Melanie Volkamer
Melanie Volkamer
Dirección de correo verificada de - Página principal
Citado por
Citado por
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
N Gerber, P Gerber, M Volkamer
Computers & security 77, 226-261, 2018
Why doesn’t Jane protect her privacy?
K Renaud, M Volkamer, A Renkema-Padmos
Privacy Enhancing Technologies: 14th International Symposium, PETS 2014 …, 2014
The development of remote e-voting around the world: A review of roads and directions
R Krimmer, S Triessnig, M Volkamer
International Conference on E-Voting and Identity, 1-15, 2007
User experiences of torpedo: Tooltip-powered phishing email detection
M Volkamer, K Renaud, B Reinheimer, A Kunz
Computers & Security 71, 100-113, 2017
An investigation of phishing awareness and education over time: When and how to best remind users
B Reinheimer, L Aldag, P Mayer, M Mossano, R Duezguen, B Lofthouse, ...
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 259-284, 2020
Evaluation of electronic voting: requirements and evaluation procedures to support responsible election authorities
M Volkamer
Springer, 2009
this website uses cookies”: Users’ perceptions and reactions to the cookie disclaimer
O Kulyk, A Hilt, N Gerber, M Volkamer
European Workshop on Usable Security (EuroUSEC) 4, 2018
Usability analysis of Helios—an open source verifiable remote electronic voting system
F Karayumak, MM Olembo, M Kauer, M Volkamer
2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections …, 2011
Mental models–general introduction and review of their application to human-centred security
M Volkamer, K Renaud
Number theory and cryptography: Papers in honor of johannes buchmann on the …, 2013
Teaching phishing-security: which way is best?
S Stockhardt, B Reinheimer, M Volkamer, P Mayer, A Kunz, P Rack, ...
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
NoPhish: an anti-phishing education app
G Canova, M Volkamer, C Bergmann, R Borza
Security and Trust Management: 10th International Workshop, STM 2014 …, 2014
GHOST-Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control.
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Euro-CYBERSEC, 68-78, 2018
Investigating people’s privacy risk perception
N Gerber, B Reinheimer, M Volkamer
Proceedings on Privacy Enhancing Technologies, 2019
NoPhish app evaluation: lab and retention study
G Canova, M Volkamer, C Bergmann, B Reinheimer
NDSS workshop on usable security, 2015
Extending helios towards private eligibility verifiability
O Kulyk, V Teague, M Volkamer
E-Voting and Identity: 5th International Conference, VoteID 2015, Bern …, 2015
Exploring consumers’ attitudes of smart TV related privacy risks
M Ghiglieri, M Volkamer, K Renaud
Human Aspects of Information Security, Privacy and Trust: 5th International …, 2017
User study of the improved Helios voting system interfaces
F Karayumak, M Kauer, MM Olembo, T Volk, M Volkamer
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
A formal approach towards measuring trust in distributed systems
G Schryen, M Volkamer, S Ries, SM Habib
Proceedings of the 2011 ACM symposium on applied computing, 1739-1745, 2011
Information flow control to secure dynamic web service composition
D Hutter, M Volkamer
International Conference on Security in Pervasive Computing, 196-210, 2006
Civitas and the real world: problems and solutions from a practical point of view
S Neumann, M Volkamer
2012 Seventh International Conference on Availability, Reliability and …, 2012
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20