Veröffentlichungen


2025
Zeitschriftenaufsätze
SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques
Veit, M. F.; Wiese, O.; Ballreich, F. L.; Volkamer, M.; Engels, D.; Mayer, P.
2025. Computers & Security, 150, 104197. doi:10.1016/j.cose.2024.104197
Proceedingsbeiträge
Literature Review: Misconceptions About Phishing
Mossano, M.; Volkamer, M.
2025. Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I, 215–228, Springer Nature Switzerland. doi:10.1007/978-3-031-72559-3
Forschungsberichte/Preprints
Restricting the Link: Effects of Focused Attention and Time
Petelka, J.; Berens, B.; Sugatan, C.; Volkamer, M.; Schaub, F.
2025. Institute of Electrical and Electronics Engineers (IEEE). doi:10.5445/IR/1000175479
2024
Dissertationen
When Awareness Fades and There Is No Support, the Phisher Has an Easy Game. Dissertation
Berens, B. M.
2024, Juli 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000172096
Zeitschriftenaufsätze
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
Berens, B. M.; Mossano, M.; Volkamer, M.
2024. Computers & Security, 137, Art.-Nr.: 103620. doi:10.1016/j.cose.2023.103620
Cookie disclaimers: Dark patterns and lack of transparency
Berens, B. M.; Bohlender, M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2024. Computers & Security, 136, Art.-Nr.: 103507. doi:10.1016/j.cose.2023.103507
Proceedingsbeiträge
“Data Protection Can Sometimes Be a Nuisance” A Notification Study on Data Sharing Practices in City Apps
Drescher, J. N.; Moser, J.; Strangmann, N.; Spinner, J.; Herrmann, D.; Volkamer, M.
2024. Proceedings of Mensch und Computer 2024 (MuC’24). Ed. A. Maedche, 8 S., Association for Computing Machinery (ACM). doi:10.18420/muc2024-mci-ws17-159
Design and Evaluation of Verifiable Voting Systems Based on Tracking Code Verification
Nissen, C.; Kulyk, O.; Volkamer, M.; Friedrich, L. E.; Hermansen, H.
2024. Electronic voting : 9th international joint conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024 : proceedings
Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP)
Ballreich, F. L.; Volkamer, M.
2024. Mensch und Computer 2024 (MuC), Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-152
Usability and Understanding of Individual Verifiability in the 2023 GI-Election
Hilt, T.; Matheis, P.; Volkamer, M.
2024. Mensch und Computer 2024 – Workshopband, September 2024, Karlsruhe, Germany, Gesellschaft für Informatik (GI). doi:10.18420/muc2024-mci-ws17-151
Recommendations for Implementing Independent Individual Verifiability in Internet Voting
Moser, F.; Grimm, R.; Hilt, T.; Kirsten, M.; Niederbudde, C.; Volkamer, M.
2024. 9th International Joint Conference on Electronic Voting (E-Vote-ID 2024), Gesellschaft für Informatik (GI)
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing
Bohlender, M.; Morisco, R.; Mossano, M.; Schwarz, T.; Volkamer, M.
2024. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Vienna, 8th-12th July 2024, 650 – 657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW61312.2024.00079
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners
Kriecherbauer, T.; Schwank, R.; Krauss, A.; Neureither, K.; Remme, L.; Volkamer, M.; Herrmann, D.
2024. ARES ’24: Proceedings of the 19th International Conference on Availability, Reliability and Security, 1–7, Association for Computing Machinery (ACM). doi:10.1145/3664476.3664499
Of Mothers and Managers – The Effect of Videos Depicting Gender Stereotypes on Women and Men in the Security and Privacy Field
Gerber, N.; Stöver, A.; Mayer, P.
2024. Proceedings of the Twentieth Symposium on Usable Privacy and Security, Advanced Computing Systems Association (USENIX)
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool
Berens, B. M.; Schaub, F.; Mossano, M.; Volkamer, M.
2024. Proceedings of the CHI Conference on Human Factors in Computing Systems, 1–60, Association for Computing Machinery (ACM). doi:10.1145/3613904.3642843
Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication for Virtual Reality
Länge, T.; Matheis, P.; Düzgün, R.; Volkamer, M.; Mayer, P.
2024. Symposium on Usable Security and Privacy (USEC) 2024 : Co-located with NDSS Symposium 2024, San Diego, CA, 26th February - 1st March 2024. doi:10.14722/usec.2024.23092
Exploring Phishing Threats through QR Codes in Naturalistic Settings
Sharevski, F.; Mossano, M.; Veit, M. F.; Schiefer, G.; Volkamer, M.
2024. Symposium on Usable Security and Privacy (USEC) 2024. doi:10.14722/usec.2024.23050
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024. Voting’24, Springer
Forschungsdaten
Systematic User Evaluation of a Second Device based cast-as-intended verifiability Approach
Hilt, T.; Berens, B.; Truderung, T.; Udovychenko, M.; Neumann, S.; Volkamer, M.
2024, Februar 27. doi:10.35097/1934
2023
Buchaufsätze
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
Volkamer, M.; Mayer, A.; Neumann, S.; Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Müller-Quade, J.
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Zu Risiken und Anonymisierungen von Verhaltensbiometrie
Hanisch, S.; Todt, J.; Volkamer, M.; Strufe, T.
2023. Daten-Fairness in einer globalisierten Welt. Ed.: M. Friedewald, 423–444, Nomos Verlagsgesellschaft. doi:10.5771/9783748938743-423
Zeitschriftenaufsätze
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen
Gutjahr, A.; Spiecker gen. Döhmann, I.; Volkamer, M.
2023. Computer und Recht, 39 (11), 767–776. doi:10.9785/cr-2023-391124
Awareness, Intention, (In)Action: Individuals’ Reactions to Data Breaches
Mayer, P.; Zou, Y.; Lowens, B. M.; Dyer, H. A.; Le, K.; Schaub, F.; Aviv, A. J.
2023. ACM Transactions on Computer-Human Interaction, 30 (5), 1–53. doi:10.1145/3589958
Weiterleitungs-URLs in E-Mails – Technische und rechtliche Aspekte
Müllmann, D.; Veit, M. F.; Volkamer, M.
2023. Datenschutz und Datensicherheit - DuD, 47 (5), 275–282. doi:10.1007/s11623-023-1761-5
Proceedingsbeiträge
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US
Noah, N.; Mayer, P.; Das, S.
2023. CSCW ’23 Companion: Companion Publication of the 2023 Conference on Computer-Supported Cooperative Work and Social Computing, (CSCW ’23 Companion), Minneapolis, 14th-18th October 2023, 317 – 322, Association for Computing Machinery (ACM). doi:10.1145/3584931.3607007
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers
Munyendo, C. W.; Mayer, P.; Aviv, A. J.
2023. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 3123–3137, Association for Computing Machinery (ACM). doi:10.1145/3576915.3623150
Identifying Factors Studied for Voter Trust in E-Voting – Review of Literature
Erb, Y.; Duenas-Cid, D.; Volkamer, M.
2023. E-Vote-ID 2023
Encouraging Organisational Information Security Incident Reporting
Ballreich, F. L.; Volkamer, M.; Müllmann, D.; Berens, B. M.; Häußler, E. M.; Renaud, K. V.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 224–236, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617098
Voter Perception of Cast-as-Intended Verifiability in the Estonian I-Vote Protocol
Hilt, T.; Sein, K.; Mällo, T.; Willemson, J.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
German Social Elections 2023: An Overview and first Analysis
Hilt, T.; Kulyk, O.; Volkamer, M.
2023. E-Vote-ID 2023, Gesellschaft für Informatik (GI)
Influence of URL Formatting on Users’ Phishing URL Detection
Mossano, M.; Kulyk, O.; Berens, B. M.; Häußler, E. M.; Volkamer, M.
2023. Proceedings of the 2023 European Symposium on Usable Security, 318–333, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617111
A user-centred approach to facilitate locating company security policies : Nutzerzentrierter Ansatz zur Vereinfachung des Auffindens von Security Policies
Aldag, L.; Ballreich, F.; Berens, B.; Volkamer, M.
2023. MuC ’23: Proceedings of Mensch und Computer. Ed.: M. Stolze, 173–185, Association for Computing Machinery (ACM). doi:10.1145/3603555.3603573
Vision: What the hack is going on? A first look at how website owners became aware that their website was hacked
Hennig, A.; Thi Thanh Vuong, N.; Mayer, P.
2023. EuroUSEC ’23: Proceedings of the 2023 European Symposium on Usable Security, 312–317, Association for Computing Machinery (ACM). doi:10.1145/3617072.3617101
Council of Europe Guidelines on the Use of ICT in Electoral Processes
Driza Maurer, A.; Volkamer, M.; Krimmer, R.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 585–599, Springer International Publishing. doi:10.1007/978-3-031-25460-4_34
Why Is Online Voting Still Largely a Black Box?
Kirsten, M.; Volkamer, M.; Beckert, B.
2023. Computer Security. ESORICS 2022 International Workshops – CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers. Ed.: S. Katsikas, 555–567, Springer International Publishing. doi:10.1007/978-3-031-25460-4_32
German Voters’ Attitudes Towards Voting Online with a Verifiable System
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2023. Financial Cryptography and Data Security. FC 2022 International Workshops – CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers, Ed.: S. Matsuo, 33 –350, Springer International Publishing. doi:10.1007/978-3-031-32415-4_23
Forschungsberichte/Preprints
Poster
Beware of website hackers: Developing an awareness video to warn for website hacking
Hennig, A.; Schmidt-Enke, L.; Mutter, M.; Mayer, P.
2023, August. 19th Symposium on Usable Privacy and Security. Co-located with USENIX Security ’23 (SOUPS 2023), Anaheim, CA, USA, 6.–8. August 2023
Ihre Website wurde gehackt: Awareness schaffen für ein unsichtbares Problem
Hennig, A.; Mayer, P.; Volkamer, M.
2023. 2023 Nationale Konferenz IT-Sicherheitsforschung : Die digital vernetzte Gesellschaft stärken (2023), Berlin, Deutschland, 13.–15. März 2023
2022
Proceedingsbeiträge
Individual Verifiability with Return Codes: Manipulation Detection Efficacy
Thürwächter, P. T.; Volkamer, M.; Kulyk, O.
2022. Electronic Voting – 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings. Ed.: R. Krimmer, 139–156, Springer International Publishing. doi:10.1007/978-3-031-15911-4_9
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security Gründen
Müllmann, D.; Veit, M. F.; Volkamer, M.
2022. Informatik 2022. Hrsg.: D. Demmler, 601–615, Gesellschaft für Informatik (GI). doi:10.18420/inf2022_49
Design and Evaluation of an Anti-Phishing Artifact Based on Useful Transparency
Beckmann, C.; Berens, B.; Kühl, N.; Mayer, P.; Mossano, M.; Volkamer, M.
2022. International Workshop on Socio-Technical Aspects in Security
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays
Länge, T.; Matheis, P.; Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Mensch und Computer 2022 - Workshopband. Ed.: K. Marky, Gesellschaft für Informatik (GI). doi:10.18420/muc2022-mci-ws01-462
Cookie Disclaimers: Impact of Design and Users’ Attitude
Berens, B. M.; Dietmann, H.; Krisam, C.; Kulyk, O.; Volkamer, M.
2022. Proceedings of the 17th International Conference on Availability, Reliability and Security, 1–20, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539008
Shoulder-Surfing Resistant Authentication for Augmented Reality
Düzgün, R.; Mayer, P.; Volkamer, M.
2022. Nordic Human Computer Interaction Conference (NordiCHI ’22), Art.Nr. 29, ACM Digital Library. doi:10.1145/3546155.3546663
Increasing security without decreasing usability: A comparison of various verifiable voting systems
Volkamer, M.; Kulyk, O.; Ludwig, J.; Fuhrberg, N.
2022. Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), Boston, MA, August 8-9, 2022, 233–252, USENIX Association
Why Users (Don’t) Use Password Managers at a Large Educational Institution
Mayer, P.; Munyendo, C. W.; Mazurek, M. L.; Aviv, A. J.
2022. 31st USENIX Security Symposium (USENIX Security 22), 1849–1866, USENIX Association
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria, Art.-No.: 36, Association for Computing Machinery (ACM). doi:10.1145/3538969.3539011
Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why?
Hennig, A.; Dietmann, H.; Lehr, F.; Mutter, M.; Volkamer, M.; Mayer, P.
2022. Human Aspects of Information Security and Assurance. Ed.: N. Clarke, 218–227, Springer-Verlag. doi:10.1007/978-3-031-12172-2_17
"I don’t know why I check this...’’ - Investigating Expert Users’ Strategies to Detect Email Signature Spoofing Attacks
Mayer, P.; Poddebniak, D.; Fischer, K.; Brinkmann, M.; Somorovsky, J.; Sasse, M. A.; Schinzel, S.; Volkamer, M.
2022. Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 77–96, USENIX Association
Standing out among the daily spam: How to catch website owners’ attention by means of vulnerability notifications
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. Conference on Human Factors in Computing Systems (CHI ’22) : Extended Abstracts, Art.-Nr.: 317, Association for Computing Machinery (ACM). doi:10.1145/3491101.3519847
SMILE - Smart eMaIl Link Domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2022. Computer Security. ESORICS 2021 International Workshops – CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021, Revised Selected Papers. Ed.: S. Katsikas, 403–412, Springer International Publishing. doi:10.1007/978-3-030-95484-0_23
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), co-located with the Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, April 23, 2022. doi:10.14722/usec.2022.23075
Your website has been hijacked: Raising awareness for an invisible problem
Hennig, A.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Ed.: C. Wressnegger, 1–6, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_18
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Forschungsberichte/Preprints
Development and Evaluation of an Anti-Phishing Shooting Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000153329
Research Opportunities in Evidence-Based Elections
Benaloh, J.; Stark, P. B.; Teague, V.; Volkamer, M.; Wallach, D.
2022. Computing Research Association (CRA)
Poster
How to best inform website owners about vulnerabilities on their websites
Hennig, A.; Neusser, F.; Pawelek, A. A.; Herrmann, D.; Mayer, P.
2022. European Symposium on Usable Security (EuroUSEC 2022), Karlsruhe, Deutschland, 29.–30. September 2022
The Phishing Master Anti-Phishing Game
Dietmann, H.; Länge, T.; Matheis, P.; Pawelek, A. A.; Berens, B.; Mossano, M.; Veit, M.; Mayer, P.; Volkamer, M.
2022, Dezember 8. Annual Computer Security Applications Conference (ACSAC 2022), Austin, TX, USA, 5.–9. Dezember 2022
PassSec+ - An addon that protects your passwords, payment data and privacy
Veit, M. F.; Volkamer, M.
2022, August 8. 18th/31st Symposium on Usable Privacy and Security / Co-located with USENIX Security (SOUPS 2022), Online, 7.–9. August 2022
2021
Buchaufsätze
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5
Bücher
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Hrsg.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Zeitschriftenaufsätze
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, K.; Volkamer, M.; Mayer, P.; Grimm, R.
2021. AIS transactions on human-computer interaction, 13 (4), 407–430. doi:10.17705/1thci.00155
NoPhish-Challenge-Karten – Evaluation in der Praxis
Aldag, L.; Berens, B.; Burgdorf, M.; Lorenz, A.; Thiery, M.-C.; Volkamer, M.
2021. Datenschutz und Datensicherheit - DuD, 45 (11), 721–726. doi:10.1007/s11623-021-1523-1
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
Proceedingsbeiträge
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik (GI). doi:10.18420/muc2021-mci-wsc-394
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021, 1–10
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_74
Forschungsberichte/Preprints
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2021. doi:10.5445/IR/1000137300
2020
Buchaufsätze
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Dissertationen
Secure and Usable User Authentication. Dissertation
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Zeitschriftenaufsätze
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1), Article: tyaa022. doi:10.1093/cybsec/tyaa022
Phishing for Awareness
Volkamer, M.; Sasse, M. A.; Böhm, F.
2020. KES, 36 (5), 6–11
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Biggest Failures in Security (Dagstuhl Seminar 19451)
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
Proceedingsbeiträge
Aktivpause to Go
Hildebrand, C.; Panter, L.; Thomann, M.; Volkamer, M.; Diener, J.; Beckmann, C.; Woll, A.
2020. Sports, Movement & Health. Hrsg.: M. Sprenger, 94–97, Technische Universität Kaiserslautern (TU )
Analysing Simulated Phishing Campaigns for Staff
Volkamer, M.; Sasse, M. A.; Boehm, F.
2020. Computer Security : ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Edited by Ioana Boureanu, 312–328, Springer International Publishing. doi:10.1007/978-3-030-66504-3_19
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
An investigation of phishing awareness and education over time: When and how to best remind users
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; Landesberger, T. von; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Forschungsberichte/Preprints
Reporting on insights gained into UK citizens’ perceptions of contactless card risks
Aldag, L.; Renaud, K.; Berens, B.; Düzgün, R.; Mossano, M.; Volkamer, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000137542
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000120631
Poster
Aktivpause to Go – Evaluation einer Privacy Friendly App für Bewegungspausen
Hildebrand, C.; Panter, L.; Thomann, M.; Volkamer, M.; Diener, J.; Beckmann, C.; Woll, A.
2020, November 26. Sport – Gesundheit – Digital (2020), Kaiserslautern, Deutschland, 26.–27. November 2020
2019
Buchaufsätze
E-Voting – An Overview of the Development in the Past 15 Years and Current Discussions
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.
2019. Electronic Voting – 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedings. Ed.: R. Krimmer, 1–13, Springer. doi:10.1007/978-3-030-30625-0_1
Zeitschriftenaufsätze
Web Application Security (Dagstuhl Seminar 18321)
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Keep on rating – on the systematic rating and comparison of authentication schemes
Zimmermann, V.; Gerber, N.; Mayer, P.; Kleboth, M.; Preuschen, A. von; Schmidt, K.
2019. Information and computer security, 26 (5), 621–635. doi:10.1108/ICS-01-2019-0020
Sichere Instant Messaging Apps
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
Proceedingsbeiträge
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
TCP at 100Gbit/s - Tuning, Limitations, Congestion Control
Hock, M.; Veit, M.; Neumeister, F.; Bless, R.; Zitterbart, M.
2019. Proceedings of the 44th Annual IEEE Conference on Local Computer Networks (LCN 2019), Osnabrück, 14.-17. Oktober 2019, Institute of Electrical and Electronics Engineers (IEEE)
Why Johnny Fails to Protect his Privacy
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Poster
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Mayer, P.; Schwartz, C.; Volkamer, M.
2019. 15th Symposium on Usable Privacy and Security (SOUPS 2019), Santa Clara, CA, USA, 11.–13. August 2019
2018
Buchaufsätze
Human Factors in Security
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Zeitschriftenaufsätze
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Hilt, T.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte
Mayer, P.; Kunz, A.; Volkamer, M.
2018. Datenschutz und Datensicherheit, 42 (5), 307–310. doi:10.1007/s11623-018-0946-9
Effektiver Schutz vor betrügerischen Nachrichten - Ein Schulungsprogramm zur Erkennung betrügerischer Nachrichten für KMU
Neumann, S.; Reinheimer, B.; Volkamer, M.; Kunz, A.; Schwartz, C.
2018. Datenschutz und Datensicherheit, 42 (5), 301–306. doi:10.1007/s11623-018-0945-x
Proceedingsbeiträge
Assistance in Daily Password Generation Tasks
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Branchenreport UX/Usability 2018
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-ws08-0542
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
Developing and Evaluating a Five Minute Phishing Awareness Video
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
"This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018, Internet Societa
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, Advanced Computing Systems Association (USENIX)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen Druck+Verlag. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Poster
Poster: Addressing Misconceptions About Password Security Effectively
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (2018), Baltimore, MD, USA, 12.–14. August 2018
"This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. 14th Symposium on Usable Privacy and Security. Co-located with USENIX Security ’23 (SOUPS 2018), Baltimore, MD, USA, 12.–14. August 2018
2017
Zeitschriftenaufsätze
Coercion-resistant proxy voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Proceedingsbeiträge
Branchenreport UX/Usability 2017
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Poster
Analysis of the Security and Memorability of the Password Card
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, FL, December 4–8, 2017
Poster: Secure Storage of Masked Password
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, F, April 26-28, 2017
2016
Zeitschriftenaufsätze
Spot the phish by checking the pruned URL
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
Proceedingsbeiträge
Branchenreport UX/Usability 2016
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer-Verlag
ZeTA-zero-trust authentication: Relying on innate human ability, not technology
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
Forschungsberichte/Preprints
Security Proofs for Participation Privacy and Stronger Verifiability for Helios
Bernhard, D.; Kulyk, O.; Volkamer, M.
2016. CRISP – Center for Research in Security and Privacy. doi:10.5445/IR/1000081968
2015
Bücher
Certification of ICTs in Elections
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Proceedingsbeiträge
Exploring Mental Models Underlying PIN Management Strategies
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
Forschungsberichte/Preprints
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Zeitschriftenaufsätze
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
Proceedingsbeiträge
Positive but skeptical - A study of attitudes towards Internet voting in Sweden
Faraon, M.; Stenberg, G. J. H.; Budurushi, J.; Kaipainen, M.
2014. CeDEM Asia 2014. Conference for E-Democracy and Open Government, Hongkong, CHN, December 4-5, 2014. Ed.: M.M. Skoric, 191–205, Edition Donau-Universität Krems
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag
Coercion-Resistant Internet Voting in Practice
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik (GI)
Why doesn’t Jane protect her privacy?
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
Forschungsberichte/Preprints
Expert Knowledge for Contextualized Warnings
Bartsch, S.; Volkamer, M.
2014
Öffentlichkeitsgrundsatz und Stimmzettelbelege
Henning, M.; Budurushi, J.; Volkamer, M.
2014. CASED
Poster
Poster: Password Entering and Transmission Security
Canova, G.; Volkamer, M.; Weiler, S.
2014. 21st ACM Conference on Computer and Communications Security, CCS 2014, Scottsdale, United States, 3rd - 7th November 2014
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer-Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Proceedingsbeiträge
The Transitivity-of-Trust Problem in Android Application Interaction
Bartsch, S.; Berger, B.; Bunke, M.; Sohr, K.
2013. 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, September 2-6, 2013. Ed.: G. Pernul, 291–96, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.39
Branchenreport UX/Usability 2013
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer-Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik (GI)
Mental Models of Verifiability in Voting
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer-Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer-Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer-Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer-Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer-Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
Forschungsberichte/Preprints
On the security, privacy and usability of online seals
Tschofenig, H.; Volkamer, M.; Jentzsch, N.; Fischer-Hübner, S.; Schiffner, S.; Tirtea, R.
2013. ENISA
Poster
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor
Northrop, E.; Lipford, H. R.; Bartsch, S.; Volkamer, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS), Newcastle, UK, July 24-26, 2013
Poster: On the Usability of Secure GUIs
Nas, A.; Filyanov, A.; Volkamer, M.; Winandy, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS 2013), At Newcastle, UK, July 24-26, 2013
Towards a Practical Mobile Application for Election Authorities (Demo)
Neumann, S.; Kulyk, O.; Murati, L.; Volkamer, M.
2013. 4th International Conference on e-Voting and Identity - Vote-ID 2013, Guildford, UK, July 17-19, 2013
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer-Verlag. doi:10.1007/978-3-642-35386-4_15
Bücher
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Proceedingsbeiträge
Formal Treatment of Distributed Trust in Electronic Voting
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer-Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer-Verlag
Towards the Systematic Development of Contextualized Security Interventions
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik (GI)
Security versus Trust Indicators in 2011 in Germany
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer-Verlag. doi:10.1007/978-3-642-32747-6_2
Poster
C4PS: colors for privacy settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. 21st Annual Conference on World Wide Web Companion (WWW 2012), Lyon, Frankreich, 16.–20. April 2012
Sonstiges
C4PS - Colors for Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Association for Computing Machinery (ACM). doi:10.1145/2187980.2188139
2011
Zeitschriftenaufsätze
Vertrauensbildung bei Internetwahlen
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Proceedingsbeiträge
Feasibility Analysis of Pret a Voter for German Federal Elections
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer-Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Forschungsberichte/Preprints
Readiness of various eVoting systems for complex elections
Demirel, D.; Frankland, R.; Volkamer, M.
2011. Universtität
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms
Olembo, M.; Volkamer, M.
2011. Center for Advanced Security Research Darmstadt (CASED)
Poster
Poster: Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System
Karayumak, F.; Kauer, M.; Olembo, M.; Volkamer, M.
2011. SOUPS - 7th Symposium On Usable Privacy and Security, Carnegie Mellon University in Pittsburgh, PA, July 20-22, 2011
2010
Buchaufsätze
Electronic Voting in Germany
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Zeitschriftenaufsätze
Evaluierungsverfahren für Internetwahlsysteme
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Proceedingsbeiträge
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer-Verlag. doi:10.1007/978-3-642-04135-8_6
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen Druck+Verlag
Towards the impact of the operational environment on the security of e-voting
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik (GI)
Determine the Resilience of Evaluated Internet Voting Systems
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik (GI)
2007
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer-Verlag
Compliance of RIES to the proposed e-voting protection profile
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer-Verlag
Requirements and Evaluation Procedures for eVoting
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
2006
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer-Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik (GI)
Enabling the Application of Open Systems like PCs for Online Voting
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik (GI)
Multiple Cast in Online Voting - Analyzing Chances
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Forschungsberichte/Preprints
2005
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik (GI)