Oksana Kulyk
Title
Cited by
Cited by
Year
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
372015
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
262018
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
20*2018
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
202015
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
182017
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
122017
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
122014
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
112016
Usability is not enough: lessons learned from human factors in security-research for verifiability
O Kulyk, M Volkamer
E-Vote-ID (2018), 66-81, 2018
102018
Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
102017
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
102016
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
102014
Comparative usability evaluation of cast-as-intended verification approaches in internet voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
82018
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
IACR ePrint 431, 2016
8*2016
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
82016
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop of usable security. USEC, 2019
52019
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
Financial Cryptography and Data Security Workshop on Usable Security (AsiaUSEC), 2020
32020
Comparing “challenge-based” and “code-based” internet voting verification implementations
O Kulyk, J Henzel, K Renaud, M Volkamer
IFIP Conference on Human-Computer Interaction, 519-538, 2019
32019
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
O Kulyk, P Mayer, M Volkamer, O Käfer
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
32018
Enabling vote delegation for boardroom voting
O Kulyk, S Neumann, K Marky, M Volkamer
International Conference on Financial Cryptography and Data Security, 419-433, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20