Oksana Kulyk
Titel
Citeras av
Citeras av
År
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
412015
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
312018
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
232018
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
212015
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
192017
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
142017
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
122016
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
122016
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
122014
Usability is not enough: lessons learned from human factors in security-research for verifiability
O Kulyk, M Volkamer
E-Vote-ID (2018), 66-81, 2018
102018
Comparative usability evaluation of cast-as-intended verification approaches in internet voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
102018
Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
102017
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
102014
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
92016
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
IACR ePrint 431, 2016
8*2016
Comparing “challenge-based” and “code-based” internet voting verification implementations
O Kulyk, J Henzel, K Renaud, M Volkamer
IFIP Conference on Human-Computer Interaction, 519-538, 2019
72019
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop of usable security. USEC, 2019
62019
Efficiency evaluation of cryptographic protocols for boardroom voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
42015
Does my smart device provider care about my privacy? Investigating trust factors and user attitudes in IoT systems
O Kulyk, K Milanovic, J Pitt
Proceedings of the 11th Nordic Conference on Human-Computer Interaction …, 2020
32020
SARS-CoV-2, a Threat to Privacy?
T Daubenschuetz, O Kulyk, S Neumann, I Hinterleitner, PR Delgado, ...
arXiv preprint arXiv:2004.10305, 2020
32020
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20