Jurlind Budurushi
Jurlind Budurushi
Head of Security at Cloudical Deutschland GmbH
Bestätigte E-Mail-Adresse bei cloudical.io - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Pretty understandable democracy-a secure and understandable internet voting scheme
J Budurushi, S Neumann, MM Olembo, M Volkamer
2013 International Conference on Availability, Reliability and Security, 198-207, 2013
272013
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
192017
Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting
S Neumann, J Budurushi, M Volkamer
Design, development, and use of secure electronic voting systems, 27-61, 2014
182014
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
computers & Security 71, 88-99, 2017
132017
Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers
J Budurushi, S Neumann, M Volkamer
5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012
122012
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
M Volkamer, J Budurushi, D Demirel
2011 International Workshop on Requirements Engineering for Electronic …, 2011
122011
An investigation into the usability of electronic voting systems for complex elections
J Budurushi, K Renaud, M Volkamer, M Woide
Annals of Telecommunications 71 (7), 309-322, 2016
112016
Implementing and evaluating a software-independent voting system for polling station elections
J Budurushi, R Jöris, M Volkamer
Journal of information security and applications 19 (2), 105-114, 2014
102014
Positive but skeptical: A study of attitudes towards Internet voting in Sweden
M Faraon, G Stenberg, J Budurushi, M Kaipainen
CeDEM Asia 2014: International Conference for E-Democracy and Open …, 2015
82015
Introducing precautionary behavior by temporal diversion of voter attention from casting to verifying their vote
J Budurushi, M Woide, M Volkamer
Workshop on Usable Security (USEC), 2014
72014
Feasibility analysis of various electronic voting systems for complex elections
J Budurushi, M Volkamer
Conference for E-Democracy and Open Governement, 141, 2014
62014
Elektronische kandidatenauswahl und automatisierte stimmermittlung am beispiel hessischer kommunalwahlen
M Henning, M Volkamer, J Budurushi
Die Offentliche Verwaltung (DOV), 2012
62012
Side-channels and evoting machine security: Identifying vulnerabilities and defining requirements
R Frankland, D Demirel, J Budurushi, M Volkamer
2011 International Workshop on Requirements Engineering for Electronic …, 2011
52011
SecIVo: a quantitative security evaluation framework for internet voting schemes
S Neumann, M Volkamer, J Budurushi, M Prandini
Annals of Telecommunications 71 (7), 337-352, 2016
42016
Elektronische Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
M Henning, J Budurushi, M Volkamer
MultiMedia und Recht (MMR), 154-8, 2014
42014
Efficiency evaluation of cryptographic protocols for boardroom voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
Usable Security Evaluation of EasyVote in the Context of Complex Elections
J Budurushi
Technische Universität Darmstadt, 2016
22016
Paper Audit Trails and Voters’ Privacy Concerns
J Budurushi, S Stockhardt, M Woide, M Volkamer
International Conference on Human Aspects of Information Security, Privacy …, 2014
22014
Vote casting in any preferred constituency: a new voting channel
J Budurushi, M Henning, M Volkamer
International Conference on E-Voting and Identity, 61-75, 2013
22013
Assertion-based Approaches to Auditing Complex Elections, with application to party-list proportional elections
M Blom, J Budurushi, RL Rivest, PB Stark, PJ Stuckey, V Teague, ...
arXiv preprint arXiv:2107.11903, 2021
12021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20