Oksana Kulyk

Orcid: 0000-0003-4218-1658

According to our database1, Oksana Kulyk authored at least 47 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cookie disclaimers: Dark patterns and lack of transparency.
Comput. Secur., January, 2024

How to increase transparency and trust in internet voting systems: An experimental study.
Proceedings of the 13th Nordic Conference on Human-Computer Interaction, 2024

Voting beyond borders: A Pilot Study Investigating Preferences and Trade-offs in remote Voting among the Albanian electorate.
Proceedings of Ongoing Research, 2024

2023
People want reassurance when making privacy-related decisions - Not technicalities.
J. Syst. Softw., June, 2023

Understanding issues related to personal data and data protection in open source projects on GitHub.
CoRR, 2023

Towards a Basic Security Framework for SMEs - Results From an Investigation of Cybersecurity Challenges in Denmark.
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

Investigating Transparency Dimensions for Internet Voting.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

Influence of URL Formatting on Users' Phishing URL Detection.
Proceedings of the 2023 European Symposium on Usable Security, 2023

2022
#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;: Understanding Privacy Concerns, Trust and Adoption in Mobile COVID-19 Tracing Across Four Countries.
Proc. ACM Hum. Comput. Interact., 2022

Increasing security without decreasing usability: A comparison of various verifiable voting systems.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Recent Developments in the Context of Online Elections and Digital Polls in Germany.
Proceedings of the Sicherheit, 2022

German Voters' Attitudes Towards Voting Online with a Verifiable System.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Individual Verifiability with Return Codes: Manipulation Detection Efficacy.
Proceedings of the Electronic Voting - 7th International Joint Conference, 2022

How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

Cookie Disclaimers: Impact of Design and Users' Attitude.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Voter Perceptions of Trust in Risk-Limiting Audits.
CoRR, 2021

A Mixed-method Study on Security and Privacy Practices in Danish Companies.
CoRR, 2021

"I need to know I'm safe and protected and will check": Users Want Cues to Signal Data Custodians' Trustworthiness.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

2020
Has the GDPR hype affected users' reaction to cookie disclaimers?
J. Cybersecur., 2020

"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark.
CoRR, 2020

SARS-CoV-2, a Threat to Privacy?
CoRR, 2020

Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems.
Proceedings of the NordiCHI '20: Shaping Experiences, 2020

Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Proceedings of the Financial Cryptography and Data Security, 2020

Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen.
Datenschutz und Datensicherheit, 2019

Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability.
IACR Cryptol. ePrint Arch., 2018

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Proceedings of the Sicherheit 2018, 2018

What Did I Really Vote For?
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Extending the Helios internet voting scheme towards new election settings.
PhD thesis, 2017

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
IEEE Secur. Priv., 2017

Coercion-resistant proxy voting.
Comput. Secur., 2017

Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017

Enabling Vote Delegation for Boardroom Voting.
Proceedings of the Financial Cryptography and Data Security, 2017

Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Security Proofs for Participation Privacy and Stronger Veri ability for Helios.
IACR Cryptol. ePrint Arch., 2016

Efficiency Comparison of Various Approaches in E-Voting Protocols.
Proceedings of the Financial Cryptography and Data Security, 2016

Introducing Proxy Voting to Helios.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
IACR Cryptol. ePrint Arch., 2015

Extending Helios Towards Private Eligibility Verifiability.
Proceedings of the E-Voting and Identity - 5th International Conference, 2015

A Socio-Technical Investigation into Smartphone Security.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

2014
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014

A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Proceedings of the Ninth International Conference on Availability, 2014


  Loading...