Oksana Kulyk
TitelZitiert vonJahr
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
182015
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
122015
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
102016
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
92017
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
82016
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
82014
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
72014
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy, 2017
52017
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Cryptology ePrint Archive, Report 2016/431.(March 2017). http://eprint. iacr …, 2017
5*2017
This website uses cookies”: users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
42018
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
42016
What Did I Really Vote For?
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
32018
Security proofs for participation privacy, receipt-freeness and ballot privacy for the Helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
32017
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
22018
Usability is not Enough: Lessons Learned from’Human Factors in Security’Research for Verifiability
O Kulyk, M Volkamer
E-Vote-ID 2018, 66, 2018
12018
Advancing Trust Visualisations for Wider Applicability and User Acceptance
O Kulyk, BM Reinheimer, P Gerber, F Volk, M Volkamer, M Mühlhäuser
2017 IEEE Trustcom/BigDataSE/ICESS, 562-569, 2017
12017
Enabling Vote Delegation for Boardroom Voting
O Kulyk, S Neumann, K Marky, M Volkamer
International Conference on Financial Cryptography and Data Security, 419-433, 2017
12017
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
12015
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen
O Kulyk, N Gerber, M Volkamer, A Hilt
Datenschutz und Datensicherheit-DuD 43 (2), 81-85, 2019
2019
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
O Kulyk, M Volkamer
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20