.) (2008):
Trust Models for Remote Electronic Voting.
27, In: Electronic Government 7th International Conference EGOV 2008, pp. 197-204,
Koblenz, [Conference or Workshop Item]

Ghiglieri, Marco (2007):
Flexible - Eine erweiterbare {GUI} für den FlexiProvider (Frontend).
Technische Universität Darmstadt, [Master Thesis]

Grimm, Rüdiger ; Volkamer, Melanie (2007):
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
[Report]

Grimm, Rüdiger ; Volkamer, Melanie
Krimmer, Robert (ed.) (2006):
Multiple Cast in Online Voting - Analyzing Chances.
In: Springer LNI, 86, In: Electronic Voting 2006 - $2^{nd}$ International Conference, pp. 97-106,
[Conference or Workshop Item]

Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
Krimmer, Robert LNI, GI (eds.) (2006):
Security Requirements for Non-political Internet Voting.
86, In: Electronic Voting (EVOTE) 2006, pp. 203-212, Bonn, Gesellschaft für Informatik, ISBN 978-3-88579-180-5,
[Book Section]

H

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), pp. 154-158. [Article]

Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012):
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
In: Proceedings of the 15th International Legal Informatics Symposium (IRIS 2012), pp. 213-220,
Salzburg, Austria, [Conference or Workshop Item]

Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007):
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6), pp. 434-440. [Article]

Hutter, Dieter ; Volkamer, Melanie
Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (eds.) (2006):
Information Flow Control to Secure Dynamic Web Service Composition.
In: Security in Pervasive Computing, pp. 196-210,
York, UK, [Conference or Workshop Item]

Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (eds.) (2006):
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
91, In: Proceedings of the ECEH'06, pp. 59-70,
Freiburg (Schweiz), [Conference or Workshop Item]

J

Jonker, Hugo ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
Compliance of RIES to the proposed e-voting protection profile.
In: VOTE-ID'07, 4896, In: Proceedings of the 1st international conference on E-voting and identity, pp. 50--61,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

K

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Coercion resistant proxy voting.
In: Computers & Security, 71, pp. 88-99. DOI: 10.1016/j.cose.2017.06.007,
[Article]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569,
IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference or Workshop Item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292, In: International Conference on Human-Computer Interaction (HCII), pp. 675-690,
Springer, DOI: 10.1007/978-3-319-58460-7_46,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), pp. 24-29. DOI: 10.1109/MSP.2017.70,
[Article]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, pp. 419-433,
Springer, [Conference or Workshop Item]

Kolb, Nina
Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (eds.) (2016):
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
In: Mensch und Computer 2016 - Tagungsband,
Gesellschaft für Informatik e.V., Aachen, DOI: 10.18420/muc2016-mci-0075,
[Conference or Workshop Item]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, pp. 98 - 106,
IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference or Workshop Item]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, pp. 509--518,
Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, pp. 3-16,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, pp. 209-233,
Springer, Barbados, [Conference or Workshop Item]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC),
Internet Society., San Diego, California, ISBN 1891562428,
[Conference or Workshop Item]

Kolb, Nina ; Diefenbach, Sarah ; Niklas, Susanne
Endmann, Anja ; Fischer, Holger ; Krökel, Malte (eds.) (2015):
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
In: Mensch und Computer 2015 – Usability Professionals, pp. 113-122,
De Gruyter Oldenbourg, Stuttgart, [Conference or Workshop Item]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (eds.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, pp. 57-73,
Springer, Bern, Switzerland, [Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, pp. 224-229,
IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference or Workshop Item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558), pp. 1-19. International Association for Cryptologic Research (IACR), [Article]

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, pp. 1-10,
IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference or Workshop Item]

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
8533, In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science,
Springer, Cham, Heraklion, Greece, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference or Workshop Item]

Kolb, Nina ; Diefenbach, Sarah ; Ullrich, Daniel (2014):
Berichte aus der Usability/UX Branche: Ausbildungswege, Arbeitsfeld und aktuelle Diskussionen.
In: i-com Zeitschrift für interaktive und kooperative Medien, 13 (1), DOI: 10.1515/icom-2014-0011,
[Article]

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Marinos, Louis ; Askoxylakis, Ioannis (eds.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Lecture Notes in Computer Science, 8030, In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, pp. 100-109,
Springer, First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, ISBN ISBN 978-3-642-39345-7,
[Conference or Workshop Item]

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012):
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
In: Lecture notes in computer science, 7344, Berlin, Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
Suri, Neeraj ; Waidner, Michael (eds.) (2012):
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
In: LNI, 195, In: Sicherheit, pp. 187-198,
GI, Darmstadt, Germany, ISBN 978-3-88579-289-5,
[Conference or Workshop Item]

Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von Max-Planck Institut für ausländisches und internationales Strafrecht (eds.) (2012):
The Influence of trustworthiness of website layout on security perception of websites.
18, In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie, pp. 215-220, Berlin, Duncker & Humblot, ISBN 978-3-428-13887-6,
[Book Section]

Krimmer, Robert ; Volkamer, Melanie (2008):
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
[Report]

Krimm, Rüdiger ; Volkamer, Melanie (2008):
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
In: Komplexitäatsgrenzen der Rechtsinformatik - Tagungsband des 11 Internationalen Rechtsinformation Symposium IRIS 2008, pp. 145-156,
Boorberg Verlag, [Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie
Krishna, Jaya ; Agarwal, Naveen Kumar (eds.) (2008):
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
In: The Icfai University Press, In: E-Voting - Perspectives and Experiences,
[Conference or Workshop Item]

Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007):
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4), p. 225. DOI: 10.1108/10650740710834626,
[Article]

Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
Alkassar, Ammar ; Volkamer, Melanie (eds.) (2007):
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
In: VOTE-ID'07, 4896, In: E-Voting and Identity, First International Conference, VOTE-ID 2007, pp. 1-15,
Springer-Verlag, Bochum, Germany, ISBN 3-540-77492-0, 978-3-540-77492-1,
[Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie (2005):
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
13, In: Electronic Government - Workshop and Poster Proceedings of the Fourth International EGOV Conference 2005, pp. 225-232,
Kopenhagen, [Conference or Workshop Item]

Krimmer, Robert ; Volkamer, Melanie
Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (eds.) (2005):
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
In: Boorberg Verlag, In: Effizienz von e-Lösungen in Staat und Gesellschaft, Aktuelle Fragen zur Rechtsinformatik IRIS 2005, pp. 256-262,
[Conference or Workshop Item]

L

Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010):
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
In: Proceedings: The Fifth International Conference on Availability, Reliability and Security, pp. 475-480,
IEEE, 5th International Conference on Availability, Reliability and Security, Krakow, Poland, 15.-18.02.2010, ISBN 978-1-4244-5880-6,
[Conference or Workshop Item]

Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
In: Proceedings of 3rd International Conference on Theory and Practice of Electronic Governance (ICEGOV2009), pp. 203-210,
ACM Press, Bogota, Colombia, ISBN 978-1-60558-663-2,
[Conference or Workshop Item]

Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
Davies, Jim ; Janowski, Tomasz (eds.) (2009):
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
322, In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, pp. 203-210,
Bogota, [Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009):
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.9, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 61-68,
Atlanta, GA, USA, ISBN 978-0-7695-4100-6,
DOI: 10.1109/RE-VOTE.2009.9,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Classifying Privacy and Verifiability Requirements for Electronic Voting.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1837-1846,
[Conference or Workshop Item]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009):
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4, [Article]

Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Prosser, Alexander ; Parycek, Peter (eds.) (2009):
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
In: Proceedings of EDEM 2009 ; Tagungsband Elektronische Demokratie in Österreich, pp. 243-253,
OCG Verlag, [Conference or Workshop Item]

M

Marky, Karola ; Kulyk, Oksana ; Renaud, Karen ; Volkamer, Melanie (2018):
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
In: Conference on Human Factors in Computing Systems (CHI), pp. 176:1-176:13,
ACM, Montreal, QC, Canada, DOI: 10.1145/3173574.3173750,
[Conference or Workshop Item]

Marky, Karola ; Kulyk, Oksana ; Volkamer, Melanie
Langweg, Hanno ; Meier, Michael ; Witt, Bernhard C. ; Reinhardt, Delphine (eds.) (2018):
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
In: SICHERHEIT 2018, pp. 197-208,
Bonn, Gesellschaft für Informatik e.V., Konstanz, Germany, DOI: 10.18420/sicherheit2018_15,
[Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie (2017):
Addressing Misconceptions About Password Security Effectively [to appear].
In: Workshop on Socio-Technical Aspects in Security and Trust,
ACM, Orlando, Florida, ISBN 978-1-4503-6357-0/17/12,
DOI: 10.1145/3167996.3167998,
[Conference or Workshop Item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Analysis of the Security and Memorability of the Password Card.
In: ACSAC 2017 Posters,
Orlando, Florida, [Conference or Workshop Item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security,
DOI: 10.1145/3098954.3098986,
[Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters,
[Conference or Workshop Item]

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2), pp. 137-151. DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords,
Springer LNCS, [Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1817-1819,
ACM, Vienna, Austria, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference or Workshop Item]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), pp. 67-77,
University of Plymouth, Frankfurt, [Conference or Workshop Item]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575, In: 1st International Workshop on Innovations in Mobile Privacy and Security, pp. 46-48,
CEUR Workshop Proceedings, [Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, pp. 431-440,
ACM, Los Angeles, CA, USA, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference or Workshop Item]

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, pp. 505-516,
SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference or Workshop Item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (eds.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Lecture notes in computer science, 8880, In: Information Systems Security : International Conference on Information Systems Security (ICISS), pp. 204-225,
Berlin, Cham, Springer International Publishing, International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference or Workshop Item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21, pp. 41-52. DOI: 10.1108/09685221311314419,
[Article]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, pp. 75-85. DOI: 10.1108/09685221311314419,
[Article]

Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Kohler, Jonathan ; Carlos, Marcelo Carlomagno (2010):
Uma ICP baseada em certificados digitais autoassinados.
In: X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, pp. 91-104,
[Conference or Workshop Item]

N

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502, In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, pp. 371-382,
Springer, Rome, Italy, DOI: 10.1007/978-3-319-58469-0_25,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, pp. 1-16. DOI: 10.1007/s12243-016-0520-0,
[Article]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11), pp. 747-752. DOI: 10.1007/s11623-015-0512-7,
[Article]

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), pp. 69 - 72,
TUT Press, Lochau, [Conference or Workshop Item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (eds.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: Lecture Notes in Computer Science, 8650, In: 3rd International Conference on Electronic Government and the Information Systems Perspective, pp. 246-260,
Springer, München, ISBN 978-3-319-10177-4,
[Conference or Workshop Item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, pp. 198-207,
IEEE, Fribourg, Switzerland, [Conference or Workshop Item]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 27-61, IGI Global, [Book Section]

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (eds.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
In: Design, Development, and Use of Secure Electronic Voting Systems, pp. 76-91, IGI Global, [Book Section]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (ed.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, pp. 804-818,
Koblenz, [Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (eds.) (2013):
Modeling the German Legal Latitude Principles.
In: Lecture Notes in Computer Science, 8075, In: 5th International Conference on eParticipation (ePart 2013), pp. 49-56,
Springer, Koblenz, Germany, [Conference or Workshop Item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464), pp. 1-12. International Association for Cryptologic Research (IACR), [Article]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13),
[Conference or Workshop Item]

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
pp. 1-2, Menlo Park, California, [Conference or Workshop Item]

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Conference or Workshop Item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), pp. 277-284,
Salzburg, Austria, [Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), pp. 180-185,
IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference or Workshop Item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Formal Treatment of Distributed Trust in Electronic Voting.
ICIMP 2012, The Seventh I, In: The Seventh International Conference on Internet Monitoring and Protection (ICIMP 2012), pp. 30-39,
ThinkMind Digital Library, Stuttgart. Germany, ISBN 978-1-61208-201-1,
[Conference or Workshop Item]

Nogueira, Hendri ; Custódio, Ricardo Felipe ; Moecke, Cristian Thiago ; Wangham, Michelle (2011):
Using Notary Based Public Key Infrastructure in Shibboleth Federation.
In: Workshop de Gestão de Identidades - WGID/SBSeg, pp. 405-414,
[Conference or Workshop Item]

O

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC),
Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference or Workshop Item]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (eds.) (2013):
Mental Models of Verifiability in Voting.
In: Lecture Notes in Computer Science, 7985, In: 4th International Conference on e-Voting and Identity (VoteID13), pp. 142 - 155,
Springer, University of Surrey, Guildford, UK, [Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (eds.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
pp. 172 - 201, IGI Global, ISBN 978-1-4666-3640-8,
DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book Section]

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (ed.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), pp. 91-100,
[Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J. ; Volkamer, Melanie ; Grimm, Rüdiger (eds.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: LNI - Lecture Notes in Informatics, 205, In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), pp. 95-109,
Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, ISBN 978-3-88579-299-4,
[Conference or Workshop Item]

Olembo, Maina ; Volkamer, Melanie (2011):
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
[Report]

Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011):
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
In: Proceedings of the Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 127 - 134,
IEEE Computer Society, Vienna, Austria, [Conference or Workshop Item]

Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007):
Denial-of-Service Flooding Detection in Anonymity Networks.
pp. 1-6, [Conference or Workshop Item]

P

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Colors for Privacy Settings.
In: Proceedings of the World Wide Web Conference (WWW), pp. 585-586,
[Conference or Workshop Item]

Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012):
C4PS - Helping Facebookers Manage their Privacy Settings.
In: Proceedings of SocInfo, pp. 188-201,
[Conference or Workshop Item]

R

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4), pp. 400-415. DOI: 10.1108/ICS-06-2015-0024,
[Article]

Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“,
Gesellschaft für Informatik e.V., Aachen, Germany, [Conference or Workshop Item]

Renaud, Karen ; Flowerday, Stephen ; Othmane, Lotfi Ben ; Volkamer, Melanie (2015):
"I Am Because We Are": Developing and Nurturing an African Digital Security Culture.
In: African Cyber Citizenship Conference 2015,
[Conference or Workshop Item]

Renaud, Karen ; Volkamer, Melanie (2015):
Exploring Mental Models Underlying PIN Management Strategies.
In: World Congress on Internet Security (WorldCIS 2015), pp. 18-23,
IEEE, [Conference or Workshop Item]

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance,
Lulu Press, Raleigh, [Conference or Workshop Item]

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: 8533, In: Human Aspects of Information Security, Privacy, and Trust, pp. 183-194,
Springer, Heraklion, Crete, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference or Workshop Item]

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems,
ACM Digital Library, New York, [Conference or Workshop Item]

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, pp. 837-844,
Krakow, [Conference or Workshop Item]

Richter, Philipp ; Langer, Lucie ; Hupf, Katharina ; Volkamer, Melanie ; Buchmann, Johannes
Schweighöfer, Erich ; Geist, Anton ; Staufer, Ines (eds.) (2010):
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
In: Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, pp. 61-72,
Salzburg, [Conference or Workshop Item]

S

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 135-149,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016, In: Datenschutz und Datensicherheit, pp. 295-299,
DOI: 10.1007/s11623-016-0599-5,
[Conference or Workshop Item]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, pp. 647-655,
A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, [Conference or Workshop Item]

Shirazi, Fatemeh ; Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), pp. 107-116,
ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference or Workshop Item]

Sohr, Karsten ; Bartsch, Steffen ; Volkamer, Melanie ; Berger, Bernhard ; Bodden, Eric ; Brucker, Achim ; Maseberg, Sönke ; Kus, Mehmet ; Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: Lecture Notes in Informatics, 228, In: GI Sicherheit 2014, pp. 283--291,
Gesellschaft für Informatik e.V., Wien, ISBN 978-3-88579-622-0,
[Conference or Workshop Item]

Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: 7, In: International Journal of Information Security and Privacy (IJISP), 7 (3), pp. 16-35. DOI: 10.4018/jisp.2013070102,
[Article]

Stopczynski, Martin ; Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid,
VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference or Workshop Item]

Schläpfer, Michael ; Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: ACM, In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, pp. 410-418,
Albany, NY, USA, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference or Workshop Item]

Shirazi, Fatemeh ; Neumann, Stephan ; Ciolacu, Ines ; Volkamer, Melanie (2011):
Robust Electronic Voting: Introducing robustness in Civitas.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, pp. 47 -55,
Trento, Italy, DOI: 10.1109/REVOTE.2011.6045915,
[Conference or Workshop Item]

Schryen, Guido ; Volkamer, Melanie ; Habib, Sheikh Mahbub ; Ries, Sebastian (2011):
A Formal Approach Towards Measuring Trust in Distributed Systems.
In: Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 1739-1745,
ACM, Taichung, Taiwan, ISBN 978-1-4503-0113-8,
DOI: 10.1145/1982185.1982548,
[Conference or Workshop Item]

Spycher, Oliver ; Volkamer, Melanie ; Koenig, Reto
Lipmaa, Helger ; Kiayias, Aggelos (eds.) (2011):
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
In: Springer LNCS, In: 3rd international conference on e-voting and identity (VoteID 2011), pp. 19-35,
Springer, ISBN 978-3-642-32746-9,
DOI: 10.1007/978-3-642-32747-6_2,
[Conference or Workshop Item]

Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
Krimmer, Robert ; Grimm, Rüdiger (eds.) (2010):
An Evaluation and Certification Approach to Enable Voting Service Providers.
In: LNI, 167, In: Electronic Voting 2010, EVOTE 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria, pp. 135-148,
GI, ISBN 978-3-88579-261-1,
[Conference or Workshop Item]

Schmidt, Axel ; Heinson, Dennis ; Langer, Lucie ; Opitz-Talidou, Zoi ; Richter, Philipp ; Volkamer, Melanie ; Buchmann, Johannes
Ryan, Johannes Y. A. ; Schoenmakers, Berry (eds.) (2009):
Developing a Legal Framework for Remote Electronic Voting.
In: LNCS, 5767, In: E-Voting and Identity, Second International Conference, VOTE-ID 2009, pp. 92-105,
Springer, Luxembourg, ISBN 978-3-642-04134-1,
DOI: 10.1007/978-3-642-04135-8_6,
[Conference or Workshop Item]

Schmidt, Axel ; Langer, Lucie ; Buchmann, Johannes ; Volkamer, Melanie (2009):
Specification of a Voting Service Provider.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.8, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 9-18,
ISBN 978-0-7695-4100-6,
DOI: 10.1109/RE-VOTE.2009.8,
[Conference or Workshop Item]

Schmidt, Axel ; Volkamer, Melanie ; Langer, Lucie ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Towards the impact of the operational environment on the security of e-voting.
In: LNI, 154, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V. (GI), pp. 1814-1826,
Gesellschaft für Informatik, [Conference or Workshop Item]

T

Tretter, Stefan ; Diefenbach, Sarah ; Ullrich, Daniel ; Gerber, Nina
Hess, Stefan ; Fischer, Holger (eds.) (2017):
Branchenreport UX/Usability 2017.
61, In: Mensch und Computer 2017 - Usability Professionals,
Gesellschaft für Informatik e.V., Regensburg, DOI: 10.18420/muc2017-up-0207,
[Conference or Workshop Item]

Tretter, Stefan ; Diefenbach, Sarah ; Ullrich, Daniel ; Gerber, Nina
Hess, Stefan ; Fischer, Holger (eds.) (2016):
Branchenreport UX/Usability 2016.
In: Mensch und Computer 2016 - Usability Professionals,
Gesellschaft für Informatik e.V. und die German UPA e.V., Aachen, [Conference or Workshop Item]

Tschofenig, Hannes ; Volkamer, Melanie ; Jentzsch, Nicola ; Fischer-Hübner, Simone ; Schiffner, Stefan ; Tirtea, Rodica (2013):
On the security, privacy and usability of online seals.
[Report]

V

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71, pp. 100-113. DOI: 10.1016/j.cose.2017.02.004,
[Article]

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), pp. 372-385. DOI: 10.1108/ICS-07-2015-0032,
[Article]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), pp. 161-175,
Springer, Ghent, Belgium, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (ed.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, pp. 265-273,
Springer, [Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (eds.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), pp. 104-121,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Lecture Notes in Computer Science, In: Privacy Enhancing Technologies - 14th International Symposium, PETS, pp. 244-262,
Springer, Amsterdam, The Netherlands, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference or Workshop Item]

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Lecture Notes in Computer Science, 8260, In: Number Theory and Cryptography, pp. 255-280, Springer Berlin Heidelberg, ISBN 978-3-642-42000-9,
DOI: 10.1007/978-3-642-42001-6_18,
[Book Section]

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, pp. 46-52,
IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference or Workshop Item]

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
University Plymouth (ed.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), pp. 12-22,
Lisbon, Spain, [Conference or Workshop Item]

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (eds.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: LNCS, In: EuroPKI 2012, September 13-14, pp. 85-97,
Springer, Pisa, Italy, ISBN 978-3-642-40011-7,
[Conference or Workshop Item]

Volkamer, Melanie ; Karayumak, Fatih ; Kauer, Michaela ; Halim, Dhanish ; Bruder, Ralph (2012):
Security versus Trust Indicators in 2011 in Germany.
I, In: Current Issues in IT Security 2012, pp. 79-96,
Duncker & Humblot, Freiburg, ISBN 978-3-86113-115-1,
[Conference or Workshop Item]

Volkamer, Melanie ; Budurushi, Jurlind ; Demirel, Denise (2011):
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE'11), pp. 1-8,
IEEE, Trento, Italy, ISBN 978-1-4577-0951-7,
DOI: 10.1109/REVOTE.2011.6045910,
[Conference or Workshop Item]

Volkamer, Melanie ; Spycher, Oliver ; Dubuis, Eric (2011):
Measures to Establish Trust in Internet Voting.
In: ICEGOV '11, In: ICEGOV 2011, Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance, pp. 1-10,
ACM, Tallinn, Estonia, DOI: 10.1145/2072069.2072071,
[Conference or Workshop Item]

Volkamer, Melanie ; Schryen, Guido (2010):
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
In: 23rd Bled eConference, Bled, Slovenia, June 20-23,
[Conference or Workshop Item]

Volkamer, Melanie (2010):
Evaluierungsverfahren für Internetwahlsysteme.
In: IT-Information Technology, 52 (3), pp. 169-172. ISSN 2196-7032,
DOI: 10.1524/itit.2010.0587,
[Article]

Volkamer, Melanie
Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (eds.) (2010):
Data Protection in a Profiled World.
pp. 177-190, Springer, [Book Section]

Volkamer, Melanie
Gutwirth, Serge ; Poullet, Yves ; Hert, Paul De (eds.) (2010):
Electronic Voting in Germany.
In: Data Protection in a Profiled World, pp. 177-190,
Germany, [Conference or Workshop Item]

Volkamer, Melanie ; Schryen, Guido ; Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes
Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (eds.) (2009):
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
LNI, In: Informatik 2009: Im Focus das Leben, Beiträge der 39. Jahrestagung der Gesellschaft für Informatik e.V., pp. 1827-1836,
[Conference or Workshop Item]

Volkamer, Melanie ; Grimm, Rüdiger (2009):
Determine the Resilience of Evaluated Internet Voting Systems.
In: IEEE CS Digital Library, doi: 10.1109/RE-VOTE.2009.2, In: First International Workshop on Requirements Engineering for E-Voting Systems, pp. 47-54,
[Conference or Workshop Item]

Volkamer, Melanie
Wagner, Dorothea ; Bernstein, Abraham (eds.) (2009):
Evaluation von Internetwahlsystemen.
In: LNI, D-9, In: Ausgezeichnete Informatikdissertationen 2008,, pp. 301-310,
Gesellschaft für Informatik, [Conference or Workshop Item]

Volkamer, Melanie (2009):
Evaluation of Electronic Voting : Requirements and Evaluation Procedures to Support Responsible Election Authorities.
Berlin, Heidelberg, New York, Springer, ISBN 978-3-642-01661-5,
[Book]

Volkamer, Melanie ; Vogt, Roland (2008):
Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte.
(BSI-PP-0037-2008), [Article]

Volkamer, Melanie ; McGaley, Margaret (2007):
Requirements and Evaluation Procedures for eVoting.
In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, pp. 895-902,
IEEE Computer Society, [Conference or Workshop Item]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
In: Datenschutz und Datensicherheit, 10, pp. 766-768. [Article]

Volkamer, Melanie ; Hauff, Harald (2007):
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
In: Datenschutz und Datensicherheit, 9, pp. 692-695. [Article]

Volkamer, Melanie ; Krimmer, Robert
Grönlund, Ake ; Scholl, Jochen ; Wimmer, Maria (eds.) (2007):
Requirements and Evaluation Techniques for Online-Voting.
In: Schriftreihe Informatik, 24, In: Electronic Government 6th International EGOV Conference, pp. 37-46,
Universitätsverlag Rudolf Trauner, [Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert ; Grimm, Rüdiger
Prosser, Alexander ; Parycek, Peter (eds.) (2007):
Independent Audits of Remote Electronic Voting -- Developing a Common Criteria Protection Profile.
In: OCG Verlag, In: Proceedings of EDEM 2007; Tagungsband Elektronische Demokratie in "Osterreich, pp. 115-126,
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert
Hochberger, Christian ; Liskowsky, Rüdiger (eds.) (2006):
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
93, In: Informatik 2006 - Informatik f�ur Menschen, pp. 418-425,
Dresden, [Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert
Horster, Patrick (ed.) (2006):
Overview Online-Wahlen.
In: D-A-CH Security 2006, pp. 339-350,
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
E-Voting in Estland: Analyse der ersten rechtsgültig durchgeführten landesweiten Internet-Wahl.
[Report]

Volkamer, Melanie ; Krimmer, Robert (2006):
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
[Report]

Volkamer, Melanie ; Alkassar, Ammar ; Sadeghi, Ahmad-Reza ; Schulz, Stefan (2006):
Enabling the Application of Open Systems like PCs for Online Voting.
In: Frontiers in Electronic Elections -- FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-Enabling_the_applicat ion_of_open_systems_like-PCs_for_Online_Voting.pdf},
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
In: {IEEE Computer Society} % todo eigenlich publisher, In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, pp. 340-347,
[Conference or Workshop Item]

Volkamer, Melanie ; Vogt, Roland (2006):
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
In: In Frontiers in Electronic Elections - FEE '06, url{http://fee.iavoss.org/2006/papers/fee-2006-iavoss-New-Generation-of-Vot ing-Machines-in-Germany.pdf},
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Observing Voter's Anonymity: Guide on how to Observe Electronic Voting.
[Report]

Volkamer, Melanie ; Reinhard, Walter ; Vogt, Roland
Dittmann, Jana (ed.) (2006):
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
In: Springer LNI, 77, In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp. 159-170,
[Conference or Workshop Item]

Volkamer, Melanie ; Krimmer, Robert (2006):
Die Online-Wahl auf dem Weg zum Durchbruch.
In: Informatik Spektrum, 29 (2), pp. 98-113. [Article]

Volkamer, Melanie ; Hutter, Dieter
Prosser, Alexander ; Krimmer, Robert (eds.) (2004):
From Legal Principles to an Internet Voting System.
In: Springer LNI, 47, In: Electronic Voting in Europe - Technology, Law, Politics and Society, pp. 111-120,
[Conference or Workshop Item]

W

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015):
Certification of ICTs in Elections.
Stockholm, International Institute for Democracy and Electoral Assistance, ISBN 978-91-7671-028-9,
[Book]

Z

Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (eds.) (2017):
Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, pp. 269-277, Norderstedt, Gesellschaft für Informatik, ISBN 978-3-7460-8210-3,
DOI: 10.18420/muc2017-ws05-0404,
[Book Section]

Zimmermann, Verena ; Gerber, Nina
Tryfonas, Theo (ed.) (2017):
“If it wasn’t secure, they would not use it in the movies” Security Perceptions and User Acceptance of Authentication Technologies.
10292, In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, pp. 265-283,
Springer, Cham, Vancouver, Canada, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7_18,
[Conference or Workshop Item]

This list was generated on Thu Jun 1 01:28:41 2023 CEST.