Oksana Kulyk
TitleCited byYear
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy, 2017
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
“This Website Uses Cookies”: Users’ Perceptions and Reactions to the Cookie Disclaimer,”
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Cryptology ePrint Archive, Report 2016/431, May 2016. http://eprint. iacr …, 2017
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
Usability is not Enough: Lessons Learned from’Human Factors in Security’Research for Verifiability
O Kulyk, M Volkamer
E-Vote-ID 2018, 66, 2018
Security proofs for participation privacy, receipt-freeness and ballot privacy for the Helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop of usable security. USEC, 2019
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
O Kulyk, P Mayer, M Volkamer, O Käfer
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Human Factors in Security
P Gerber, M Ghiglieri, B Henhapl, O Kulyk, K Marky, P Mayer, ...
Sicherheitskritische Mensch-Computer-Interaktion, 83-98, 2018
Advancing trust visualisations for wider applicability and user acceptance
O Kulyk, BM Reinheimer, P Gerber, F Volk, M Volkamer, M Mühlhäuser
2017 IEEE Trustcom/BigDataSE/ICESS, 562-569, 2017
The system can't perform the operation now. Try again later.
Articles 1–20