Proof of Concept
- M. Volkamer
- Mathematics
- 2009
The GI/BSI/DFKI Protection Profile constitutes after the implementation of the identified improvements as the proposed evaluation methodology for remote electronic voting systems and can now be applied to available systems.
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
- N. Gerber, Paul Gerber, M. Volkamer
- Computer ScienceComputers & security
- 1 August 2018
Why Doesn't Jane Protect Her Privacy?
- K. Renaud, M. Volkamer, Arne Renkema-Padmos
- Computer ScienceInternational Symposium on Privacy Enhancing…
- 16 July 2014
This investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture that suggest that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users.
Civitas and the Real World: Problems and Solutions from a Practical Point of View
- Stephan Neumann, M. Volkamer
- Computer ScienceSeventh International Conference on Availability…
- 20 August 2012
This paper identifies the strongtrust assumptions and usability weaknesses of the Civitas voting scheme, which currently prevent its usage in real-world elections, and shows how most of these strong trust assumptions can be implemented, e.g., by using eID cards in order to overcome Civitas' most critical usability problem, namely credential handling.
NoPhish App Evaluation: Lab and Retention Study
- Gamze Canova, M. Volkamer, C. Bergmann, B. Reinheimer
- Computer Science
- 1 February 2015
An Android app, a game called NoPhish, which educates the user in the detection of phishing URLs and helps users make better decisions with regard to the legitimacy of URLs immediately after playing as well as after some time has passed.
NoPhish: An Anti-Phishing Education App
- Gamze Canova, M. Volkamer, C. Bergmann, Roland Borza
- Computer ScienceInternational Workshop on Security and Trust…
- 10 September 2014
NoPhish is a game based smartphone app to educate people in accessing, parsing and checking URLs; i.e. enabling them to distinguish trustworthy and non-trustworthy websites.
Teaching Phishing-Security: Which Way is Best?
- Simon Stockhardt, B. Reinheimer, Daniel Lehmann
- Computer ScienceIFIP International Information Security…
- 30 May 2016
This work compares all three formats in the security context, or to be more precise in the context of anti-phishing training, and concludes that instructor-based, computer-based and text-based training are of utmost importance.
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
- M. Volkamer, K. Renaud, B. Reinheimer, Alexandra Kunz
- Computer ScienceComputers & security
- 1 November 2017
The Development of Remote E-Voting Around the World: A Review of Roads and Directions
- R. Krimmer, Stefan Triessnig, M. Volkamer
- Computer ScienceVOTE-ID
- 4 October 2007
WhileRemote e-voting has arrived on the regional level and in organizations for binding elections, on the national level it is a very rare phenomenon and paper based elections are here to stay; most binding elections used remote e-Voting in addition to the paper channel.
Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities
- M. Volkamer
- Computer ScienceLecture Notes in Business Information Processing
- 8 July 2009
Volkamer's book is of interest not only to developers of security-critical systems, but also to lawyers, security officers, and politicians involved in the introduction or certification of electronic voting systems.
...
...