Stephan Neumann
According to our database1,
Stephan Neumann
authored at least 37 papers
between 2011 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the Sicherheit, 2022
2021
Towards a data-driven assistance system for operating segment erectors in tunnel boring machines.
Proceedings of the 14th International Symposium on Computational Intelligence and Design, 2021
2020
2018
Datenschutz und Datensicherheit, 2018
2017
IEEE Secur. Priv., 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Evaluation and improvement of internet voting schemes based on legally-founded security requirements.
PhD thesis, 2016
Datenschutz und Datensicherheit, 2016
Ann. des Télécommunications, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Datenschutz und Datensicherheit, 2015
2014
Datenschutz und Datensicherheit, 2014
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Helios Verification: To Alleviate, or to Nominate: Is That the Question, or Shall we Have Both?
Proceedings of the Electronic Government and the Information Systems Perspective, 2014
A Usable Android Application Implementing Distributed Cryptography for Election Authorities.
Proceedings of the Ninth International Conference on Availability, 2014
2013
Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Int. J. Inf. Secur. Priv., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Electronic Participation - 5th IFIP WG 8.5 International Conference, 2013
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Smart Cards in Electronic Voting: Lessons Learned from Applications in Legallybinding Elections and Approaches Proposed in Scientific Papers.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011