Folgen
Melanie Volkamer
Melanie Volkamer
Bestätigte E-Mail-Adresse bei kit.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & security 77, 226-261, 2018
2332018
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
International Symposium on Privacy Enhancing Technologies Symposium, 244-262, 2014
1262014
The development of remote e-voting around the world: A review of roads and directions
R Krimmer, S Triessnig, M Volkamer
International Conference on E-Voting and Identity, 1-15, 2007
892007
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
M Volkamer
Springer, 2009
852009
Usability analysis of Helios—an open source verifiable remote electronic voting system
F Karayumak, MM Olembo, M Kauer, M Volkamer
2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011
742011
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
532017
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
532011
Information flow control to secure dynamic web service composition
D Hutter, M Volkamer
International Conference on Security in Pervasive Computing, 196-210, 2006
512006
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number Theory and Cryptography, 255-280, 2013
502013
User study of the improved Helios voting system interfaces
F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
482011
Ghost-safe-guarding home IoT environments with personalised real-time risk control
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Springer-Verlag Berlin, 2018
472018
NoPhish: an anti-phishing education app
G Canova, M Volkamer, C Bergmann, R Borza
International workshop on security and trust management, 188-192, 2014
472014
C4PS-helping Facebookers manage their privacy settings
T Paul, M Stopczynski, D Puscher, M Volkamer, T Strufe
International Conference on Social Informatics, 188-201, 2012
46*2012
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC), 2018
442018
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
International Conference on E-Voting and Identity, 57-73, 2015
442015
Civitas and the real world: problems and solutions from a practical point of view
S Neumann, M Volkamer
2012 Seventh International Conference on Availability, Reliability and …, 2012
442012
Teaching phishing-security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2016
382016
Are graphical authentication mechanisms as strong as passwords?
K Renaud, P Mayer, M Volkamer, J Maguire
2013 Federated Conference on Computer Science and Information Systems, 837-844, 2013
382013
Mental models of verifiability in voting
MM Olembo, S Bartsch, M Volkamer
International Conference on E-Voting and Identity, 142-155, 2013
382013
Multiple casts in online voting: Analyzing chances
M Volkamer, R Grimm
Electronic Voting 2006–2nd International Workshop, Co-organized by Council …, 2006
382006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20