Melanie Volkamer
Melanie Volkamer
Verifierad e-postadress på - Startsida
Citeras av
Citeras av
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
M Volkamer
Springer, 2009
The development of remote e-voting around the world: A review of roads and directions
R Krimmer, S Triessnig, M Volkamer
International Conference on E-Voting and Identity, 1-15, 2007
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & Security 77, 226-261, 2018
Usability Analysis of Helios-An Open Source Verifiable Remote Electronic Voting System.
F Karayumak, MM Olembo, M Kauer, M Volkamer
EVT/WOTE 11 (5), 2011
Information flow control to secure dynamic web service composition
D Hutter, M Volkamer
International Conference on Security in Pervasive Computing, 196-210, 2006
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
User study of the improved Helios voting system interfaces
F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
C4PS-helping Facebookers manage their privacy settings
T Paul, M Stopczynski, D Puscher, M Volkamer, T Strufe
International Conference on Social Informatics, 188-201, 2012
Civitas and the real world: problems and solutions from a practical point of view
S Neumann, M Volkamer
2012 Seventh International Conference on Availability, Reliability and …, 2012
Multiple casts in online voting: Analyzing chances
M Volkamer, R Grimm
Electronic Voting 2006–2nd International Workshop, Co-organized by Council …, 2006
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number Theory and Cryptography, 255-280, 2013
Determine the resilience of evaluated internet voting systems
M Volkamer, R Grimm
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
Security requirements for non-political internet voting
R Grimm, R Krimmer, N Meißner, K Reinhard, M Volkamer, M Weinand, ...
Ghost-safe-guarding home IoT environments with personalised real-time risk control
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Springer-Verlag Berlin, 2018
Transparency and technical measures to establish trust in norwegian internet voting
O Spycher, M Volkamer, R Koenig
International Conference on E-Voting and Identity, 19-35, 2011
Measures to establish trust in internet voting
M Volkamer, O Spycher, E Dubuis
Proceedings of the 5th International Conference on Theory and Practice of …, 2011
Requirements and evaluation procedures for eVoting
M Volkamer, M McGaley
The Second International Conference on Availability, Reliability and …, 2007
Enabling the application of open systems like PCs for online voting
M Volkamer, A Alkassar, AR Sadeghi, S Schulz
Proc. of Workshop on Frontiers in Electronic Elections, 2006
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20