Home | english  | Impressum | Datenschutz | Sitemap | KIT
Kontakt

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe

   

Newsletter abbonieren
YouTube abonnieren

Externe Veranstaltungen
Dienstag, 31.Jul 2018
TrustCom 2018
Sonntag, 12.Aug 2018
USENIX SOUPS 2018
Mittwoch, 15.Aug 2018
USENIX S&P 2018

Weitere Veranstaltungen...

KASTEL

Karlsruher IT-Sicherheitsinitiative

Prof. Dr.  Melanie Volkamer

Prof. Dr. Melanie Volkamer

Gruppe: SECUSO
Sprechstunden: n.V.
Raum: 5C-02.2
CS 05.20

Tel.: +49 721 608-45045
melanie volkamerIsl9∂kit edu


Contact

PGP-Key: Key
Fingerprint: CB10 B22F E66F 67CB CEA7 ED61 70CB 0F34 BBFE D447

S/MIME-Certificate: Certificate

Curriculum Vitae

Prof. Dr. Melanie Volkamer is a full professor at KIT in the Department of Economics and Management. She leads the SECUSO research group. From August 2016 until March 2018 she was a Professor (Kooperationsprofessur) at the Department of Computer Science of Technische Universität Darmstadt  Germany). From December 2015 until December 2018, she has been appointed Full Professor for Usable Privacy and Security at Karlstad University (Sweden). Before she was an Assistant Professor at TU Darmstadt. Prof. Volkamer has been heading the research group "SECUSO - Security, Usability and Society" since 2011. From May 1st to August 31st 2011, she worked as a visiting researcher at CMU/CUPS.

Research Interests

  • Human factors in security and privacy
  • Mental models
  • Usable security and privacy
  • Awareness
  • Security education
  • Electronic voting

Education

10/2008       Ph.D. Degree Dr. rer. nat. from the University of Koblenz-Landau, with summa cum laude (meaning 'with highest honor')
Thesis: Evaluation of electronic voting. Requirements and evaluation procedures to support the responsible election authority.
Supervisors: Prof. R. Grimm, Prof. J. Schwenk
04/2004       Diploma in Computer Science Dipl.-Inform. from Saarland University with 1.2 (on a 1.0 to 4.0 scale while 1.0 being the best possible grade)
Thesis: Development and implementation of a voting protocol for council elections. 
Supervisors: Prof. J. Siekmann, Prof. D. Hutter

Academic Work Experiences

Since 01/2018 Professor (W3) for Security Engineering
Karlruhe Institute of Technology
08/2016-03/2018 Professor (W3 Kooperationsprofessur) for Security, Usability, and Society 
Technische Universität Darmstadt

12/2015-12/2017

Full Professor for Usable Privacy and Security (till end of March 2016 part time):

Karlstad University, Sweden

Privacy and Security Research Group

01/2012-08/2016

Assistant Professor (since April 2016 part time): Research Group SECUSO (Security, Usability and Society) at the Technische Universitat Darmstadt (TU Darmstadt) - successfully evaluated in 2014;

Head of the Usable Security Lab at the Center for Advanced Security Research 
Darmstadt (CASED)

12/2008-01/2012 Post Doctoral Researcher: TU Darmstadt / Research Area Coordinator: CASED
05/2011-07/2011 Guest Researcher: Carnegie Mellon University
03/2007-11/2008

Research Assistant: University of Passau

Research Manager: Institute of IT-Security and Security Law

01/2007-02/2007 Guest Researcher: TU Eindhoven
05/2004-12/2006

Research Assistant: German Research Center for Artificial Intelligence

Awards and Distinctions

2018 Best Paper Award System Software & Security: SAC 2018
2017 Highly Commended Award: Information and Computer Security 2017; Best Paper Award Runner-up: ARES 2017
2013 Best Paper Awards: TRUST 2013 and LexisNexis Best Paper Awards (Top10-Papaers)
2012

Best Paper Awards: ICIMP 2012 and EVOTE 2012

2011

Assistant Professorship: University of Bonn (rejected)

DAAD (German Academic Exchange Service) Post Doctoral Scholarship: Carnegie

Mellon University (Cylabs for Usable Privacy and Security, Prof. L. F. Cranor)
ERCIM Post Doctoral Scholarship at NTU und SBA Research (rejected)

2009

Winner: Ph.D. Award from the University of Koblenz-Landau

Nominated and citation: Ph.D. Award - German computer science society (GI)

2008

Invited Expert: German Federal Constitutional Court - evoting concerns

Invited Expert: Council of Europe - development of evoting recommendations

2007

Invited Expert: OSCE - election observation mission to Estonia (Internet voting)

Invited Expert: City of Hamburg - evoting concerns (digital election pen)

Invited Expert: Council of Europe - development of evoting recommendations 

DAAD Ph.D. Scholarship: Technical University Eindhoven (Prof. B. Schoenmakers)

2006 TED Scholarship: National University of Ireland (Prof. P. Gibson, Dr. M. McGaley)
2004

Diploma Thesis Award of the Federal Office for Information Security (BSI)

Projects

Teaching

Information about current and past teaching activites is provided here.

Supervision

Scientific Services

Conference/

Workshop

Organization

USEC 2017EuroUSEC (PETS pre-workshop) in Darmstadt 2016, E-Vote-ID 2016 in Bregenz, Innovations in Mobile Privacy and Security (ESSoS Workshop) 2016 in LondonSTAST (CSF Workshop) 2015 in VeronaUsable Security Day 2015 in DarmstadtEVOTE2012-2014 in Bregenz, E-Voting 2013 and RiskCom 2013 in Koblenz, TRUST 2012 Socio-economic Strand in ViennaUsable Security and Privacy in Darmstadt 2011Re-Vote2011 in Trient; eVoting Ph.D. Workshop 2006 in Saarbrücken, 2008 in Passau, 2009 in Darmstadt and 2011 in Krems; CAST Workshop eVoting 2008 - 2010 in Darmstadt; VOTE-ID 2007 in Bochum.

PC Membership/ Editorial Board

USEC 2016 and 2015; FC EVoting workshop 2016; IFIP SEC 2016, 2015 and 2011; TRUST COM 2015, 2012, and 2011; JETS – The USENIX Journal of Election Technology and Systems 2013 - 2015VOTE-ID 2007 - 2015SOUPS 2014 and 2012HICSS 2014HCI International 2013 and 2014 ’Human Aspects of Information Security, Privacy, and Trust’GI Security 2016, 2014, and 2010STAST 2011 - 2014EGOVIS & EDEM 2012 and 2014; TRUST 2012 and 2013IRIS 2006 - 2013; Book ’Design, development, and use of secure electronic voting Systems’ 2013; EVT/WOTE 2011 and 2012IWSSI 2012British HCI 2011CeDem 2011ARES 2006 - 2011EDem 2007 - 2011Re-Vote 2009 and 2011EVOTE 2006, 2008, and 2010E-Voting 2008 - 2010; CAST Award 2006 - 2009.

Reviewer CHI 2014 - 2016; Journal of Cybersecurity 2015; TDSC (IEEE Transactions on Dependable and Secure Computing Journal) 2014; IJHCS (International Journal of Human-Computer Studies) 2014; Computer & Security 2014; IEEE Security & Privacy 2013 and 2014; and JISA (Journal of Information Security and Applications) 2013.
Membership

ACM since 2014, GI since 2005; election official (GI elections 2005 and 2007); Head of GI group ECOM since 2010; GI working group (WG) CC-Schutzprofile since 2007; FIDIS Ph.D. consortium 2005 - 2007; IFIP WG ’Research on Information Systems in Public Administration’ since 2007 and ’Human Aspects of Information Security and Assurance’ since 2012; Deutscher Hochschulverband (DHV) since 2011.

Services at

TU Darmstadt

Several Ph.D. commission e.g. Delphine Christin, Sidi Mohamed El Yousfi Alaoui, Heike Schröder, Albrecht Petzoldt, Matthias Keil, Paul Baecher, Sebastian Biedermann, Sascha Hauke, Florian Folk, Martin Vagil, and Rachid El Bansarkhani; Equal opportunity commissioner of the department from 2012 - 2014; responsible for CASED gender equality activities 2008 - 2010; Search committee for the professorship in ’Cyber Peace’ (2014), ’Algebra’ (2012) and in ’Computer Vision’ (2010); Ethic commission 2012–2016; STIPET - graduate school commission 2013–2016.

Ph.D. Committees

(external)

'Shaping information security behaviors related to social engineering attacks' at KTH Royal Institute of Technology in Stockholm (2016); ’Modeling User Perception and Behavior when Intreacting with a Mobile Payment System’ at TU Berlin (2016);’Privacy and Security Risks Analysis of Identity Management Systems’ at Gjovik University College (2013); and ’Using Formal Methods for Building more Reliable and Secure e-Voting Systems’ at the University of Trento (2010).

Miscellaneous

Project proposal reviewer for the German Federal Ministry of Consumer Protection 2016, the Hasler Stiftung in 2016, the Swiss National Science Foundation (SNSF) in 2014 and 2015, the Luxembourg National Research Fund (FNR) 2014; Dagstuhl Seminars on electronic voting (invitation and participation) 2007 and 2011 as well as on ’Socio-Technical Security Metrics’ in 2014 and on ’Assessing ICT Security Risks in Socio-Technical Systems’ in 2016; Several security awareness events organized with the police, the Sparkasse Darmstadt, and the Consumer Protection Agency in 2014 and 2015; Search committee for chair ’Security’ at the University of Applied Science Minden (2013) and ’Security of Socio-Technical Systems’ (2013) at the University of Luxembourg.

Publikationen


2018
Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video [in press].
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2018, Regensburg, 5.-6. September 2018
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 Posters), Baltimore, MD, USA, 12.–14.08.2018
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2018. 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018, Internet Societa, Reston 8VY)
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; Käfer, O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, IEEE, Piscataway, NJ
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. 14th Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, August 12-14, 2018
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX, Berkeley, CA
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?.
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, ACM, New York, NY
Helping John to Make Informed Decisions on Using Social Login.
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, ACM, New York, NY
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios [in press].
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, USENIX Association, Berkeley (CA)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197-208, Köllen, Bonn. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1-13, ACM, New York (NY). doi:10.1145/3173574.3173750
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83-98, Springer Vieweg, Wiesbaden. doi:10.1007/978-3-658-19523-6_5
2017
Analysis of the Security and Memorability of the Password Card.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, Florida, USA, December 4–8, 2017
Addressing Misconceptions About Password Security Effectively [in press].
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, ACM. doi:10.1145/3167996.3167998
Coercion-resistant proxy voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88-99. doi:10.1016/j.cose.2017.06.007
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Article Nr.: 9, ACM, New York (NY). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13-28, USENIX Assoc., Berkeley (CA)
Don’t be Deceived: The Message Might be Fake.
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199-214, Springer, Cham. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria; Italy; 29 August - 1 September 2017, Article No.: 1/1-10, ACM, New York (NY). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562-569, IEEE, Piscataway (NJ). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137-151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation.
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308-313. doi:10.1007/s11623-017-0781-4
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139-167, Springer Gabler, Wiesbaden. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419-433, Springer, Cham
Secure Storage of Masked Password.
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 26-28, 2017
Election-Dependent Security Evaluation of Internet Voting Schemes.
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371-382, Springer, Cham. doi:10.1007/978-3-319-58469-0_25
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100-113. doi:10.1016/j.cose.2017.02.004
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information.
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675-690, Springer, Cham. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks.
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656-674, Springer, Cham. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien, Dieburg
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24-29. doi:10.1109/MSP.2017.70
2016
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik e.V., Bonn. doi:10.18420/muc2016-ws03-0001
Spot the phish by checking the pruned URL.
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372-385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8-26. doi:10.1016/j.jisa.2016.10.003
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik, Bonn
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, ACM, New York, NY. doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer, Cham
Why don't UK citizens protest against privacy-invading dragnet surveillance?.
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400-416. doi:10.1108/ICS-06-2015-0024
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145-155, University of Plymouth, Plymouth
SecIVo: a quantitative security evaluation framework for internet voting schemes.
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337-352. doi:10.1007/s12243-016-0520-0
Introducing Proxy Voting to Helios.
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98 - 106, IEEE, Piscataway, NJ. doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67-77, University of Plymouth, Plymouth
Memorable And Secure: How Do You Choose Your PIN?.
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156-166, University of Plymouth, Plymouth
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300-304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295-299. doi:10.1007/s11623-016-0599-5
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2016. CRISP – Center for Research in Security and Privacy, Darmstadt
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46-48, RWTH, Aachen
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135-149, Springer, Cham. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161-175, Springer, Cham. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3-16, Springer, Cham
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society, Reston, VA
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209-233, Springer, Berlin
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309-322. doi:10.1007/s12243-016-0510-2
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Congress Center Saarbruecken, Germany, 21 - 24 March, 2016, 357-371, IEEE, Piscataway (NJ). doi:10.1109/EuroSP.2016.35
2015
Nudging Bank Account Holders Towards More Secure PIN Management.
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. International journal of internet technology and secured transactions, 4 (2), 380 - 386. doi:10.20533/jitst.2046.3723.2015.0049
Certification of ICTs in Elections.
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreño, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance, Stockholm
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747-752. doi:10.1007/s11623-015-0512-7
Exploring Mental Models Underlying PIN Management Strategies.
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter .., 18-23, IEEE, Piscataway, NJ. doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture.
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94-104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa, Port Elizabeth
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431-440, ACM. doi:10.1145/2818000.2818043
A Socio-Technical Investigation into Smartphone Security.
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265-273, Springer, Cham. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training = On the effectiveness of anti-phishing training.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. 21st International Workshop on Intelligent and Personalized Human-Computer Interaction, ABIS 2015, Held at Humans and Computers 2015 Conference, Stuttgart, Germany, 6 th - 9th September 2015. Mensch und Computer 2015. Ed. A. Weisbecker, M. Burmester, A. Schmidt, 647-655, De Gruyter, Berlin/Boston
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104-121, Springer, Cham. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability.
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57-73, Springer, Cham. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von.
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224-229, IEEE, Piscataway, NJ. doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87-100, Springer, Cham. doi:10.1007/978-3-319-18500-2_8
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy.
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16-21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem.
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108-113. doi:10.1007/s11623-015-0375-y
Zertifizierte Apps.
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505-516, SecuMedia-Verl., Gau-Algesheim
NoPhish App Evaluation: Lab and Retention Study.
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society, Reston, VA
2014
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168-171, Universität, Bremen
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer, Cham. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1-10, IEEE, Piscataway (NJ). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1 - 8, IEEE, Piscataway, NJ. doi:10.1109/EVOTE.2014.7001140
What Deters Jane from Preventing Identification and Tracking on the Web?.
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107-116, ACM, New York (NY). doi:10.1145/2665943.2665963
Poster: Password Entering and Transmission Security.
Canova, G.; Volkamer, M.; Weiler, S.
2014. 21st ACM Conference on Computer and Communications Security, CCS 2014, Scottsdale, United States, 3rd - 7th November 2014
NoPhish: An Anti-Phishing Education App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188-192, Springer International Publishing, Cham
Shake hands to bedevil: Securing email with wearable technology.
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90-100, Centre for Security, Communications & Network Research, University, Plymouth
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415-1426, Köllen Druck+Verlag GmbH, Bonn
Coercion-Resistant Internet Voting in Practice.
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401-1414, Gesellschaft für Informatik, Bonn
Why doesn’t Jane protect her privacy?.
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244-262, Springer, Cham. doi:10.1007/978-3-319-08506-7_13
A holistic framework for the evaluation of internet voting systems.
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76-91, IGI Global, Hershey, PA
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207-2016, IEEE, Piscataway (NJ). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 2069-2078, Gesellschaft für Informatik, Bonn
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?.
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246-260, Springer, Cham. doi:10.1007/978-3-319-10178-1_20
Expert Knowledge for Contextualized Warnings.
Bartsch, S.; Volkamer, M.
2014
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses.
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit : Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Wien, Österreich, 19. - 21. März 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik, Bonn
Implementing and evaluating a software-independent voting system for polling station elections.
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1-10. doi:10.1016/j.jisa.2014.03.001
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141-152, Edition Donau-Universität, Krems
Building castles in quicksand: blueprint for a crowdsourced study.
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643-651, ACM Digital Library, New York (NY). doi:10.1145/2559206.2578861
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119-127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?.
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society, Reston, VA. doi:10.14722/usec.2014.23037
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Henning, M.; Budurushi, J.; Volkamer, M.
2014. CASED, Darmstadt
ACCESS: Describing and Contrasting Authentication Mechanisms.
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183-194, Springer, Cham. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns.
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, Crete, Greece, 22nd - 27th June 2014. Hrsg.: Theo Tryfonas, Ioannis Askoxylakis, 400-409, Springer, Cham. doi:10.1007/978-3-319-07620-1_35
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98-102
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172-182, Springer, Cham. doi:10.1007/978-3-319-07620-1_16
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27-61, IGI Global, Hershey (PA). doi:10.4018/978-1-4666-5820-2.ch002
2013
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Northrop, E.; Lipford, H. R.; Bartsch, S.; Volkamer, M.
2013. 9 th Symposium on Usable Privacy and Security (SOUPS), Newcastle, UK, July 24-26, 2013
Poster: On the Usability of Secure GUIs.
Nas, A.; Filyanov, A.; Volkamer, M.; Winandy, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS 2013), At Newcastle, UK, July 24-26, 2013
On the security, privacy and usability of online seals.
Tschofenig, H.; Volkamer, M.; Jentzsch, N.; Fischer-Hübner, S.; Schiffner, S.; Tirtea, R.
2013. ENISA, Heraklion, Greece
Mental Models: General Introduction and Review of Their Application to Human-Centred Security.
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255-280, Springer, Berlin. doi:10.1007/978-3-642-42001-6_18
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837-844, IEEE, Piscataway, NJ
Towards a Practical Mobile Application for Election Authorities (Demo).
Neumann, S.; Kulyk, O.; Murati, L.; Volkamer, M.
2013. International Conference on e-Voting and Identity, VoteID 2015, Bern, Switzerland, September 2-4, 2015
Towards A Practical JCJ / Civitas Implementation.
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804-818
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16-35. doi:10.4018/jisp.2013070102
Modeling the German Legal Latitude Principles.
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49-56, Springer, Berlin
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46-52, IEEE Digital Library, Piscataway, NJ. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752 - 766, Gesellschaft für Informatik, Bonn
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971-1984, Gesellschaft für Informatik, Bonn
Mental Models of Verifiability in Voting.
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather.., 142 - 155, Springer, Berlin. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel.
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed.: Schneider, Steve; Heather, James; Teague, Vanessa, 61-75, Springer, Berlin
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed.: Schneider, Steve; Heather, James; Teague, Vanessa, 176 - 192, Springer, Berlin. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198-207, IEEE, Piscataway, NJ. doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security.
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100-109, Springer, Berlin. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust.
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, United Kingdom, 17 - 19 June 2013, 205-222, Springer, Berlin. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios.
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12-22, Centre for Security, Communications & Network Research, Plymouth University, Plymouth
Developing and Testing a Visual Hash Scheme.
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91-100, Centre for Security, Communications & Network Research, Plymouth University, Plymouth
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: Saqib Saeed, Christopher G. Reddick, 172 - 201, Information science reference, Hershey. doi:10.4018/978-1-4666-3640-8.ch011
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277-284, Oesterreichische Computer Gesellschaft, Wien
2012
C4PS - Helping Facebookers Manage Their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer .. (ed.), 188–201, Springer, Berlin. doi:10.1007/978-3-642-35386-4_15
Formal Treatment of Distributed Trust in Electronic Voting.
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA, Wilmington, DE, USA
Trust and Trustworthy Computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012, proceedings.
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer, Berlin. doi:10.1007/978-3-642-30921-2
C4PS - Helping Facebookers Manage their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188-201, Springer, Berlin
The notary based PKI a lightweight PKI for long-term signatures on documents.
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85-97, Springer, Berlin
Towards the Systematic Development of Contextualized Security Interventions.
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410-418, New York, NY, ACM. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180-185, IEEE, Piscataway. doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites.
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215-220, Duncker & Humblot, Berlin
C4PS - Colors for Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web Companion, Lyon, France, April 16 - 20, 2012, 585-586, ACM, New York, NY
Partial Verifiability in POLYAS for the GI Elections.
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 95-109, Gesellschaft für Informatik, Bonn
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41-52. doi:10.1108/09685221311314419
Security versus Trust Indicators in 2011 in Germany.
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79-96, Duncker & Humblot, Berlin
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187-198, Ges. für Informatik, Bonn
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar .., 213-220, Curran, Red Hook, NY
2011
Readiness of various eVoting systems for complex elections.
Demirel, D.; Frankland, R.; Volkamer, M.
2011. Universtität, Darmstadt
Vertrauensbildung bei Internetwahlen.
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126-129
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Spycher, O.; Volkamer, M.; Koenig, R.
2011. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19-35, Springer, Berlin. doi:10.1007/978-3-642-32747-6_2
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Olembo, M.; Volkamer, M.
2011. Center for Advanced Security Research Darmstadt (CASED), Darmstadt
Gebrauchstaugliche Informationssicherheit.
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Feasibility Analysis of Pret a Voter for German Federal Elections.
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158-173, Springer, Berlin. doi:10.1007/978-3-642-32747-6_10
Gebrauchstaugliche Nutzerauthentifizierung.
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172-175
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37-46, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1-8, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127 - 134, IEEE Computer Society, Piscataway, NJ. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE '11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., USENIX Association, Berkeley, Calif.
User Study of the Improved Helios Voting System Interface.
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella .., 37-44, IEEE Digital Library, Piscataway, NJ. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas.
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47 -55, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting.
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1-10, ACM, New York, NY. doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying.
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287-300, Edition Donau-Universität, Krems
A Formal Approach Towards Measuring Trust in Distributed Systems.
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739-1745, ACM, New York, NY. doi:10.1145/1982185.1982548
Poster: Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System.
Karayumak, F.; Kauer, M.; Olembo, M.; Volkamer, M.
2011. SOUPS - 7th Symposium On Usable Privacy and Security, Carnegie Mellon University in Pittsburgh, PA, 20th - 22nd July, 2011
2010
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - Die Rolle der Rechtsinformatik, Tagungsband des 13. Internationalen Rechtsinformatik Symposium IRIS 2010, Salzburg, 24.-26.2.2010. Eds.: Erich Schweighofer, Anton Geist, Ines Staufer, 61-72, Österreichische Computer Gesellschaft, Wien
An Evaluation and Certification Approach to Enable Voting Service Providers.
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135-148, GI, Bonn
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89-107, GI, Bonn
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Castle Hofen, Bregenz, Austria, July 21st - 24th, 2010, 151-162, GI, Bonn
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Volkamer, M.; Schryen, G.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80-90
Evaluierungsverfahren für Internetwahlsysteme.
Volkamer, M.
2010. Information technology, 52 (3), 169-172. doi:10.1524/itit.2010.0587
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475-480, IEEE, Piscataway, NJ. doi:10.1109/ARES.2010.106
Electronic Voting in Germany.
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177-190, Springer, Dordrecht
2009
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Langer, L.; Schmidt, A.; Buchmann, J.; Volkamer, M.; Stolfik, A.
2009. 2009 First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 August 2010, 61–68, Piscataway, NJ, IEEE. doi:10.1109/RE-VOTE.2009.9
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203-210, ACM Press, New York, NY. doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827-1836, Gesellschaft für Informatik, Bonn
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837-1846, Köllen, Bonn
Towards the impact of the operational environment on the security of e-voting.
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814-1826, Gesellschaft für Informatik, Bonn
Developing a Legal Framework for Remote Electronic Voting.
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92-105, Springer, Berlin. doi:10.1007/978-3-642-04135-8_6
Determine the Resilience of Evaluated Internet Voting Systems.
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote'09), Atlanta, GA, August 31, 2009, 47-54, IEEE, Piscataway, NJ. doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen.
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301-310, Gesellschaft für Informatik, Bonn
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243-253, OCG Verlag, Wien
Verifizierbarkeit elektronischer Wahlen.
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20-21
Specification of a Voting Service Provider.
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9-18, IEEE, Piscataway, NJ. doi:10.1109/RE-VOTE.2009.8
2008
Trust Models for Remote Electronic Voting.
Grimm, R.; Volkamer, M.
2008. Electronic Government : 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, Italy 1-4 September, 2008. Eds.: Enrico Ferro, H. Jochen Scholl, Maria A. Wimmer, 197-204, Trauner Verlag, Linz, Donau
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429-436, Gesellschaft für Informatik, Bonn
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145-156, Boorberg Verlag, Stuttgart
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S.
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185-196, Gesellschaft für Informatik, Bonn
2007
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile.
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115-126, Österr. Computer-Ges., Wien
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434-440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692-695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766-768. doi:10.1007/s11623-007-0250-6
Requirements and Evaluation Techniques for Online-Voting.
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37-46, Universitätsverlag Rudolf Trauner, Linz
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1-15, Springer, Berlin
Compliance of RIES to the proposed e-voting protection profile.
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer, Berlin
Requirements and Evaluation Procedures for eVoting.
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895-902, IEEE Computer Society, Los Alamitos, Calif. doi:10.1109/ARES.2007.124
2006
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE '06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159-170, GI, Bonn
Die Online-Wahl auf dem Weg zum Durchbruch.
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98-113. doi:10.1007/s00287-006-0064-1
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S.
Overview Online-Wahlen.
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339-350, syssec, Klagenfurt
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH'06; Fribourg, Switzerland, October 12-13, 2006. Eds.: Henrik Stormer, Andreas Meier, Michael Schumacher, Michael, 59-70, GI, Bonn
Information Flow Control to Secure Dynamic Web Service Composition.
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196-210, Springer, Berlin. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418-425, GI, Bonn
Enabling the Application of Open Systems like PCs for Online Voting.
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting.
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203-212, GI, Bonn
Multiple Cast in Online Voting - Analyzing Chances.
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97-106
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340-347, IEEE, Los Alamitos, Calif.
2005
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225-232, Univ.-Verl. Trauner, Linz
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480-482
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer.. Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256-262, Boorberg, Stuttgart
2004
From Legal Principles to an Internet Voting System.
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111-120, GI, Bonn

Artikel 61

Artikel 61