Home | english  | Impressum | Datenschutz | Sitemap | KIT
Kontakt

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe

   

Newsletter abbonieren
YouTube abonnieren

Externe Veranstaltungen
Dienstag, 08.Jan 2019
HICSS 2018
Sonntag, 24.Feb 2019
USEC 2019
Montag, 08.Apr 2019
SAC 2019

Weitere Veranstaltungen...

KASTEL

Karlsruher IT-Sicherheitsinitiative

Veröffentlichungen


2018
Buchaufsätze
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Springer Vieweg, Wiesbaden. doi:10.1007/978-3-658-19523-6_5
Zeitschriftenaufsätze
Proceedingsbeiträge
Branchenreport UX/Usability 2018.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik, Bonn. doi:10.18420/muc2018-up-0142
Assistance in Daily Password Generation Tasks [in press].
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. Proceedings of the 3rd International Workshop on Ubiquitous Personal Assistance, Singapore, 8th October 2018
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials [in press].
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC 2018 : Computer Security Applications Conference, San Juan, Puerto Rico, USA, 3rd - 7th Dec, 2018. doi:10.1145/3274694.3274747
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik e.V., Bonn. doi:18420/muc2018-ws08-0542
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform.
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes [in press].
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. International Symposium on Human Aspects of Information Security Assurance, Dundee, United Kingdom, August 29 - 31, 2018, 38–48
Motivating Users to Consider Recommendations on Password Management Strategies [in press].
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37
Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video [in press].
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2018, Regensburg, 5.-6. September 2018
"This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2018. 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018, Internet Societa, Reston 8VY)
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; KäferO.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, IEEE, Piscataway, NJ. doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX, Berkeley, CA
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?.
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, ACM, New York, NY. doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login.
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, ACM, New York, NY
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, USENIX Association, Berkeley (CA)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen, Bonn. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, ACM, New York (NY). doi:10.1145/3173574.3173750
Poster
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 Posters), Baltimore, MD, USA, 12.–14.08.2018
"This Website Uses Cookies": Users’ Perceptions and Reactions to the Cookie Disclaimer.
Kulyk, O.; Hilt, A.; Gerber, N.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, August 12-14, 2018
2017
Zeitschriftenaufsätze
Coercion-resistant proxy voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation.
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Proceedingsbeiträge
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness [in press].
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2017. Workshop on Socio-Technical Aspects in Security and Trust (STAST), ACM. doi:10.1145/3167996.3167999
Branchenreport UX/Usability 2017.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik, Regensburg. doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively [in press].
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, ACM. doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer, Cham. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer, Cham. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik, Bonn. doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication.
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik, Bonn. doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, ACM, New York (NY). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc., Berkeley (CA)
Don’t be Deceived: The Message Might be Fake.
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer, Cham. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, ACM, New York (NY). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, IEEE, Piscataway (NJ). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Springer Gabler, Wiesbaden. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer, Cham
Election-Dependent Security Evaluation of Internet Voting Schemes.
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer, Cham. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information.
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer, Cham. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks.
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer, Cham. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien, Dieburg
Poster
Analysis of the Security and Memorability of the Password Card.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, FL, December 4–8, 2017
Poster: Secure Storage of Masked Password.
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, F, April 26-28, 2017
2016
Zeitschriftenaufsätze
Spot the phish by checking the pruned URL.
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?.
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes.
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“.
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
Proceedingsbeiträge
Branchenreport UX/Usability 2016.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V., Bonn. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?.
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik, Bonn. doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik e.V., Bonn. doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik, Bonn
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, ACM, New York, NY. doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer, Cham
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth, Plymouth
Introducing Proxy Voting to Helios.
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, IEEE, Piscataway, NJ. doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth, Plymouth
Memorable And Secure: How Do You Choose Your PIN?.
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth, Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH, Aachen
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer, Cham. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer, Cham. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer, Cham
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society, Reston, VA
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer, Berlin
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, IEEE, Piscataway, NJ. doi:10.1109/EuroSP.2016.35
Forschungsberichte
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2016. CRISP – Center for Research in Security and Privacy, Darmstadt
2015
Bücher (Monographien)
Certification of ICTs in Elections.
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; ParreñoA.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance, Stockholm
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management.
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. International journal of internet technology and secured transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0049
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy.
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem.
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Proceedingsbeiträge
Exploring Mental Models Underlying PIN Management Strategies.
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, IEEE, Piscataway, NJ. doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture.
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa, Port Elizabeth
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, ACM. doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015.
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, De Gruyter Oldenbourg, Berlin
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode.
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, De Gruyter Oldenbourg, Berlin
A Socio-Technical Investigation into Smartphone Security.
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer, Cham. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training = On the effectiveness of anti-phishing training.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. 21st International Workshop on Intelligent and Personalized Human-Computer Interaction, ABIS 2015, Held at Humans and Computers 2015 Conference, Stuttgart, Germany, 6 th - 9th September 2015. Mensch und Computer 2015. Ed. A. Weisbecker, M. Burmester, A. Schmidt, 647–655, De Gruyter, Berlin/Boston
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer, Cham. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability.
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer, Cham. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von.
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, IEEE, Piscataway, NJ. doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer, Cham. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps.
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl., Gau-Algesheim
NoPhish App Evaluation: Lab and Retention Study.
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society, Reston, VA
Forschungsberichte
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems.
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global, Hershey, PA
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global, Hershey (PA). doi:10.4018/978-1-4666-5820-2.ch002
Zeitschriftenaufsätze
Implementing and evaluating a software-independent voting system for polling station elections.
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?.
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
Proceedingsbeiträge
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Faraon, M.; Stenberg, G. J. H.; Budurushi, J.; Kaipainen, M.
2014. CeDEM Asia 2014. Conference for E-Democracy and Open Government, Hongkong, CHN, December 4-5, 2014. Ed.: M.M. Skoric, 191–205, Edition Donau-Universität Krems, Krems
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions.
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, ACM, New York (NY). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität, Bremen
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer, Cham. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, IEEE, Piscataway (NJ). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, IEEE, Piscataway, NJ. doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0.
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?.
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, ACM, New York (NY). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing, Cham
Shake hands to bedevil: Securing email with wearable technology.
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security, Communications & Network Research, University, Plymouth
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag GmbH, Bonn
Coercion-Resistant Internet Voting in Practice.
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik, Bonn
Why doesn’t Jane protect her privacy?.
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer, Cham. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, IEEE, Piscataway (NJ). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik, Bonn
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?.
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer, Cham. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses.
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik, Bonn
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität, Krems
Building castles in quicksand: blueprint for a crowdsourced study.
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, ACM Digital Library, New York (NY). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society, Reston, VA. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms.
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer, Cham. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns.
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer, Cham. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer, Cham. doi:10.1007/978-3-319-07620-1_16
Forschungsberichte
Expert Knowledge for Contextualized Warnings.
Bartsch, S.; Volkamer, M.
2014
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Henning, M.; Budurushi, J.; Volkamer, M.
2014. CASED, Darmstadt
Poster
Poster: Password Entering and Transmission Security.
Canova, G.; Volkamer, M.; Weiler, S.
2014. 21st ACM Conference on Computer and Communications Security, CCS 2014, Scottsdale, United States, 3rd - 7th November 2014
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security.
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer, Berlin. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation.
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference, Hershey, PA. doi:10.4018/978-1-4666-3640-8.ch011
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Proceedingsbeiträge
The Transitivity-of-Trust Problem in Android Application Interaction.
Bartsch, S.; Berger, B.; Bunke, M.; Sohr, K.
2013. 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, September 2-6, 2013. Ed.: G. Pernul, 291–96, IEEE, Piscataway, N.J. doi:10.1109/ARES.2013.39
Branchenreport UX/Usability 2013.
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V., Stuttgart
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, IEEE, Piscataway, NJ
Modeling the German Legal Latitude Principles.
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer, Berlin
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEE Digital Library, Piscataway, NJ. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik, Bonn
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik, Bonn
Mental Models of Verifiability in Voting.
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer, Berlin. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel.
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer, Berlin. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer, Berlin. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, IEEE, Piscataway, NJ. doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security.
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer, Berlin. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust.
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer, Berlin. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios.
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security, Communications & Network Research, Plymouth University, Plymouth
Developing and Testing a Visual Hash Scheme.
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security, Communications & Network Research, Plymouth University, Plymouth
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft, Wien
Forschungsberichte
On the security, privacy and usability of online seals.
Tschofenig, H.; Volkamer, M.; Jentzsch, N.; Fischer-Hübner, S.; Schiffner, S.; Tirtea, R.
2013. ENISA, Heraklion, GR
Poster
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Northrop, E.; Lipford, H. R.; Bartsch, S.; Volkamer, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS), Newcastle, UK, July 24-26, 2013
Poster: On the Usability of Secure GUIs.
Nas, A.; Filyanov, A.; Volkamer, M.; Winandy, M.
2013. 9th Symposium on Usable Privacy and Security (SOUPS 2013), At Newcastle, UK, July 24-26, 2013
Towards a Practical Mobile Application for Election Authorities (Demo).
Neumann, S.; Kulyk, O.; Murati, L.; Volkamer, M.
2013. 4th International Conference on e-Voting and Identity - Vote-ID 2013, Guildford, UK, July 17-19, 2013
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer, Berlin. doi:10.1007/978-3-642-35386-4_15
Bücher (Monographien)
Trust and Trustworthy Computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012, proceedings.
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer, Berlin. doi:10.1007/978-3-642-30921-2
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Proceedingsbeiträge
Formal Treatment of Distributed Trust in Electronic Voting.
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA, Wilmington, DE, USA
Branchenreport Usability 2012.
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA, Stuttgart
C4PS - Helping Facebookers Manage their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer, Berlin
The notary based PKI a lightweight PKI for long-term signatures on documents.
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer, Berlin
Towards the Systematic Development of Contextualized Security Interventions.
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York, NY, ACM. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, IEEE, Piscataway. doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites.
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot, Berlin
C4PS - Colors for Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. WWW’12 - Proceedings of the 21st Annual Conference on World Wide Web Companion, Lyon, France, April 16 - 20, 2012, 585–586, ACM, New York, NY
Partial Verifiability in POLYAS for the GI Elections.
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik, Bonn
Security versus Trust Indicators in 2011 in Germany.
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot, Berlin
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik, Bonn
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran, Red Hook, NY
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer, Berlin. doi:10.1007/978-3-642-32747-6_2
2011
Zeitschriftenaufsätze
Vertrauensbildung bei Internetwahlen.
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit.
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung.
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Proceedingsbeiträge
AmazonIA: When Elasticity Snaps Back.
Bugiel, S.; Nürnberger, S.; Pöppelmann, T.; Sadeghi, A.-R.; Schneider, T.
2011. 18th ACM Conference on Computer and Communications Security (CCS’11), Chicago, IL, October 17-21, 2011, 389–400, ACM, New York. doi:10.1145/2046707.2046753
Feasibility Analysis of Pret a Voter for German Federal Elections.
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer, Berlin. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society, Piscataway, NJ. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., USENIX Association, Berkeley, Calif
User Study of the Improved Helios Voting System Interface.
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEE Digital Library, Piscataway, NJ. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas.
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, IEEE, Piscataway, NJ. doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting.
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, ACM, New York, NY. doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying.
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität, Krems
A Formal Approach Towards Measuring Trust in Distributed Systems.
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, ACM, New York, NY. doi:10.1145/1982185.1982548
Forschungsberichte
Readiness of various eVoting systems for complex elections.
Demirel, D.; Frankland, R.; Volkamer, M.
2011. Universtität, Darmstadt
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Olembo, M.; Volkamer, M.
2011. Center for Advanced Security Research Darmstadt (CASED), Darmstadt
Poster
Poster: Usable Verifiable Remote Electronic Voting - Usability Analysis of the Helios System.
Karayumak, F.; Kauer, M.; Olembo, M.; Volkamer, M.
2011. SOUPS - 7th Symposium On Usable Privacy and Security, Carnegie Mellon University in Pittsburgh, PA, July 20-22, 2011
2010
Buchaufsätze
Electronic Voting in Germany.
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer, Dordrecht
Zeitschriftenaufsätze
Evaluierungsverfahren für Internetwahlsysteme.
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Proceedingsbeiträge
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft, Wien
An Evaluation and Certification Approach to Enable Voting Service Providers.
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, GI, Bonn
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, GI, Bonn
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, GI, Bonn
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, IEEE, Piscataway, NJ. doi:10.1109/ARES.2010.106
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting.
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer, Berlin. doi:10.1007/978-3-642-04135-8_6
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen.
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, ACM Press, New York, NY. doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik, Bonn
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen, Bonn
Towards the impact of the operational environment on the security of e-voting.
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik, Bonn
Determine the Resilience of Evaluated Internet Voting Systems.
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, IEEE, Piscataway, NJ. doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen.
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik, Bonn
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag, Wien
Specification of a Voting Service Provider.
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, IEEE, Piscataway, NJ. doi:10.1109/RE-VOTE.2009.8
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting.
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag, Linz, A
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik, Bonn
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag, Stuttgart
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik, Bonn
2007
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile.
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges., Wien
Requirements and Evaluation Techniques for Online-Voting.
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner, Linz
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer, Berlin
Compliance of RIES to the proposed e-voting protection profile.
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer, Berlin
Requirements and Evaluation Procedures for eVoting.
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society, Los Alamitos, Calif. doi:10.1109/ARES.2007.124
2006
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch.
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, GI, Bonn
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen.
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec, Klagenfurt
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: Henrik Stormer, Andreas Meier, Michael Schumacher, Michael, 59–70, GI, Bonn
Information Flow Control to Secure Dynamic Web Service Composition.
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer, Berlin. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, GI, Bonn
Enabling the Application of Open Systems like PCs for Online Voting.
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting.
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, GI, Bonn
Multiple Cast in Online Voting - Analyzing Chances.
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, IEEE, Los Alamitos, Calif
Forschungsberichte
2005
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner, Linz
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg, Stuttgart
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System.
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, GI, Bonn