Melanie Volkamer
Melanie Volkamer
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & security 77, 226-261, 2018
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
The development of remote e-voting around the world: A review of roads and directions
R Krimmer, S Triessnig, M Volkamer
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum …, 2007
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
M Volkamer
Springer, 2009
Usability Analysis of Helios-An Open Source Verifiable Remote Electronic Voting System.
F Karayumak, MM Olembo, M Kauer, M Volkamer
EVT/WOTE 11 (5), 2011
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC) 4, 2018
Ghost-safe-guarding home IoT environments with personalised real-time risk control
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Springer-Verlag Berlin, 2018
NoPhish: an anti-phishing education app
G Canova, M Volkamer, C Bergmann, R Borza
Security and Trust Management: 10th International Workshop, STM 2014 …, 2014
Information flow control to secure dynamic web service composition
D Hutter, M Volkamer
Security in Pervasive Computing: Third International Conference, SPC 2006 …, 2006
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
E-Voting and Identity: 5th International Conference, VoteID 2015, Bern …, 2015
Civitas and the real world: problems and solutions from a practical point of view
S Neumann, M Volkamer
2012 Seventh International Conference on Availability, Reliability and …, 2012
User study of the improved Helios voting system interfaces
F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
Teaching phishing-security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
C4PS-helping Facebookers manage their privacy settings
T Paul, M Stopczynski, D Puscher, M Volkamer, T Strufe
Social Informatics: 4th International Conference, SocInfo 2012, Lausanne …, 2012
NoPhish app evaluation: lab and retention study
G Canova, M Volkamer, C Bergmann, B Reinheimer
NDSS workshop on usable security, 2015
Investigating People's Privacy Risk Perception.
N Gerber, B Reinheimer, M Volkamer
Proc. Priv. Enhancing Technol. 2019 (3), 267-288, 2019
Exploring consumers’ attitudes of smart TV related privacy risks
M Ghiglieri, M Volkamer, K Renaud
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20