Oksana Kulyk
Titel
Zitiert von
Zitiert von
Jahr
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
382015
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
292018
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
222018
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
212015
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
192017
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
132017
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
122014
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
112016
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
112016
Usability is not enough: lessons learned from human factors in security-research for verifiability
O Kulyk, M Volkamer
E-Vote-ID (2018), 66-81, 2018
102018
Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
102017
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
102014
Comparative usability evaluation of cast-as-intended verification approaches in internet voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
92018
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
IACR ePrint 431, 2016
8*2016
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
82016
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop of usable security. USEC, 2019
62019
Comparing “challenge-based” and “code-based” internet voting verification implementations
O Kulyk, J Henzel, K Renaud, M Volkamer
IFIP Conference on Human-Computer Interaction, 519-538, 2019
52019
Does my smart device provider care about my privacy? Investigating trust factors and user attitudes in IoT systems
O Kulyk, K Milanovic, J Pitt
Proceedings of the 11th Nordic Conference on Human-Computer Interaction …, 2020
32020
SARS-CoV-2, a Threat to Privacy?
T Daubenschuetz, O Kulyk, S Neumann, I Hinterleitner, PR Delgado, ...
arXiv preprint arXiv:2004.10305, 2020
32020
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
Financial Cryptography and Data Security Workshop on Usable Security (AsiaUSEC), 2020
32020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20