Jurlind Budurushi
Jurlind Budurushi
Head of Security at Cloudical Deutschland GmbH
Bestätigte E-Mail-Adresse bei cloudical.io - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Pretty understandable democracy-a secure and understandable internet voting scheme
J Budurushi, S Neumann, MM Olembo, M Volkamer
2013 International Conference on Availability, Reliability and Security, 198-207, 2013
262013
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
182017
Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting
S Neumann, J Budurushi, M Volkamer
Design, development, and use of secure electronic voting systems, 27-61, 2014
162014
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
122017
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
M Volkamer, J Budurushi, D Demirel
2011 International Workshop on Requirements Engineering for Electronic …, 2011
122011
Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers
J Budurushi, S Neumann, M Volkamer
5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012
112012
An investigation into the usability of electronic voting systems for complex elections
J Budurushi, K Renaud, M Volkamer, M Woide
Annals of Telecommunications 71 (7), 309-322, 2016
102016
Implementing and evaluating a software-independent voting system for polling station elections
J Budurushi, R Jöris, M Volkamer
Journal of information security and applications 19 (2), 105-114, 2014
92014
Positive but skeptical: A study of attitudes towards Internet voting in Sweden
M Faraon, G Stenberg, J Budurushi, M Kaipainen
CeDEM Asia 2014: International Conference for E-Democracy and Open …, 2015
82015
Introducing precautionary behavior by temporal diversion of voter attention from casting to verifying their vote
J Budurushi, M Woide, M Volkamer
Workshop on Usable Security (USEC), 2014
72014
Feasibility analysis of various electronic voting systems for complex elections
J Budurushi, M Volkamer
Conference for E-Democracy and Open Governement, 141, 2014
62014
SecIVo: a quantitative security evaluation framework for internet voting schemes
S Neumann, M Volkamer, J Budurushi, M Prandini
Annals of Telecommunications 71 (7), 337-352, 2016
42016
Elektronische Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
M Henning, J Budurushi, M Volkamer
MultiMedia und Recht (MMR), 154-8, 2014
42014
Elektronische kandidatenauswahl und automatisierte stimmermittlung am beispiel hessischer kommunalwahlen
M Henning, M Volkamer, J Budurushi
Die Offentliche Verwaltung (DOV), 2012
42012
Side-channels and evoting machine security: Identifying vulnerabilities and defining requirements
R Frankland, D Demirel, J Budurushi, M Volkamer
2011 International Workshop on Requirements Engineering for Electronic …, 2011
42011
Efficiency evaluation of cryptographic protocols for boardroom voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
Vote casting in any preferred constituency: a new voting channel
J Budurushi, M Henning, M Volkamer
International Conference on E-Voting and Identity, 61-75, 2013
22013
Introduction to special issue on e-voting
J Budurushi, S Neumann, K Renaud, M Volkamer
Journal of information security and applications 38, 122-123, 2018
12018
Usable Security Evaluation of EasyVote in the Context of Complex Elections
J Budurushi
Technische Universität Darmstadt, 2016
12016
Implementation and evaluation of the EasyVote tallying component and ballot
J Budurushi, M Volkamer, K Renaud, M Woide
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
12014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20