Oksana Kulyk
Title
Cited by
Cited by
Year
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
332015
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
242018
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
212015
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy, 2017
182017
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
16*2018
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
122014
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
112017
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
112016
Usability is not enough: Lessons learned from ‘human factors in security’research for verifiability
O Kulyk, M Volkamer
E-Vote-ID 2018, 66, 2018
102018
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
102016
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
92014
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
82016
Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
72017
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
IACR ePrint 431, 2016
7*2016
Comparative usability evaluation of cast-as-intended verification approaches in internet voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
42018
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop of usable security. USEC, 2019
32019
Enabling vote delegation for boardroom voting
O Kulyk, S Neumann, K Marky, M Volkamer
International Conference on Financial Cryptography and Data Security, 419-433, 2017
32017
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
SARS-CoV-2, a Threat to Privacy?
T Daubenschuetz, O Kulyk, S Neumann, I Hinterleitner, PR Delgado, ...
arXiv preprint arXiv:2004.10305, 2020
22020
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
Financial Cryptography and Data Security Workshop on Usable Security (AsiaUSEC), 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20