The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Melanie Volkamer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Melanie Volkamer, Robert Krimmer
    Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:340-347 [Conf]
  2. Robert Krimmer, Melanie Volkamer
    Bits or Paper? Comparing Remote Electronic Voting to Postal Voting. [Citation Graph (0, 0)][DBLP]
    EGOV (Workshops and Posters), 2005, pp:225-232 [Conf]
  3. Melanie Volkamer, Dieter Hutter
    From Legal Principles to an Internet Voting System. [Citation Graph (0, 0)][DBLP]
    Electronic Voting in Europe, 2004, pp:111-120 [Conf]
  4. Melanie Volkamer, Robert Krimmer
    Ver-/Misstrauen Schaffende Maßnahme beim e-Voting. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2006, pp:418-425 [Conf]
  5. Melanie Volkamer, Walter Reinhard, Roland Vogt
    FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:159-170 [Conf]
  6. Dieter Hutter, Melanie Volkamer
    Information Flow Control to Secure Dynamic Web Service Composition. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:196-210 [Conf]
  7. Melanie Volkamer, Robert Krimmer
    Die Online-Wahl auf dem Weg zum Durchbruch. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2006, v:29, n:2, pp:98-113 [Journal]

  8. Requirements and Evaluation Procedures for eVoting. [Citation Graph (, )][DBLP]


  9. A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. [Citation Graph (, )][DBLP]


  10. Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme. [Citation Graph (, )][DBLP]


  11. Towards the impact of the operational environment on the security of e-voting. [Citation Graph (, )][DBLP]


  12. Classifying Privacy and Verifiability Requirements for Electronic Voting. [Citation Graph (, )][DBLP]


  13. Elektronische Wahlen: Verifizierung vs. Zertifizierung. [Citation Graph (, )][DBLP]


  14. The Development of Remote E-Voting Around the World: A Review of Roads and Directions. [Citation Graph (, )][DBLP]


  15. Compliance of RIES to the Proposed e-Voting Protection Profile. [Citation Graph (, )][DBLP]


  16. Developing a Legal Framework for Remote Electronic Voting. [Citation Graph (, )][DBLP]


  17. Towards long-term free and secret electronic elections providing voter-verifiability in the bulletin board model. [Citation Graph (, )][DBLP]


  18. Information Flow Analysis Based Security Checking of Health Service Composition Plans. [Citation Graph (, )][DBLP]


  19. Security Requirements for Non-political Internet Voting. [Citation Graph (, )][DBLP]


  20. Multiple Casts in Online Voting: Analyzing Chances. [Citation Graph (, )][DBLP]


  21. Development of a Formal IT Security Model for Remote Electronic Voting Systems. [Citation Graph (, )][DBLP]


  22. Verifiability in Electronic Voting - Explanations for Non Security Experts. [Citation Graph (, )][DBLP]


  23. An Evaluation and Certification Approach to Enable Voting Service Providers. [Citation Graph (, )][DBLP]


  24. A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002