Oksana Kulyk
Cited by
Cited by
This website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
What did I really vote for? On the usability of verifiable e-voting schemes
K Marky, O Kulyk, K Renaud, M Volkamer
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
A socio-technical investigation into smartphone security
M Volkamer, K Renaud, O Kulyk, S Emeröz
International Workshop on Security and Trust Management, 265-273, 2015
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design
O Kulyk, S Neumann, M Volkamer, C Feier, T Koster
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
Usability is not Enough: Lessons Learned from'Human Factors in Security'Research for Verifiability
O Kulyk, M Volkamer
Cryptology ePrint Archive, 2018
Comparative usability evaluation of cast-as-intended verification approaches in internet voting
K Marky, O Kulyk, M Volkamer
SICHERHEIT 2018, 2018
Introducing proxy voting to Helios
O Kulyk, K Marky, S Neumann, M Volkamer
2016 11th International Conference on Availability, Reliability and Security …, 2016
Encouraging privacy-aware smartphone app installation: Finding out what the technically-adept do
O Kulyk, P Gerber, M El Hanafi, B Reinheimer, K Renaud, M Volkamer
Security and Privacy Awareness in Smart Environments–A Cross-Country Investigation
O Kulyk, B Reinheimer, L Aldag, P Mayer, N Gerber, M Volkamer
Financial Cryptography and Data Security Workshop on Usable Security (AsiaUSEC), 2020
Security proofs for participation privacy, receipt-freeness and ballot privacy for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Proceedings of the 12th International Conference on Availability …, 2017
Comparing “challenge-based” and “code-based” internet voting verification implementations
O Kulyk, J Henzel, K Renaud, M Volkamer
IFIP Conference on Human-Computer Interaction, 519-538, 2019
Security proofs for participation privacy, receipt-freeness, ballot privacy, and verifiability against malicious bulletin board for the helios voting scheme
D Bernhard, O Kulyk, M Volkamer
Cryptology ePrint Archive, 2016
A usable android application implementing distributed cryptography for election authorities
S Neumann, O Kulyk, M Volkamer
2014 Ninth International Conference on Availability, Reliability and …, 2014
Does my smart device provider care about my privacy? Investigating trust factors and user attitudes in IoT systems
O Kulyk, K Milanovic, J Pitt
Proceedings of the 11th Nordic Conference on Human-Computer Interaction …, 2020
Efficiency comparison of various approaches in e-voting protocols
O Kulyk, M Volkamer
International Conference on Financial Cryptography and Data Security, 209-223, 2016
Electronic voting
R Krimmer, JB i Esteve
Routledge Handbook of Election Law, 60-72, 2020
Does this app respect my privacy? Design and evaluation of information materials supporting privacy-related decisions of smartphone users
O Kulyk, P Gerber, K Marky, C Beckmann, M Volkamer
Workshop on usable security (USEC’19). San Diego, CA, 1-10, 2019
The system can't perform the operation now. Try again later.
Articles 1–20