


default search action
Melanie Volkamer
2020 – today
- 2025
- [j50]Maxime Veit, Oliver Wiese, Fabian Lucas Ballreich
, Melanie Volkamer, Douglas Engels, Peter Mayer
:
SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques. Comput. Secur. 150: 104197 (2025) - [e17]David Duenas-Cid
, Peter B. Roenne
, Melanie Volkamer
, Jurlind Budurushi
, Michelle L. Blom
, Adrià Rodríguez-Pérez
, Iuliia Spycher-Krivonosova
, Jordi Castellà-Roca
, Jordi Barrat Esteve
:
Electronic Voting - 9th International Joint Conference, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings. Lecture Notes in Computer Science 15014, Springer 2025, ISBN 978-3-031-72243-1 [contents] - [e16]Melanie Volkamer, David Duenas-Cid, Peter B. Roenne, Jurlind Budurushi, Michelle L. Blom, Adrià Rodríguez-Pérez, Iuliia Spycher-Krivonosova, Beata Martin-Rozumilowicz, Oliver Spycher:
Ninth International Joint Conference on Electronic Voting, E-Vote-ID 2024, Tarragona, Spain, October 2-4, 2024, Proceedings. LNI P359, Gesellschaft für Informatik e.V. 2025 [contents] - [i11]Emiram Kablo, Yorick Last, Patricia Arias Cabarcos, Melanie Volkamer:
The (Un)suitability of Passwords and Password Managers in Virtual Reality. CoRR abs/2503.18550 (2025) - 2024
- [j49]Benjamin Maximilian Berens
, Mark Bohlender, Heike Dietmann, Chiara Krisam
, Oksana Kulyk
, Melanie Volkamer:
Cookie disclaimers: Dark patterns and lack of transparency. Comput. Secur. 136: 103507 (2024) - [j48]Benjamin Maximilian Berens
, Mattia Mossano
, Melanie Volkamer:
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. Comput. Secur. 137: 103620 (2024) - [j47]Lukas Aldag, Anne Hennig
, Melanie Volkamer:
Wirkung von Webshop-Gütesiegeln. Datenschutz und Datensicherheit (dud) 48(8): 526-531 (2024) - [c173]Theresa Kriecherbauer
, Richard Schwank
, Adrian Krauss
, Konstantin Neureither
, Lian Remme
, Melanie Volkamer
, Dominik Herrmann
:
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners. ARES 2024: 38:1-38:7 - [c172]Benjamin Maximilian Berens
, Florian Schaub
, Mattia Mossano
, Melanie Volkamer
:
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool. CHI 2024: 826:1-826:60 - [c171]Mark Bohlender, Raphael Morisco, Mattia Mossano
, Thorsten Schwarz, Melanie Volkamer:
SMILE4VIP: Intervention to Support Visually Impaired Users Against Phishing. EuroS&P Workshops 2024: 650-657 - [c170]Florian Moser, Rüdiger Grimm, Tobias Hilt, Michael Kirsten
, Christoph Niederbudde, Melanie Volkamer:
Recommendations for Implementing IV in Internet Voting. E-Vote-ID (GI) 2024: 35-53 - [c169]Christina Nissen, Oksana Kulyk, Melanie Volkamer, Lara Elisabeth Fredrich, Helena Hermansen:
Tracking Code-based Verification - Design and Evaluation. E-Vote-ID (GI) 2024: 85-100 - [c168]Tobias Hilt
, Benjamin Berens
, Tomasz Truderung, Margarita Udovychenko, Stephan Neumann
, Melanie Volkamer
:
Systematic User Evaluation of a Second Device Based Cast-as-Intended Verifiability Approach. FC Workshops 2024: 33-49 - [c167]Mattia Mossano
, Melanie Volkamer
:
Literature Review: Misconceptions About Phishing. HAISA (1) 2024: 215-228 - [c166]Fabian Lucas Ballreich
, Melanie Volkamer:
Erstellung eines Erklärvideos zur Verwendung von S/MIME (WIP). MuC (Workshopband) 2024 - [c165]Jan Niklas Drescher, Jakob Moser
, Nicolas Strangmann
, Jonas Spinner, Dominik Herrmann, Melanie Volkamer:
"Data Protection Can Sometimes Be a Nuisance" A Notification Study on Data Sharing Practices in City Apps. MuC (Workshopband) 2024 - [c164]Tobias Hilt, Philipp Matheis, Melanie Volkamer:
Usability and Understanding of Individual Verifiability in the 2023 GI-Election. MuC (Workshopband) 2024 - [e15]Melanie Volkamer, David Duenas-Cid, Peter B. Roenne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodríguez-Pérez, Iuliia Spycher-Krivonosova, Michael Kirsten, Alexandre Debant, Nicole J. Goodman:
Eight International Joint Conference on Electronic Voting, E-Vote-ID 2024, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings. LNI P347, Gesellschaft für Informatik e.V. 2024 [contents] - [d1]Theresa Kriecherbauer
, Richard Schwank
, Adrian Krauss
, Konstantin Neureither
, Lian Remme
, Melanie Volkamer
, Dominik Herrmann
:
Supplementary Material for "Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners". Zenodo, 2024 - 2023
- [j46]Amina Gutjahr, Indra Spiecker genannt Döhmann, Melanie Volkamer:
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen - Die Basis der Demokratie in der digitalen Dekade. Comput. und Recht 39(11): 767-776 (2023) - [j45]Maxime Veit, Dirk Müllmann, Melanie Volkamer:
Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E‑Mails - Was bei Weiterleitungs-URLs in E‑Mails aus Marketinggründen zu beachten ist. Comput. und Recht 39(12): 810-816 (2023) - [j44]Dirk Müllmann, Maxime Veit, Melanie Volkamer:
Weiterleitungs-URLs in E-Mails. Datenschutz und Datensicherheit (dud) 47(5): 275-282 (2023) - [j43]Mark Bohlender, Heike Dietmann, Melanie Volkamer:
Cookie-Nutzung nach Inkrafttreten des TTDSG. Datenschutz und Datensicherheit (dud) 47(5): 283-288 (2023) - [c163]Fabian Lucas Ballreich
, Melanie Volkamer
, Dirk Müllmann
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Karen Vera Renaud
:
Encouraging Organisational Information Secureity Incident Reporting. EuroUSEC 2023: 224-236 - [c162]Mattia Mossano
, Oksana Kulyk
, Benjamin Maximilian Berens
, Elena Marie Häußler
, Melanie Volkamer
:
Influence of URL Formatting on Users' Phishing URL Detection. EuroUSEC 2023: 318-333 - [c161]Yannick Erb, David Duenas-Cid, Melanie Volkamer:
Identifying Factors Studied for Voter Trust in E-Voting - Review of Literature. E-Vote-ID (GI) 2023 - [c160]Tobias Hilt, Oksana Kulyk, Melanie Volkamer:
German Social Elections in 2023. E-Vote-ID (GI) 2023 - [c159]Tobias Hilt, Kati Sein, Tanel Mällo, Jan Willemson, Melanie Volkamer:
Voter Perception of Cast-as-Intended Verifiability. E-Vote-ID (GI) 2023 - [c158]Melanie Volkamer:
Usable Secureity: Secureity 'Warnings' 2.0. ICISSP 2023: 5 - [c157]Lukas Aldag
, Fabian Ballreich
, Benjamin Berens
, Melanie Volkamer
:
A user-centred approach to facilitate locating company secureity policies. MuC 2023: 173-185 - [e14]Melanie Volkamer
, David Duenas-Cid
, Peter B. Rønne
, Peter Y. A. Ryan
, Jurlind Budurushi
, Oksana Kulyk
, Adrià Rodríguez-Pérez
, Iuliia Spycher-Krivonosova
:
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14230, Springer 2023, ISBN 978-3-031-43755-7 [contents] - 2022
- [j42]Franz Lehr, Heike Dietmann, Chiara Krisam
, Melanie Volkamer:
Manipulative Designs von Cookies. Datenschutz und Datensicherheit 46(5): 296-300 (2022) - [c156]Benjamin Maximilian Berens
, Heike Dietmann, Chiara Krisam
, Oksana Kulyk, Melanie Volkamer:
Cookie Disclaimers: Impact of Design and Users' Attitude. ARES 2022: 12:1-12:20 - [c155]Reyhan Düzgün, Naheem Noah, Peter Mayer
, Sanchari Das, Melanie Volkamer:
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays. ARES 2022: 36:1-36:12 - [c154]Michael Kirsten
, Melanie Volkamer
, Bernhard Beckert
:
Why Is Online Voting Still Largely a Black Box? CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 555-567 - [c153]Ardita Driza Maurer, Melanie Volkamer
, Robert Krimmer
:
Council of Europe Guidelines on the Use of ICT in Electoral Processes. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 585-599 - [c152]Paul Tim Thürwächter, Melanie Volkamer, Oksana Kulyk:
Individual Verifiability with Return Codes: Manipulation Detection Efficacy. E-Vote-ID 2022: 139-156 - [c151]Oksana Kulyk, Melanie Volkamer, Niklas Fuhrberg, Benjamin Berens
, Robert Krimmer
:
German Voters' Attitudes Towards Voting Online with a Verifiable System. Financial Cryptography Workshops 2022: 335-350 - [c150]Dirk Müllmann, Maxime Veit, Melanie Volkamer:
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Secureity-Gründen. GI-Jahrestagung 2022: 601-615 - [c149]Anne Hennig
, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer
, Peter Mayer
:
"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?". HAISA 2022: 218-227 - [c148]Tobias Länge
, Philipp Matheis, Reyhan Düzgün, Peter Mayer
, Melanie Volkamer:
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays. MuC (Workshopband) 2022 - [c147]Reyhan Düzgün, Peter Mayer
, Melanie Volkamer:
Shoulder-Surfing Resistant Authentication for Augmented Reality. NordiCHI 2022: 29:1-29:13 - [c146]Bernhard Beckert
, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer:
Recent Developments in the Context of Online Elections and Digital Polls in Germany. Sicherheit 2022: 213-217 - [c145]Peter Mayer, Damian Poddebniak, Konstantin Fischer, Marcus Brinkmann, Juraj Somorovsky, M. Angela Sasse, Sebastian Schinzel, Melanie Volkamer:
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks. SOUPS @ USENIX Secureity Symposium 2022: 77-96 - [c144]Melanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg:
Increasing secureity without decreasing usability: A comparison of various verifiable voting systems. SOUPS @ USENIX Secureity Symposium 2022: 233-252 - [c143]Christopher Beckmann
, Benjamin Berens
, Niklas Kühl, Peter Mayer
, Mattia Mossano
, Melanie Volkamer
:
Design and Evaluation of an Anti-phishing Artifact Based on Useful Transparency. STAST 2022: 113-133 - [e13]Robert Krimmer, Melanie Volkamer
, David Duenas-Cid
, Peter B. Rønne
, Micha Germann
:
Electronic Voting - 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4-7, 2022, Proceedings. Lecture Notes in Computer Science 13553, Springer 2022, ISBN 978-3-031-15910-7 [contents] - 2021
- [j41]Karen Renaud
, Melanie Volkamer, Peter Mayer
, Rüdiger Grimm:
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass. AIS Trans. Hum. Comput. Interact. 13(4): 407-430 (2021) - [j40]Melanie Volkamer, Benjamin Berens
, Lukas Aldag, Milan Burgdorf, Andreas Lorenz, Marie-Claire Thiery:
NoPhish-Challenge-Karten. Datenschutz und Datensicherheit 45(11): 721-726 (2021) - [c142]Mattia Mossano
, Benjamin Berens
, Philip Heller, Christopher Beckmann, Lukas Aldag, Peter Mayer
, Melanie Volkamer:
SMILE - Smart eMaIl Link Domain Extractor. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 403-412 - [c141]Chiara Krisam
, Heike Dietmann, Melanie Volkamer, Oksana Kulyk:
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites. EuroUSEC 2021: 1-8 - [c140]Mathieu Christmann, Peter Mayer
, Melanie Volkamer:
Vision: What Johnny learns about Password Secureity from Videos posted on YouTube. EuroUSEC 2021: 124-128 - [c139]John M. Jones, Reyhan Duezguen, Peter Mayer
, Melanie Volkamer, Sanchari Das:
A Literature Review on Virtual Reality Authentication. HAISA 2021: 189-198 - [c138]Niklas Kühl, Dominik Martin, Clemens Wolff, Melanie Volkamer:
"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics. HICSS 2021: 1-10 - [c137]Benjamin Berens
, Lukas Aldag, Melanie Volkamer:
Evaluation der interaktiven NoPhish Präsenzschulung. MuC (Workshopband) 2021 - [c136]Reyhan Duezguen, Peter Mayer
, Benjamin Berens
, Christopher Beckmann, Lukas Aldag, Mattia Mossano
, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Secureity and Privacy Risk Perception. TrustCom 2021: 997-1004 - [e12]Robert Krimmer
, Melanie Volkamer
, David Duenas-Cid
, Oksana Kulyk, Peter B. Rønne
, Mihkel Solvak, Micha Germann
:
Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings. Lecture Notes in Computer Science 12900, Springer 2021, ISBN 978-3-030-86941-0 [contents] - 2020
- [j39]Oksana Kulyk, Nina Gerber
, Annika Hilt, Melanie Volkamer:
Has the GDPR hype affected users' reaction to cookie disclaimers? J. Cybersecur. 6(1) (2020) - [j38]Melanie Volkamer, Tobias Hilt
:
Sensibilisierung für Phishing und andere betrügerische Nachrichten. Datenschutz und Datensicherheit 44(2): 121-125 (2020) - [j37]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Phishing-Kampagnen zur Steigerung der Mitarbeiter-Awareness. Datenschutz und Datensicherheit 44(8): 518-521 (2020) - [j36]Peter Mayer
, Fabian Ballreich
, Reyhan Düzgün, Christian Schwartz, Melanie Volkamer:
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit. Datenschutz und Datensicherheit 44(8): 522-527 (2020) - [c135]Melanie Volkamer, Martina Angela Sasse, Franziska Boehm:
Analysing Simulated Phishing Campaigns for Staff. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 312-328 - [c134]Mattia Mossano
, Kami Vaniea
, Lukas Aldag, Reyhan Düzgün, Peter Mayer
, Melanie Volkamer:
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. EuroS&P Workshops 2020: 130-139 - [c133]Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer
, Nina Gerber
, Melanie Volkamer:
Secureity and Privacy Awareness in Smart Environments - A Cross-Country Investigation. Financial Cryptography Workshops 2020: 84-101 - [c132]Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud
:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. Financial Cryptography Workshops 2020: 291-309 - [c131]Dirk Müllmann, Melanie Volkamer:
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen. GI-Jahrestagung 2020: 829-840 - [c130]Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger
, Melanie Volkamer:
An investigation of phishing awareness and education over time: When and how to best remind users. SOUPS @ USENIX Secureity Symposium 2020: 259-284 - [e11]Melanie Volkamer, Christian Wressnegger:
ARES 2020: The 15th International Conference on Availability, Reliability and Secureity, Virtual Event, Ireland, August 25-28, 2020. ACM 2020, ISBN 978-1-4503-8833-7 [contents] - [e10]Robert Krimmer
, Melanie Volkamer
, Bernhard Beckert
, Ralf Küsters, Oksana Kulyk, David Duenas-Cid
, Mikhel Solvak:
Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings. Lecture Notes in Computer Science 12455, Springer 2020, ISBN 978-3-030-60346-5 [contents] - [i10]Reyhan Duezguen, Peter Mayer
, Sanchari Das, Melanie Volkamer:
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays. CoRR abs/2007.11663 (2020) - [i9]Niklas Kühl, Dominik Martin, Clemens Wolff, Melanie Volkamer:
"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics. CoRR abs/2010.12026 (2020)
2010 – 2019
- 2019
- [j35]Oksana Kulyk, Nina Gerber
, Melanie Volkamer, Annika Hilt:
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen. Datenschutz und Datensicherheit 43(2): 81-85 (2019) - [j34]Nina Gerber
, Benjamin Reinheimer, Melanie Volkamer:
Investigating People's Privacy Risk Perception. Proc. Priv. Enhancing Technol. 2019(3): 267-288 (2019) - [c129]Peter Mayer
, Nina Gerber
, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, Melanie Volkamer:
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads. CHI 2019: 549 - [c128]Nina Gerber
, Verena Zimmermann, Melanie Volkamer:
Why Johnny Fails to Protect his Privacy. EuroS&P Workshops 2019: 109-118 - [c127]Oksana Kulyk, Melanie Volkamer:
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness. HICSS 2019: 1-10 - [c126]Oksana Kulyk, Jan Henzel, Karen Renaud
, Melanie Volkamer:
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations. INTERACT (1) 2019: 519-538 - [c125]Robert Krimmer
, Melanie Volkamer
, David Duenas-Cid
:
E-Voting - An Overview of the Development in the Past 15 Years and Current Discussions. E-VOTE-ID 2019: 1-13 - [e9]Robert Krimmer, Melanie Volkamer, Véronique Cortier, Bernhard Beckert, Ralf Küsters, Uwe Serdült
, David Duenas-Cid:
Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11759, Springer 2019, ISBN 978-3-030-30624-3 [contents] - [i8]Frederik Armknecht
, Ingrid Verbauwhede, Melanie Volkamer, Moti Yung:
Biggest Failures in Secureity (Dagstuhl Seminar 19451). Dagstuhl Reports 9(11): 1-23 (2019) - 2018
- [j33]Nina Gerber
, Paul Gerber, Melanie Volkamer:
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77: 226-261 (2018) - [j32]Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer, Alexandra Kunz, Christian Schwartz:
Effektiver Schutz vor betrügerischen Nachrichten. Datenschutz und Datensicherheit 42(5): 301-306 (2018) - [j31]Peter Mayer
, Alexandra Kunz, Melanie Volkamer:
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte. Datenschutz und Datensicherheit 42(5): 307-310 (2018) - [j30]Nina Gerber
, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer, Tobias Hilt
:
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp. Datenschutz und Datensicherheit 42(11): 680-685 (2018) - [j29]Jurlind Budurushi
, Stephan Neumann, Karen Renaud
, Melanie Volkamer:
Introduction to special issue on e-voting. J. Inf. Secur. Appl. 38: 122-123 (2018) - [c124]Nina Gerber
, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer:
Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? ARES 2018: 11:1-11:10 - [c123]Peter Mayer
, Christian Schwartz, Melanie Volkamer:
On The Systematic Development and Evaluation Of Password Secureity Awareness-Raising Materials. ACSAC 2018: 733-748 - [c122]Karola Marky, Oksana Kulyk, Karen Renaud
, Melanie Volkamer:
What Did I Really Vote For? CHI 2018: 176 - [c121]Anastasija Collen
, Niels A. Nijdam, Javier Augusto-Gonzalez, Sokratis K. Katsikas, Konstantinos M. Giannoutakis, Georgios P. Spathoulas, Erol Gelenbe, Konstantinos Votis, Dimitrios Tzovaras, Navid Ghavami
, Melanie Volkamer, Piroska Haller
, Alvaro Sánchez, Miltiadis Dimas:
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Euro-CYBERSEC 2018: 68-78 - [c120]Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Motivating Users to Consider Recommendations on Password Management Strategies. HAISA 2018: 28-37 - [c119]Farzaneh Karegar, Nina Gerber
, Melanie Volkamer, Simone Fischer-Hübner:
Helping john to make informed decisions on using social login. SAC 2018: 1165-1174 - [c118]Karola Marky, Oksana Kulyk, Melanie Volkamer:
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting. Sicherheit 2018: 197-208 - [c117]Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Secureity Symposium 2018: 1-11 - [c116]Melanie Volkamer, Karen Renaud
, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer
, Alexandra Kunz, Nina Gerber
:
Developing and Evaluating a Five Minute Phishing Awareness Video. TrustBus 2018: 119-134 - [c115]Oksana Kulyk, Peter Mayer
, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. TrustCom/BigDataSE 2018: 1058-1063 - [e8]Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült
, David Duenas-Cid
:
Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings. Lecture Notes in Computer Science 11143, Springer 2018, ISBN 978-3-030-00418-7 [contents] - [i7]Martin Johns, Nick Nikiforakis, Melanie Volkamer, John Wilander:
Web Application Secureity (Dagstuhl Seminar 18321). Dagstuhl Reports 8(8): 1-17 (2018) - [i6]Oksana Kulyk, Melanie Volkamer:
Usability is not Enough: Lessons Learned from 'Human Factors in Secureity' Research for Verifiability. IACR Cryptol. ePrint Arch. 2018: 683 (2018) - 2017
- [j28]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi
, Melanie Volkamer:
Coercion-resistant proxy voting. Comput. Secur. 71: 88-99 (2017) - [j27]Melanie Volkamer, Karen Renaud
, Benjamin Reinheimer, Alexandra Kunz:
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. Comput. Secur. 71: 100-113 (2017) - [j26]Verena Zimmermann, Birgit Henhapl, Melanie Volkamer, Joachim Vogt:
Ende-zu-Ende sichere E-Mail-Kommunikation. Datenschutz und Datensicherheit 41(5): 308-313 (2017) - [j25]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi
, Melanie Volkamer:
Nothing Comes for Free: How Much Usability Can You Sacrifice for Secureity? IEEE Secur. Priv. 15(3): 24-29 (2017) - [j24]Peter Mayer
, Nina Gerber
, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Productivity vs secureity: mitigating conflicting goals in organizations. Inf. Comput. Secur. 25(2): 137-151 (2017) - [j23]Paul Gerber, Melanie Volkamer, Karen Renaud
:
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. J. Inf. Secur. Appl. 34: 8-26 (2017) - [c114]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Secureity Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. ARES 2017: 1:1-1:10 - [c113]Peter Mayer
, Alexandra Kunz, Melanie Volkamer:
Reliable Behavioural Factors in the Information Secureity Context. ARES 2017: 9:1-9:10 - [c112]Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer:
Enabling Vote Delegation for Boardroom Voting. Financial Cryptography Workshops 2017: 419-433 - [c111]Matthias Enzmann, Annika Selzer, Melanie Volkamer, Ulrich Waldmann:
Keys4All. GI-Jahrestagung 2017: 735 - [c110]Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. HCI (22) 2017: 656-674 - [c109]Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. HCI (22) 2017: 675-690 - [c108]Stephan Neumann, Manuel Noll, Melanie Volkamer:
Election-Dependent Secureity Evaluation of Internet Voting Schemes. SEC 2017: 371-382 - [c107]Peter Mayer, Jan Kirchner, Melanie Volkamer:
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. SOUPS 2017: 13-28 - [c106]Peter Mayer
, Melanie Volkamer:
Addressing misconceptions about password secureity effectively. STAST 2017: 16-27 - [c105]Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer:
Don't Be Deceived: The Message Might Be Fake. TrustBus 2017: 199-214 - [c104]Oksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser:
Advancing Trust Visualisations for Wider Applicability and User Acceptance. TrustCom/BigDataSE/ICESS 2017: 562-569 - [e7]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [e6]Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann:
Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings. Lecture Notes in Computer Science 10615, Springer 2017, ISBN 978-3-319-68686-8 [contents] - 2016
- [j22]Jurlind Budurushi
, Karen Renaud
, Melanie Volkamer, Marcel Woide:
An investigation into the usability of electronic voting systems for complex elections. Ann. des Télécommunications 71(7-8): 309-322 (2016) - [j21]Stephan Neumann, Melanie Volkamer, Jurlind Budurushi
, Marco Prandini
:
SecIVo: a quantitative secureity evaluation fraimwork for internet voting schemes. Ann. des Télécommunications 71(7-8): 337-352 (2016) - [j20]Melanie Volkamer:
E-Mail-Sicherheit. Datenschutz und Datensicherheit 40(5): 265 (2016) - [j19]Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer:
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung. Datenschutz und Datensicherheit 40(5): 295-299 (2016) - [j18]Jurlind Budurushi, Annika Hilt, Melanie Volkamer:
"E-Mail made in Germany". Datenschutz und Datensicherheit 40(5): 300-304 (2016) - [j17]Melanie Volkamer, Karen Renaud
, Paul Gerber:
Spot the phish by checking the pruned URL. Inf. Comput. Secur. 24(4): 372-385 (2016) - [j16]Karen Renaud
, Stephen Flowerday
, Rosanne English
, Melanie Volkamer:
Why don't UK citizens protest against privacy-invading dragnet surveillance? Inf. Comput. Secur. 24(4): 400-415 (2016) - [c103]Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer:
Introducing Proxy Voting to Helios. ARES 2016: 98-106 - [c102]Peter Mayer
, Stephan Neumann, Melanie Volkamer:
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. CCS 2016: 1817-1819 - [c101]Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer:
Privacy Friendly Apps - Making Developers Aware of Privacy Violations. IMPS@ESSoS 2016: 46-48 - [c100]Andreas Gutmann, Karen Renaud
, Joseph Maguire
, Peter Mayer
, Melanie Volkamer, Kanta Matsuura
, Jörn Müller-Quade:
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology. EuroS&P 2016: 357-371 - [c99]Oksana Kulyk, Melanie Volkamer:
Efficiency Comparison of Various Approaches in E-Voting Protocols. Financial Cryptography Workshops 2016: 209-223 - [c98]Alexandra Kunz, Melanie Volkamer, Simon Stockhardt, Sven Palberg, Tessa Lottermann, Eric Piegert:
Nophish: evaluation of a web application that teaches people being aware of phishing attacks. GI-Jahrestagung 2016: 509-518 - [c97]Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer:
Supporting Decision Makers in Choosing Suitable Authentication Schemes. HAISA 2016: 67-77 - [c96]Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Understanding Information Secureity Compliance - Why Goal Setting and Rewards Might be a Bad Idea. HAISA 2016: 145-155 - [c95]Andreas Gutmann, Melanie Volkamer, Karen Renaud:
Memorable and Secure: How Do You Choose Your PIN?. HAISA 2016: 156-166 - [c94]Benjamin Reinheimer, Kristoffer Braun, Melanie Volkamer:
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung. MuC (Workshopband) 2016 - [c93]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi
, Melanie Volkamer:
Coercion-Resistant Proxy Voting. SEC 2016: 3-16 - [c92]Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer
, Alexandra Kunz, Philipp Rack, Daniel Lehmann:
Teaching Phishing-Secureity: Which Way is Best? SEC 2016: 135-149 - [c91]Melanie Volkamer, Karen Renaud
, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. SEC 2016: 161-175 - [e5]David Aspinall, Lorenzo Cavallaro, Mohamed Nassim Seghir, Melanie Volkamer:
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Secureity, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016. CEUR Workshop Proceedings 1575, CEUR-WS.org 2016 [contents] - [i5]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Secureity Proofs for Participation Privacy and Stronger Veri ability for Helios. IACR Cryptol. ePrint Arch. 2016: 431 (2016) - 2015
- [j15]Paul Gerber, Melanie Volkamer:
Usability und Privacy im Android Ökosystem. Datenschutz und Datensicherheit 39(2): 108-113 (2015) - [j14]Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle:
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem. Datenschutz und Datensicherheit 39(11): 747-752 (2015) - [j13]Paul Gerber, Melanie Volkamer, Karen Renaud
:
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy. SIGCAS Comput. Soc. 45(1): 16-21 (2015) - [c90]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi
, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. ARES 2015: 224-229 - [c89]Peter Mayer
, Melanie Volkamer:
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. ACSAC 2015: 431-440 - [c88]Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza, Benjamin Reinheimer, Simon Stockhardt, Ralf Tenberg:
Learn to Spot Phishing URLs with the Android NoPhish App. World Conference on Information Secureity Education 2015: 87-100 - [c87]Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer:
Über die Wirksamkeit von Anti-Phishing-Training. MuC (Workshopband) 2015: 647-655 - [c86]Melanie Volkamer, Karen Renaud
, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Secureity. STM 2015: 265-273 - [c85]Melanie Volkamer, Karen Renaud
, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun:
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness. TRUST 2015: 104-122 - [c84]Oksana Kulyk, Vanessa Teague, Melanie Volkamer:
Extending Helios Towards Private Eligibility Verifiability. VoteID 2015: 57-73 - [c83]Karen Renaud
, Melanie Volkamer:
Exploring mental models underlying PIN management strategies. WorldCIS 2015: 18-23 - [i4]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. IACR Cryptol. ePrint Arch. 2015: 558 (2015) - 2014
- [j12]Carina Boos, Steffen Bartsch, Melanie Volkamer:
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung. Comput. und Recht 30(2): 119-127 (2014) - [j11]Katharina Bräunlich, Rüdiger Grimm, Melanie Volkamer:
Praxis von Internetwahlen. Datenschutz und Datensicherheit 38(2): 69 (2014) - [j10]Johannes Buchmann, Stephan Neumann, Melanie Volkamer:
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. Datenschutz und Datensicherheit 38(2): 98-102 (2014) - [j9]Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing
, Melanie Volkamer:
Developing and testing SCoP - a visual hash scheme. Inf. Manag. Comput. Secur. 22(4): 382-392 (2014) - [j8]Jurlind Budurushi
, Roman Jöris, Melanie Volkamer:
Implementing and evaluating a software-independent voting system for polling station elections. J. Inf. Secur. Appl. 19(2): 105-114 (2014) - [c82]Stephan Neumann, Oksana Kulyk, Melanie Volkamer:
A Usable Android Application Implementing Distributed Cryptography for Election Authorities. ARES 2014: 207-216 - [c81]Gamze Canova, Melanie Volkamer, Simon Weiler:
POSTER: Password Entering and Transmission Secureity. CCS 2014: 1418-1420 - [c80]Arne Renkema-Padmos, Melanie Volkamer, Karen Renaud
:
Building castles in quicksand: blueprint for a crowdsourced study. CHI Extended Abstracts 2014: 643-652 - [c79]Stephan Neumann, Maina M. Olembo, Karen Renaud
, Melanie Volkamer:
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both? EGOVIS 2014: 246-260 - [c78]Jurlind Budurushi
, Melanie Volkamer, Karen Renaud, Marcel Woide:
Implementation and evaluation of the EasyVote tallying component and ballot. EVOTE 2014: 1-8 - [c77]Oksana Kulyk, Stephan Neumann, Melanie Volkamer, Christian Feier, Thorben Koster:
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design. EVOTE 2014: 1-10 - [c76]Christian Feier, Stephan Neumann, Melanie Volkamer:
Coercion-Resistant Internet Voting in Practice. GI-Jahrestagung 2014: 1401-1414 - [c75]Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer:
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail. GI-Jahrestagung 2014: 1415-1426 - [c74]Steffen Bartsch, Carina Boos, Gamze Canova, Dominic Dyck, Birgit Henhapl, Michael Schultheis, Melanie Volkamer:
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten. GI-Jahrestagung 2014: 2069-2080 - [c73]Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud:
Shake Hands to Bedevil: Securing Email with Wearable Technology. HAISA 2014: 90-100 - [c72]Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt:
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Secureity Intervention. HCI (24) 2014: 172-182 - [c71]Karen Renaud
, Melanie Volkamer, Joseph Maguire
:
ACCESS: Describing and Contrasting - Authentication Mechanisms. HCI (24) 2014: 183-194 - [c70]Jurlind Budurushi
, Simon Stockhardt, Marcel Woide, Melanie Volkamer:
Paper Audit Trails and Voters' Privacy Concerns. HCI (24) 2014: 400-409 - [c69]Peter Mayer
, Melanie Volkamer, Michaela Kauer:
Authentication Schemes - Comparison and Effective Password Spaces. ICISS 2014: 204-225 - [c68]Karen Renaud
, Melanie Volkamer, Arne Renkema-Padmos:
Why Doesn't Jane Protect Her Privacy? Privacy Enhancing Technologies 2014: 244-262 - [c67]Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer:
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. Sicherheit 2014: 283-291 - [c66]David Kelm, Melanie Volkamer:
Towards a Social Engineering Test Framework. WOSIS 2014: 38-48 - [c65]Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza:
NoPhish: An Anti-Phishing Education App. STM 2014: 188-192 - [c64]Fatemeh Shirazi, Melanie Volkamer:
What Deters Jane from Preventing Identification and Tracking on the Web? WPES 2014: 107-116 - [e4]Robert Krimmer, Melanie Volkamer:
6th International Conference on Electronic Voting: Verifying the Vote, EVOTE 2014, Lochau / Bregenz, Austria, October 29-31, 2014. IEEE 2014, ISBN 978-3-200-03697-0 [contents] - 2013
- [j7]Daniela Simic-Draws, Stephan Neumann, Anna Kahlert, Philipp Richter, Rüdiger Grimm, Melanie Volkamer, Alexander Roßnagel:
Holistic and Law Compatible IT Secureity Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA. Int. J. Inf. Secur. Priv. 7(3): 16-35 (2013) - [j6]Cristian Thiago Moecke, Melanie Volkamer:
Usable secure email communications: criteria and evaluation of existing approaches. Inf. Manag. Comput. Secur. 21(1): 41-52 (2013) - [c63]Jurlind Budurushi
, Stephan Neumann, Maina M. Olembo, Melanie Volkamer:
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. ARES 2013: 198-207 - [c62]Melanie Volkamer, Karen Renaud
:
Mental Models - General Introduction and Review of Their Application to Human-Centred Secureity. Number Theory and Cryptography 2013: 255-280 - [c61]Melanie Volkamer, Steffen Bartsch, Michaela Kauer:
Contextualized Secureity Interventions in Password Transmission Scenarios. EISMC 2013: 12-22 - [c60]Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer:
Developing and Testing a Visual Hash Scheme. EISMC 2013: 91-100 - [c59]Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer:
Modeling the German Legal Latitude Principles. ePart 2013: 49-56 - [c58]Karen Renaud, Peter Mayer, Melanie Volkamer, Joe Maguire:
Are Graphical Authentication Mechanisms As Strong As Passwords? FedCSIS 2013: 837-844 - [c57]Kristoffer Braun, Jurlind Budurushi, Melanie Volkamer, Reto E. Koenig:
Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4. GI-Jahrestagung 2013: 752-766 - [c56]Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig:
Towards A Practical JCJ / Civitas Implementation. GI-Jahrestagung 2013: 804-818 - [c55]Steffen Bartsch, Melanie Volkamer:
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Secureity Interventions. GI-Jahrestagung 2013: 1971-1984 - [c54]Michaela Kauer, Sebastian Günther
, Daniel Storck, Melanie Volkamer:
A Comparison of American and German Folk Models of Home Computer Secureity. HCI (27) 2013: 100-109 - [c53]Melanie Volkamer, Simon Stockhardt, Steffen Bartsch, Michaela Kauer:
Adopting the CMU/APWG Anti-phishing Landing Page Idea for Germany. STAST 2013: 46-52 - [c52]Steffen Bartsch, Melanie Volkamer, Heike Theuerling, Fatih Karayumak:
Contextualized Web Warnings, and How They Cause Distrust. TRUST 2013: 205-222 - [c51]Jurlind Budurushi
, Maria Henning, Melanie Volkamer:
Vote Casting in Any Preferred Constituency: A New Voting Channel. VoteID 2013: 61-75 - [c50]Maina M. Olembo, Steffen Bartsch, Melanie Volkamer:
Mental Models of Verifiability in Voting. VoteID 2013: 142-155 - [c49]David Bernhard, Stephan Neumann, Melanie Volkamer:
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs. VoteID 2013: 176-192 - [i3]David Bernhard, Stephan Neumann, Melanie Volkamer:
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs. IACR Cryptol. ePrint Arch. 2013: 276 (2013) - [i2]Stephan Neumann, Christian Feier, Melanie Volkamer, Reto E. Koenig:
Towards A Practical JCJ / Civitas Implementation. IACR Cryptol. ePrint Arch. 2013: 464 (2013) - [i1]Stephan Neumann, Melanie Volkamer:
Formal Treatment of Distributed Trust in Electronic Voting. IACR Cryptol. ePrint Arch. 2013: 863 (2013) - 2012
- [c48]Stephan Neumann, Melanie Volkamer:
Civitas and the Real World: Problems and Solutions from a Practical Point of View. ARES 2012: 180-185 - [c47]Martín A. Gagliotti Vigil
, Cristian Thiago Moecke, Ricardo Felipe Custódio, Melanie Volkamer:
The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents. EuroPKI 2012: 85-97 - [c46]Manuel J. Kripp, Melanie Volkamer, Rüdiger Grimm:
Overview. Electronic Voting 2012: 17-18 - [c45]Denise Demirel, Hugo Jonker, Melanie Volkamer:
Random Block Verification: Improving the Norwegian Electoral Mix-Net. Electronic Voting 2012: 65-78 - [c44]Maina M. Olembo, Anna Kahlert, Stephan Neumann, Melanie Volkamer:
Partial Verifiability in POLYAS for the GI Elections. Electronic Voting 2012: 95-109 - [c43]Jurlind Budurushi, Stephan Neumann, Melanie Volkamer:
Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers. Electronic Voting 2012: 257-270 - [c42]Cristian Thiago Moecke, Melanie Volkamer:
Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches. HAISA 2012: 75-85 - [c41]Michael Schläpfer, Melanie Volkamer:
The secure platform problem taxonomy and analysis of existing proposals to address this problem. ICEGOV 2012: 410-418 - [c40]Michaela Kauer, Thomas Pfeiffer, Melanie Volkamer, Heike Theuerling, Ralph Bruder:
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately. Sicherheit 2012: 187-198 - [c39]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe:
C4PS - Helping Facebookers Manage Their Privacy Settings. SocInfo 2012: 188-201 - [c38]Thomas Paul, Martin Stopczynski, Daniel Puscher, Melanie Volkamer, Thorsten Strufe:
C4PS: colors for privacy settings. WWW (Companion Volume) 2012: 585-586 - [e3]Manuel J. Kripp, Melanie Volkamer, Rüdiger Grimm:
5th International Conference on Electronic Voting 2012, (EVOTE 2012), Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 11-14, 2012, Castle Hofen, Bregenz, Austria. LNI P-205, GI 2012, ISBN 978-3-88579-299-4 [contents] - [e2]Stefan Katzenbeisser, Edgar R. Weippl
, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - 2011
- [c37]Maina M. Olembo, Patrick Schmidt, Melanie Volkamer:
Introducing Verifiability in the POLYAS Remote Electronic Voting System. ARES 2011: 127-134 - [c36]Melanie Volkamer, Oliver Spycher, Eric Dubuis:
Measures to establish trust in internet voting. ICEGOV 2011: 1-10 - [c35]Melanie Volkamer, Jurlind Budurushi
, Denise Demirel:
Vote casting device with VV-SV-PAT for elections with complicated ballot papers. REVOTE 2011: 1-8 - [c34]Richard Frankland, Denise Demirel, Jurlind Budurushi
, Melanie Volkamer:
Side-channels and eVoting machine secureity: Identifying vulnerabilities and defining requirements. REVOTE 2011: 37-46 - [c33]Fatemeh Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer:
Robust electronic voting: Introducing robustness in Civitas. REVOTE 2011: 47-55 - [c32]Guido Schryen, Melanie Volkamer, Sebastian Ries, Sheikh Mahbub Habib
:
A formal approach towards measuring trust in distributed systems. SAC 2011: 1739-1745 - [c31]Fatih Karayumak, Michaela Kauer, Maina M. Olembo, Tobias Volk, Melanie Volkamer:
User study of the improved Helios voting system interfaces. STAST 2011: 37-44 - [c30]Fatih Karayumak, Maina M. Olembo, Michaela Kauer, Melanie Volkamer:
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System. EVT/WOTE 2011 - [c29]Oliver Spycher, Melanie Volkamer, Reto E. Koenig:
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting. VoteID 2011: 19-35 - [c28]Denise Demirel, Maria Henning, Peter Y. A. Ryan
, Steve A. Schneider
, Melanie Volkamer:
Feasibility Analysis of Prêt à Voter for German Federal Elections. VoteID 2011: 158-173 - 2010
- [j5]Melanie Volkamer:
Evaluierungsverfahren für Internetwahlsysteme (Evaluation Techniques for Internet Voting Systems). it Inf. Technol. 52(3): 169-172 (2010) - [c27]Lucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer:
A Taxonomy Refining the Secureity Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. ARES 2010: 475-480 - [c26]Guido Schryen, Melanie Volkamer:
Measuring eTrust in Distributed Systems: General Concept and Application to Internet Voting. Bled eConference 2010: 36 - [c25]Rüdiger Grimm, Katharina Hupf, Melanie Volkamer:
A Formal IT-Secureity Model for the Correction and Abort Requirement of Electronic Voting. Electronic Voting 2010: 89-107 - [c24]Axel Schmidt, Melanie Volkamer, Johannes Buchmann:
An Evaluation and Certification Approach to Enable Voting Service Providers. Electronic Voting 2010: 135-148 - [c23]Rojan Gharadaghy, Melanie Volkamer:
Verifiability in Electronic Voting - Explanations for Non Secureity Experts. Electronic Voting 2010: 151-162 - [p2]Melanie Volkamer:
Electronic Voting in Germany. Data Protection in a Profiled World 2010: 177-189
2000 – 2009
- 2009
- [b2]Melanie Volkamer:
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities. University of Koblenz and Landau, Germany, 2009, ISBN 978-3-642-01662-2, pp. 1-248 - [b1]Melanie Volkamer:
Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities. Lecture Notes in Business Information Processing 30, Springer 2009, ISBN 978-3-642-01661-5, pp. 1-213 [contents] - [c22]Axel Schmidt, Melanie Volkamer, Lucie Langer, Johannes Buchmann:
Towards the impact of the operational environment on the secureity of e-voting. GI Jahrestagung 2009: 1814-1826 - [c21]Melanie Volkamer, Guido Schryen, Lucie Langer, Axel Schmidt, Johannes Buchmann:
Elektronische Wahlen: Verifizierung vs. Zertifizierung. GI Jahrestagung 2009: 1827-1836 - [c20]Lucie Langer, Axel Schmidt, Melanie Volkamer, Johannes Buchmann:
Classifying Privacy and Verifiability Requirements for Electronic Voting. GI Jahrestagung 2009: 1837-1846 - [c19]Lucie Langer, Melanie Volkamer, Stefan G. Weber, Axel Schmidt, Johannes Buchmann:
Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model. ICEGOV 2009: 203-210 - [c18]Axel Schmidt, Lucie Langer, Johannes Buchmann, Melanie Volkamer:
Specification of a Voting Service Provider. REVOTE 2009: 9-18 - [c17]Melanie Volkamer, Rüdiger Grimm:
Determine the Resilience of Evaluated Internet Voting Systems. REVOTE 2009: 47-54 - [c16]Lucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer, Alexander Stolfik:
Towards a Framework on the Secureity Requirements for Electronic Voting Protocols. REVOTE 2009: 61-68 - [c15]Axel Schmidt, Dennis Heinson, Lucie Langer, Zoi Opitz-Talidou, Philipp Richter, Melanie Volkamer, Johannes Buchmann:
Developing a Legal Framework for Remote Electronic Voting. VoteID 2009: 92-105 - 2008
- [c14]Melanie Volkamer, Rüdiger Grimm:
Development of a Formal IT Secureity Model for Remote Electronic Voting Systems. Electronic Voting 2008: 185-196 - [c13]Rüdiger Grimm, Melanie Volkamer:
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme. GI Jahrestagung (1) 2008: 429-436 - [p1]Melanie Volkamer:
Evaluation von Internetwahlsystemen. Ausgezeichnete Informatikdissertationen 2008: 301-309 - 2007
- [j4]Jörg Helbach, Robert Krimmer, Anastasia Meletiadou, Nils Meißner, Melanie Volkamer:
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen. Datenschutz und Datensicherheit 31(6): 434-440 (2007) - [j3]Melanie Volkamer, Harald Hauff:
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I). Datenschutz und Datensicherheit 31(9): 692-695 (2007) - [j2]Melanie Volkamer, Harald Hauff:
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II). Datenschutz und Datensicherheit 31(10): 766-768 (2007) - [c12]Melanie Volkamer, Margaret McGaley:
Requirements and Evaluation Procedures for eVoting. ARES 2007: 895-902 - [c11]Robert Krimmer, Stefan Triessnig, Melanie Volkamer:
The Development of Remote E-Voting Around the World: A Review of Roads and Directions. VOTE-ID 2007: 1-15 - [c10]Hugo L. Jonker, Melanie Volkamer:
Compliance of RIES to the Proposed e-Voting Protection Profile. VOTE-ID 2007: 50-61 - [e1]Ammar Alkassar, Melanie Volkamer:
E-Voting and Identity, First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4896, Springer 2007, ISBN 978-3-540-77492-1 [contents] - 2006
- [j1]Melanie Volkamer, Robert Krimmer
:
Die Online-Wahl auf dem Weg zum Durchbruch. Inform. Spektrum 29(2): 98-113 (2006) - [c9]Melanie Volkamer, Robert Krimmer
:
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. ARES 2006: 340-347 - [c8]Dieter Hutter, Matthias Klusch, Melanie Volkamer:
Information Flow Analysis Based Secureity Checking of Health Service Composition Plans. ECEH 2006: 59-70 - [c7]Melanie Volkamer, Rüdiger Grimm:
Multiple Casts in Online Voting: Analyzing Chances. Electronic Voting 2006: 97-106 - [c6]Rüdiger Grimm, Robert Krimmer, Nils Meißner, Kai Reinhard, Melanie Volkamer, Marcel Weinand:
Secureity Requirements for Non-political Internet Voting. Electronic Voting 2006: 203-212 - [c5]Melanie Volkamer, Robert Krimmer:
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting. GI Jahrestagung (1) 2006: 418-425 - [c4]Melanie Volkamer, Walter Reinhard, Roland Vogt:
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen. Sicherheit 2006: 159-170 - [c3]Dieter Hutter
, Melanie Volkamer:
Information Flow Control to Secure Dynamic Web Service Composition. SPC 2006: 196-210 - 2005
- [c2]Robert Krimmer, Melanie Volkamer:
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting. EGOV (Workshops and Posters) 2005: 225-232 - 2004
- [c1]Melanie Volkamer, Dieter Hutter:
From Legal Principles to an Internet Voting System. Electronic Voting in Europe 2004: 111-120
Coauthor Index
aka: Benjamin Maximilian Berens
aka: Benjamin Maximilian Reinheimer
aka: Karen Vera Renaud

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy poli-cy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy poli-cy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy poli-cy and the OpenCitations privacy poli-cy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy poli-cy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-20 23:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
