Veröffentlichungen


2021
Buchaufsätze
Human Factors in Security.
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden
Bücher
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings.
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.).
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Zeitschriftenaufsätze
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?.
Fraunhofer IOSB; Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
Proceedingsbeiträge
Usable Verifiable Secrecy-Preserving E-Voting.
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
SMILE - Smart eMaIl Link domain Extractor.
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2021. 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE). doi:10.5445/IR/1000137680
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
Krisam, C.; Dietmann, H.; Volkamer M.; Kulyk O.
2021. European Symposium on Usable Security (EuroUSEC 2021), 11-12 Oktober 2021, Association for Computing Machinery (ACM)
How to Increase Smart Home Security and Privacy Risk Perception.
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China
Vision: What Johnny learns about Password Security from Videos posted on YouTube.
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, Association for Computing Machinery (ACM)
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies.
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Who are you? Adventures in Authentication Workshop (WAY), 8. August 2021
Evaluation der interaktiven NoPhish Präsenzschulung.
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 Workshopband. doi:10.18420/muc2021-mci-ws14-394
A Literature Review on Virtual Reality Authentication.
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them.
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen.
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, CD-ROM, Gesellschaft für Informatik e.V.  (GI)
Forschungsberichte/Preprints
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen.
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2021. doi:10.5445/IR/1000137300
2020
Buchaufsätze
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You.
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Dissertationen
Secure and Usable User Authentication. Dissertation.
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Zeitschriftenaufsätze
Has the GDPR hype affected users’ reaction to cookie disclaimers?.
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1). doi:10.1093/cybsec/tyaa022
Phishing for Awareness.
Volkamer, M.; Sasse, M. A.; Böhm, F.
2020. KES, 36 (5), 6–11
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit.
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Biggest Failures in Security (Dagstuhl Seminar 19451).
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
Proceedingsbeiträge
Analysing Simulated Phishing Campaigns for Staff.
Volkamer, M.; Sasse, M. A.; Boehm, F.
2020. Computer Security : ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Edited by Ioana Boureanu, 312–328, Springer International Publishing. doi:10.1007/978-3-030-66504-3_19
An investigation of phishing awareness and education over time: When and how to best remind users.
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; von Landesberger, T.; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Forschungsberichte/Preprints
Reporting on insights gained into UK citizens’ perceptions of contactless card risks.
Aldag, L.; Renaud, K.; Berens, B.; Düzgün, R.; Mossano, M.; Volkamer, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000137542
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000120631
Poster
Aktivpause to Go – Evaluation einer Privacy Friendly App für Bewegungspausen.
Hildebrand, C.; Panter, L.; Thomann, M.; Volkamer, M.; Diener, J.; Beckmann, C.; Woll, A.
2020, November 26. Sport – Gesundheit – Digital (2020), Kaiserslautern, Deutschland, 26.–27. November 2020
2019
Zeitschriftenaufsätze
Web Application Security (Dagstuhl Seminar 18321).
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Keep on rating – on the systematic rating and comparison of authentication schemes.
Zimmermann, V.; Gerber, N.; Mayer, P.; Kleboth, M.; Preuschen, A. von; Schmidt, K.
2019. Information and computer security, 26 (5), 621–635. doi:10.1108/ICS-01-2019-0020
Sichere Instant Messaging Apps.
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”.
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt.
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
Proceedingsbeiträge
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections.
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik e.V.  (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations.
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
TCP at 100Gbit/s - Tuning, Limitations, Congestion Control.
Hock, M.; Veit, M.; Neumeister, F.; Bless, R.; Zitterbart, M.
2019. Proceedings of the 44th Annual IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, 14.-17. Oktober 2019, Institute of Electrical and Electronics Engineers (IEEE)
Why Johnny Fails to Protect his Privacy.
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users.
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads.
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness.
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Poster
Poster: On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Mayer, P.; Schwartz, C.; Volkamer, M.
2019. 15th Symposium on Usable Privacy and Security (SOUPS 2019), Santa Clara, CA, USA, 11.–13. August 2019
2018
Buchaufsätze
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Zeitschriftenaufsätze
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Tobias Hilt.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte.
Mayer, P.; Kunz, A.; Volkamer, M.
2018. Datenschutz und Datensicherheit, 42 (5), 307–310. doi:10.1007/s11623-018-0946-9
Proceedingsbeiträge
Branchenreport UX/Usability 2018.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2018-ws08-0542
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform.
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes.
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies.
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability.
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
Developing and Evaluating a Five Minute Phishing Awareness Video.
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
"This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018, Internet Societa
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?.
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login.
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, Advanced Computing Systems Association (USENIX)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness.
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Poster
Poster: Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 Posters), Baltimore, MD, USA, 12.–14.08.2018
Poster: "This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. 14th Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, USA, 12.–14. August 2018
2017
Zeitschriftenaufsätze
Coercion-resistant proxy voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation.
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Proceedingsbeiträge
Branchenreport UX/Usability 2017.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication.
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake.
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes.
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information.
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks.
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Poster
Analysis of the Security and Memorability of the Password Card.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, FL, December 4–8, 2017
Poster: Secure Storage of Masked Password.
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, F, April 26-28, 2017
2016
Zeitschriftenaufsätze
Spot the phish by checking the pruned URL.
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?.
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes.
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“.
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
Proceedingsbeiträge
Branchenreport UX/Usability 2016.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?.
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik e.V.  (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios.
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?.
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer Verlag
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
Forschungsberichte/Preprints
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2016. CRISP – Center for Research in Security and Privacy. doi:10.5445/IR/1000081968
2015
Bücher
Certification of ICTs in Elections.
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management.
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy.
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem.
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Proceedingsbeiträge
Exploring Mental Models Underlying PIN Management Strategies.
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture.
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015.
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode.
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security.
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability.
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von.
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps.
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study.
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
Forschungsberichte/Preprints
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems.
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Zeitschriftenaufsätze
Implementing and evaluating a software-independent voting system for polling station elections.
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?.
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
Proceedingsbeiträge
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Faraon, M.; Stenberg, G. J. H.; Budurushi, J.; Kaipainen, M.
2014. CeDEM Asia 2014. Conference for E-Democracy and Open Government, Hongkong, CHN, December 4-5, 2014. Ed.: M.M. Skoric, 191–205, Edition Donau-Universität Krems
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions.
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0.
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?.
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology.
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag GmbH
Coercion-Resistant Internet Voting in Practice.
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik e.V.  (GI)
Why doesn’t Jane protect her privacy?.
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik e.V.  (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?.
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses.
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik e.V.  (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study.
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms.
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns.
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
Forschungsberichte/Preprints
Expert Knowledge for Contextualized Warnings.
Bartsch, S.; Volkamer, M.
2014
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Henning, M.; Budurushi, J.; Volkamer, M.
2014. CASED
Poster
Poster: Password Entering and Transmission Security.
Canova, G.; Volkamer, M.; Weiler, S.
2014. 21st ACM Conference on Computer and Communications Security, CCS 2014, Scottsdale, United States, 3rd - 7th November 2014
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security.
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation.
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Proceedingsbeiträge
The Transitivity-of-Trust Problem in Android Application Interaction.
Bartsch, S.; Berger, B.; Bunke, M.; Sohr, K.
2013. 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, September 2-6, 2013. Ed.: G. Pernul, 291–96, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.39
Branchenreport UX/Usability 2013.
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles.
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik e.V.  (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik e.V.  (GI)
Mental Models of Verifiability in Voting.
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel.
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security.
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust.
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios.
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme.
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
Forschungsberichte/Preprints
On the security, privacy and usability of online seals.
Tschofenig, H.; Volkamer, M.; Jentzsch, N.; Fischer-Hübner, S.; Schiffner, S.; Tirtea, R.
2013. ENISA
Poster
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Northrop, E.; Lipford, H. R.; Bartsch, S.; Volkamer, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS), Newcastle, UK, July 24-26, 2013
Poster: On the Usability of Secure GUIs.
Nas, A.; Filyanov, A.; Volkamer, M.; Winandy, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS 2013), At Newcastle, UK, July 24-26, 2013
Towards a Practical Mobile Application for Election Authorities (Demo).
Neumann, S.; Kulyk, O.; Murati, L.; Volkamer, M.
2013. 4th International Conference on e-Voting and Identity - Vote-ID 2013, Guildford, UK, July 17-19, 2013
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer Verlag. doi:10.1007/978-3-642-35386-4_15
Bücher
Trust and Trustworthy Computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012, proceedings.
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer Verlag. doi:10.1007/978-3-642-30921-2
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Proceedingsbeiträge
Formal Treatment of Distributed Trust in Electronic Voting.
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012.
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents.
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer Verlag
Towards the Systematic Development of Contextualized Security Interventions.
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites.
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections.
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik e.V.  (GI)
Security versus Trust Indicators in 2011 in Germany.
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran Associates, Inc
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer Verlag. doi:10.1007/978-3-642-32747-6_2
Poster
C4PS: colors for privacy settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. 21st Annual Conference on World Wide Web Companion (WWW 2012), Lyon, Frankreich, 16.–20. April 2012
Sonstiges
C4PS - Colors for Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Association for Computing Machinery (ACM). doi:10.1145/2187980.2188139
2011
Zeitschriftenaufsätze
Vertrauensbildung bei Internetwahlen.
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit.
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung.
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Proceedingsbeiträge
Feasibility Analysis of Pret a Voter for German Federal Elections.
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface.
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas.
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting.
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying.
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems.
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Forschungsberichte/Preprints
Readiness of various eVoting systems for complex elections.
Demirel, D.; Frankland, R.; Volkamer, M.
2011. Universtität
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Olembo, M.; Volkamer, M.
2011. Center for Advanced Security Research Darmstadt (CASED)
Poster
Poster: Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System.
Karayumak, F.; Kauer, M.; Olembo, M.; Volkamer, M.
2011. SOUPS - 7th Symposium On Usable Privacy and Security, Carnegie Mellon University in Pittsburgh, PA, July 20-22, 2011
2010
Buchaufsätze
Electronic Voting in Germany.
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Zeitschriftenaufsätze
Evaluierungsverfahren für Internetwahlsysteme.
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Proceedingsbeiträge
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers.
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik e.V.  (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik e.V.  (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik e.V.  (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting.
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer Verlag. doi:10.1007/978-3-642-04135-8_6
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen.
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik e.V.  (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen
Towards the impact of the operational environment on the security of e-voting.
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik e.V.  (GI)
Determine the Resilience of Evaluated Internet Voting Systems.
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen.
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik e.V.  (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider.
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting.
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik e.V.  (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik e.V.  (GI)
2007
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile.
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting.
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer Verlag
Compliance of RIES to the proposed e-voting protection profile.
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer Verlag
Requirements and Evaluation Procedures for eVoting.
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
2006
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch.
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik e.V.  (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen.
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition.
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik e.V.  (GI)
Enabling the Application of Open Systems like PCs for Online Voting.
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting.
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik e.V.  (GI)
Multiple Cast in Online Voting - Analyzing Chances.
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Forschungsberichte/Preprints
2005
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System.
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik e.V.  (GI)