An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
[Journal Article]

Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
[Journal Article]

HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
[Journal Article]

"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern
Budurushi, Jurlind; Hilt, Annika; Volkamer, Melanie
Datenschutz und Datensicherheit - DuD, p.300-304
[Journal Article]

An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
IACR - Cryptology ePrint Archive
[Journal Article]

SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, Stephan; Volkamer, Melanie; Budurushi, Jurlind; Prandini, Marco
>Annals of Telecommunications, p.1-16
[Journal Article]

Spot the phish by checking the pruned URL
Volkamer, Melanie; Renaud, Karen; Gerber, Paul
Information and Computer Security, p.372-385
[Journal Article]

Efficient single-photon absorption by a trapped moving atom
Trautmann, Nils; Alber, Gernot; Leuchs, Gerd
Physical Review A
[Journal Article]

Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, Karen; Flowerday, Stephen; English, Rosanne; Volkamer, Melanie
>Information and Computer Security, p.400-415
[Journal Article]

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
Cryptology ePrint Archive, p.1-19
[Journal Article]

TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Schwabe, Peter
Cryptology ePrints Archive, p.1-24
[Journal Article]

A probabilistic kernel method for human mobility prediction with smartphones
Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel
Pervasive and Mobile Computing, p.13-28
[Journal Article]

Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
IACR Cryptology ePrint Archive, p.765
[Journal Article]

Universality in random quantum networks
Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physical Review A
[Journal Article]

IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
>Datenschutz und Datensicherheit DuD, p.383-387
[Journal Article]

High Performance Lattice-based CCA-secure Encryption
Bansarkhani, Rachid El; Buchmann, Johannes
Cryptology ePrint Archive, p.20
[Journal Article]

Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
[Journal Article]

Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
[Journal Article]

Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
[Journal Article]

Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
[Journal Article]

Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]

Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
[Journal Article]

Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
[Journal Article]

Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
[Journal Article]

Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
[Journal Article]

Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
[Journal Article]

Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Tao, Chengdong; Xiang, Hong; Petzoldt, Albrecht; Ding, Jintai
Finite Fields and Their Applications, p.352-368
[Journal Article]

DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
[Journal Article]