Wissenschaftliche Publikationen


Bis heute konnte ich mit meinen Koautoren zahlreiche wissenschaftliche Arbeiten publizieren. Im Folgenden findet sich eine nahezu vollständige Auflistung meiner Konferenzbeiträge, Zeitschriftenartikel, Buchkapitel, u.a. 

Autorenversionen der folgenden wissenschaftlichen Publikationen finden sich in meinem ResearchGate-Profil. Autorenversionen aller Publikationen können auf Anfrage jederzeit zur Verfügung gestellt werden.


2017

Election-Dependent Security Evaluation of Internet Voting Schemes

Stephan Neumann, Manuel Noll, Melanie Volkamer 

In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Vol. 502, p. 371-382, May 2017 

Springer 

 

Don't be Deceived: The Message Might be Fake

Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer 

In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), August 2017 

 

Enabling Vote Delegation in Boardroom Voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer 

In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, April 2017 

 

Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug

Silke Rehfeld, Melanie Volkamer, Stephan Neumann

In: Mittelstand 4.0 - Agentur Kommunikation, January 2017 

[Online-Edition: http://kommunikation-mittelstand.digital/fachartikel/sicherheit-in-der-kommunikation-kostenloses-massnahmen-angebot-fuer-kmu-gegen-internetbetrug/] 

 

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer 

In: IEEE Security & Privacy Special Issue on Electronic Voting, 2017 

[Online-Edition: https://www.computer.org/web/computingnow/spcfp3]

2016

Introducing Proxy Voting to Helios

Oksana Kulyk, Karola Marky, Stephan Neumann and Melanie Volkamer

In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, September 2016. 

 

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Meyer, Stephan Neumann and Melanie Volkamer

In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Juli 2016.

 

Coercion-resistant Proxy Voting

Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi and Melanie Volkamer

In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p. 3-16, Springer, Juni 2016. 

 

Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer

Juni 2016. 

 

SecIVo: a quantitative security evaluation framework for internet voting schemes

Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini

In: Annals of Telecommunications, p. 1--16, Juni 2016. 

http://link.springer.com/article/10.1007%2Fs12243-016-0520-0.

 

Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung

Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer

In: Datenschutz und Datensicherheit, vol. 5/2016, p. 295-299, Mai 2016. 

 

Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements

Stephan Neumann

2016. 

2015

Certification of ICTs in Elections

Peter Wolf, Jordi Barrat, Eden Bolo, Alejandro Bravo, Robert Krimmer, Stephan Neumann, Al A. Parreño, Carsten Schürmann, Melanie Volkamer

In: International Institute for Democracy and Electoral Assistance, Dezember 2015. 

http://www.idea.int/es/publications/certification-of-icts-in-elections/loader.cfm?csModule=security/getfile&pageID=74636.

 

Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem

Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle

In: Datenschutz und Datensicherheit, vol. 11/2015, p. 747-752, Oktober 2015.

 

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen

In: Availability, Reliability and Security (ARES), 2015 10th International Conference on, p. 224-229, IEEE, August 2015. 

 

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting

Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen

Cryptology ePrint Archive, Report 2015/558, Juni 2015. 

http://eprint.iacr.org/2015/558.

2014

Pretty Understandable Democracy 2.0

Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach

In: 6th International Conference on Electronic Voting (EVOTE), p. 69 - 72, TUT Press, Oktober 2014.

 

Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design

Oksana Kulyk, Stephan Neumann, Christian Feier, Melanie Volkamer and Thorben Köster

In: 6th International Conference on Electronic Voting (EVOTE), p. 1-10, IEEE, Oktober 2014. ISBN 978-3-200-03697-0. 

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7001142.

 

Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?

Stephan Neumann, Maina M. Olembo, Karen Renaud and Melanie Volkamer

In: Andrea Kö and Enrico Francesconi: Lecture Notes in Computer Science, 3rd International Conference on Electronic Government and the Information Systems Perspective, vol. 8650, p. 246-260, Springer, September 2014. ISBN 978-3-319-10177-4. ISSN 0302-9743. 

 

Coercion-Resistant Internet Voting in Practice

Christian Feier, Stephan Neumann and Melanie Volkamer

In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1401-1414, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8. ISSN 1617-5468. 

http://informatik2014.de/workshops14.html.

 

Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail

Jurlind Budurushi, Stephan Neumann, Genc Shala and Melanie Volkamer

In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1415-1426, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8. ISSN 1617-5468. 

http://informatik2014.de/workshops14.html.

 

Pretty Understandable Democracy 2.0

Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach

Cryptology ePrint Archive: Report 2014/625, August 2014. 

http://eprint.iacr.org/2014/625.pdf.

 

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting

Stephan Neumann, Jurlind Budurushi, Melanie Volkamer

In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 2, p. 27-61, IGI Global, 2014. 

 

Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland

Johannes Buchmann, Stephan Neumann, Melanie Volkamer 

In: Datenschutz und Datensicherheit, Datenschutz und Datensicherheit - DuD, vol. 38, no. 2, p. 98-102, Springer Gabler Verlag, 2014. 

 

A Usable Android Application Implementing Distributed Cryptography For Election Authorities

Stephan Neumann, Oksana Kulyk, Melanie Volkamer

In: 9th International Workshop on Frontiers in Availability, Reliability and Security, p. 198-207, IEEE, 2014. 

 

A Holistic Framework for the Evaluation of Internet Voting Systems

Stephan Neumann, Melanie Volkamer

In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 4, p. 76-91, IGI Global, 2014. 

2013

Modeling the German Legal Latitude Principles

Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer

In: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh: Lecture Notes in Computer Science, 5th International Conference on eParticipation (ePart 2013) , vol. 8075, p. 49-56, Springer, September 2013. 

http://link.springer.com/chapter/10.1007%2F978-3-642-40346-0_5.

 

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme

Jurlind Budurushi, Stephan Neumann, Maina Olembo, Melanie Volkamer

In: Günther Pernul, Ravi Sandhu: 8th International Conference on Availability, Reliability and Security (AReS 2013), p. 198-207, IEEE, Juli 2013. 

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6657241&tag=1.

 

Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs

David Bernhard, Stephan Neumann and Melanie Volkamer

In: Steve Schneider, James Heather, Vanessa Teague: Lecture Notes in Computer Science, 4th International Conference on e-Voting and Identity (VoteID13), vol. 7985, p. 176 - 192, Springer, Juli 2013. 

http://link.springer.com/chapter/10.1007%2F978-3-642-39185-9_11.

 

Towards A Practical JCJ / Civitas Implementation

Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig

In: In: Cryptology ePrint Archive: Report 2013/464, 2013. , Juli 2013. 

http://eprint.iacr.org/2013/464.

 

Towards a Practical Mobile Application for Election Authorities (Demo)

Stephan Neumann, Oksana Kulyk, Lulzim Murati, Melanie Volkamer

In: 4th International Conference on e-Voting and Identity (VoteID13), Juli 2013. 

 

Towards A Practical JCJ / Civitas Implementation

Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig

In: Matthias Horbach: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p. 804-818, Juli 2013. 

http://www.uni-koblenz-landau.de/koblenz/fb4/institute/iwvi/aggrimm/events_folder/gitag43.

 

Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme 

Stephan Neumann, Anna Kahlert, Maria Henning, Hugo Jonker, Melanie Volkamer

In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), p. 277-284, Februar 2013. 

 

Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA

Alexander Roßnagel, Philipp Richter and Anna Kahlert, Melanie Volkamer, Stephan Neumann, Rüdiger Grimm and Daniela Simić-Draws

In: 7, International Journal of Information Security and Privacy (IJISP), vol. 7, no. 3, p. 16-35, 2013. 

http://www.igi-global.com/journal/international-journal-information-security-privacy/1096.

2012

Civitas and the Real World: Problems and Solutions from a Practical Point of View

Stephan Neumann, Melanie Volkamer

In: IEEE Computer Society: 7th International Conference on Availability, Reliability and Security (ARES), p. 180-185, August 2012. ISBN 978-1-4673-2244-7. 

 

Partial Verifiability in POLYAS for the GI Elections

Maina M. Olembo, Anna Kahlert, Stephan Neumann and Melanie Volkamer

In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm : LNI - Lecture Notes in Informatics, 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 95-109, Gesellschaft für Informatik, Juli 2012. ISBN 978-3-88579-299-4. ISSN 1617-5468. 

 

Smart Cards in Electronic Voting - Lessons learned from applications in legally binding elections and approaches proposed in scientific papers

Jurlind Budurushi, Stephan Neumann, and Melanie Volkamer

In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm: LNI - Series of the Gesellschaft für Informatik (GI) , 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 257-270, Gesellschaft für Informatik, Juli 2012. ISBN 978-3-88579-299-4. ISSN 1617-5468. 

 

Formal Treatment of Distributed Trust in Electronic Voting

Stephan Neumann and Melanie Volkamer

In: ThinkMind, The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), vol. ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, p. 30-39, Mai 2012. ISBN 978-1-61208-201-1. 

http://www.thinkmind.org/index.php?view=article&articleid=icimp_2012_2_10_30029.

2011

Robust Electronic Voting: Introducing robustness in Civitas

Fatemeh Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer

In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011 , p. 47 -55, August 2011. 

ed.fbk.eu/revote/.