Jurlind Budurushi
Jurlind Budurushi
Head of Security at Cloudical Deutschland GmbH
Bestätigte E-Mail-Adresse bei cloudical.io - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Pretty understandable democracy-a secure and understandable internet voting scheme
J Budurushi, S Neumann, MM Olembo, M Volkamer
2013 International Conference on Availability, Reliability and Security, 198-207, 2013
262013
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy, 2017
152017
Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting
S Neumann, J Budurushi, M Volkamer
Design, development, and use of secure electronic voting systems, 27-61, 2014
152014
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
Computers & Security 71, 88-99, 2017
112017
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
M Volkamer, J Budurushi, D Demirel
2011 International Workshop on Requirements Engineering for Electronic …, 2011
112011
An investigation into the usability of electronic voting systems for complex elections
J Budurushi, K Renaud, M Volkamer, M Woide
Annals of Telecommunications 71 (7-8), 309-322, 2016
92016
Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers
J Budurushi, S Neumann, M Volkamer
5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012
82012
Positive but skeptical: A study of attitudes towards Internet voting in Sweden
M Faraon, G Stenberg, J Budurushi, M Kaipainen
CeDEM Asia 2014: International Conference for E-Democracy and Open …, 2015
72015
Introducing precautionary behavior by temporal diversion of voter attention from casting to verifying their vote
J Budurushi, M Woide, M Volkamer
Workshop on Usable Security (USEC), 2014
72014
Feasibility analysis of various electronic voting systems for complex elections
J Budurushi, M Volkamer
Conference for E-Democracy and Open Governement, 141, 2014
62014
Implementing and evaluating a software-independent voting system for polling station elections
J Budurushi, R Jöris, M Volkamer
Journal of information security and applications 19 (2), 105-114, 2014
62014
Elektronische kandidatenauswahl und automatisierte stimmermittlung am beispiel hessischer kommunalwahlen
M Henning, M Volkamer, J Budurushi
Die Offentliche Verwaltung (DOV), 2012
62012
Elektronische Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes
M Henning, J Budurushi, M Volkamer
MultiMedia und Recht (MMR), 154-158, 2014
42014
SecIVo: a quantitative security evaluation framework for internet voting schemes
S Neumann, M Volkamer, J Budurushi, M Prandini
Annals of Telecommunications 71 (7-8), 337-352, 2016
32016
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements
R Frankland, D Demirel, J Budurushi, M Volkamer
2011 International Workshop on Requirements Engineering for Electronic …, 2011
32011
Paper Audit Trails and Voters’ Privacy Concerns
J Budurushi, S Stockhardt, M Woide, M Volkamer
International Conference on Human Aspects of Information Security, Privacy …, 2014
22014
Introduction to special issue on e-voting
J Budurushi, S Neumann, K Renaud, M Volkamer
Journal of information security and applications 38, 122-123, 2018
12018
Implementation and evaluation of the EasyVote tallying component and ballot
J Budurushi, M Volkamer, K Renaud, M Woide
2014 6th International Conference on Electronic Voting: Verifying the Vote …, 2014
12014
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
J Budurushi, S Neumann, G Shala, M Volkamer
Informatik 2014, 2014
12014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20