Melanie Volkamer
Orcid: 0000-0003-2674-4043Affiliations:
- Karlsruhe Institute of Technology, Germany
According to our database1,
Melanie Volkamer
authored at least 222 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video.
Comput. Secur., February, 2024
Comput. Secur., January, 2024
Proceedings of the Mensch und Computer 2024, 2024
"Data Protection Can Sometimes Be a Nuisance" A Notification Study on Data Sharing Practices in City Apps.
Proceedings of the Mensch und Computer 2024, 2024
Proceedings of the Mensch und Computer 2024, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Better Together: The Interplay Between a Phishing Awareness Video and a Link-centric Phishing Support Tool.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent Banners.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Technische und datenschutzrechtliche Einordnung von Weiterleitungs-URLs in E‑Mails - Was bei Weiterleitungs-URLs in E‑Mails aus Marketinggründen zu beachten ist.
Comput. und Recht, December, 2023
Online-Bundestagswahlen - Verfassungsrechtliche Grenzen und technische Herausforderungen - Die Basis der Demokratie in der digitalen Dekade.
Comput. und Recht, November, 2023
Datenschutz und Datensicherheit (dud), May, 2023
Proceedings of the Mensch und Computer 2023, 2023
Usable Security: Security 'Warnings' 2.0.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 2023 European Symposium on Usable Security, 2023
Proceedings of the 2023 European Symposium on Usable Security, 2023
2022
Increasing security without decreasing usability: A comparison of various verifiable voting systems.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the Sicherheit, 2022
Proceedings of the NordiCHI '22: Nordic Human-Computer Interaction Conference, Aarhus, Denmark, October 8, 2022
PassGlobe: Ein Shoulder-Surfing resistentes Authentifizierungsverfahren für Virtual Reality Head-Mounted Displays.
Proceedings of the Mensch und Computer 2022 - Workshopband, Darmstadt, Germany, September 4, 2022
Proceedings of the Human Aspects of Information Security and Assurance, 2022
Technische und Rechtliche Auseinandersetzung mit Weiterleitungs-URLs in E-Mails aus Security-Gründen.
Proceedings of the 52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26., 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass.
AIS Trans. Hum. Comput. Interact., December, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Mensch und Computer 2021, 2021
"Healthy surveillance": Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Datenschutz und Datensicherheit, 2020
Datenschutz und Datensicherheit, 2020
Datenschutz und Datensicherheit, 2020
J. Cybersecur., 2020
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
CoRR, 2020
An investigation of phishing awareness and education over time: When and how to best remind users.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.
Proceedings of the Financial Cryptography and Data Security, 2020
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
2019
Datenschutz und Datensicherheit, 2019
E-Voting - An Overview of the Development in the Past 15 Years and Current Discussions.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability.
IACR Cryptol. ePrint Arch., 2018
Datenschutz und Datensicherheit, 2018
Datenschutz und Datensicherheit, 2018
Datenschutz und Datensicherheit, 2018
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior.
Comput. Secur., 2018
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Proceedings of the Sicherheit 2018, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
Proceedings of the Security in Computer and Information Sciences, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
J. Inf. Secur. Appl., 2017
Inf. Comput. Secur., 2017
IEEE Secur. Priv., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Inf. Comput. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Datenschutz und Datensicherheit, 2016
Ann. des Télécommunications, 2016
An investigation into the usability of electronic voting systems for complex elections.
Ann. des Télécommunications, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Mensch und Computer 2016, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
Nophish: evaluation of a web application that teaches people being aware of phishing attacks.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
SIGCAS Comput. Soc., 2015
IACR Cryptol. ePrint Arch., 2015
Datenschutz und Datensicherheit, 2015
Proceedings of the 2015 World Congress on Internet Security, 2015
Proceedings of the E-Voting and Identity - 5th International Conference, 2015
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the Mensch und Computer 2015, 2015
Proceedings of the Information Security Education Across the Curriculum, 2015
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Implementing and evaluating a software-independent voting system for polling station elections.
J. Inf. Secur. Appl., 2014
Datenschutz und Datensicherheit, 2014
Comput. und Recht, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Proceedings of the Ninth International Conference on Availability, 2014
2013
Inf. Manag. Comput. Secur., 2013
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Int. J. Inf. Secur. Priv., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Machbarkeitsanalyse der scannergestützten Stimmzettelanalyse mittels VividForms und UniWahl4.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013
Mental Models - General Introduction and Review of Their Application to Human-Centred Security.
Proceedings of the Number Theory and Cryptography, 2013
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the Social Informatics, 2012
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Proceedings of the Sicherheit 2012: Sicherheit, 2012
The secure platform problem taxonomy and analysis of existing proposals to address this problem.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Evaluierungsverfahren für Internetwahlsysteme (Evaluation Techniques for Internet Voting Systems).
it Inf. Technol., 2010
Proceedings of the Electronic Voting 2010, 2010
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Proceedings of the Electronic Voting 2010, 2010
Proceedings of the Electronic Voting 2010, 2010
Measuring eTrust in Distributed Systems: General Concept and Application to Internet Voting.
Proceedings of the 23rd Bled eConference: eTrust: Implications for the Individual, 2010
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Proceedings of the ARES 2010, 2010
Proceedings of the Data Protection in a Profiled World, 2010
2009
Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities
Lecture Notes in Business Information Processing 30, Springer, ISBN: 978-3-642-01661-5, 2009
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities.
PhD thesis, 2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model.
Proceedings of the ICEGOV 2009, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
2008
Proceedings of the Ausgezeichnete Informatikdissertationen 2008, 2008
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008
Proceedings of the 3rd International Conference, 2008
2007
Datenschutz und Datensicherheit, 2007
Datenschutz und Datensicherheit, 2007
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Datenschutz und Datensicherheit, 2007
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006
Proceedings of the Electronic Voting 2006: 2nd International Workshop, 2006
Proceedings of the Electronic Voting 2006: 2nd International Workshop, 2006
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Proceedings of the European Conference on eHealth 2006, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Proceedings of the Electronic Government, 2005
2004
Proceedings of the Electronic Voting in Europe, 2004