Index of

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]1_Memorable_And_Secure_-_How_Do_You_Choose_Your_PIN_final.pdf2018-05-02 08:57 285K 
[   ]2_Shoulder-surfing_resistente_Authentisierung_an_mobilen_Endgera__ten.pdf2018-05-02 08:57 16M 
[   ]3_Usability_und_Privacy_im_Android_Oekosystem.pdf2018-05-02 08:57 330K 
[   ]4_2_Poster_PasswordEnteringAndTransmissionSecurity_Poster.pdf2018-05-02 08:57 389K 
[   ]5_RechtlicheUndTechnischeNutzerunterstuetzungBeiDerButtonLoesung.pdf2018-05-02 08:57 423K 
[   ]6_SpotthePhishbyCheckingthePrunedURL.pdf2018-05-02 08:57 271K 
[   ]7_Understanding_information_security_compliance__Why_goal_setting_and_rewards_might_be_a_bad_idea.pdf2018-05-02 08:57 107K 
[   ]8_BewertungDerGMXMailvelope-Ende-zu-Ende-Verschluesselung.pdf2018-05-02 08:57 225K 
[   ]9_UsabilityVsPrivacyInsteadofUsablePrivacy.pdf2018-05-02 08:57 2.0M 
[   ]11_CapturingAttentionForWarnings_CameraReady.pdf2018-05-02 08:57 140K 
[   ]12_BuildingCastlesInQuicksand.pdf2018-05-02 08:57 66K 
[   ]13_TheUseofLinguisticsinCryptographyanditsApplicationtoImprovetheHBprotocol.pdf2018-05-02 08:57 182K 
[   ]14_UnterstuetzungFuerEinRisikobewusstesVerhaltenImInternet.pdf2018-05-02 08:57 9.7M 
[   ]15_ZertApps_Beitrag-BSI-Kongress_v2.pdf2018-05-02 08:57 868K 
[   ]16_AccessDescribingAndContrastingAuthenticationMechanisms_draft_anon.pdf2018-05-02 08:57 361K 
[   ]558-3.pdf2018-05-02 08:57 381K 
[   ]2014.07.16_PETS_paper.pdf2018-05-02 08:57 312K 
[   ]20130228_Folk_models_of_home_computer_security_final.pdf2018-05-02 08:57 71K 
[   ]ACCESS_CCS.pdf2018-05-02 08:57 353K 
[   ]ARES_2012.pdf2018-05-02 08:57 2.2M 
[   ]ARES_2013.pdf2018-05-02 08:57 669K 
[   ]ARES_2014.pdf2018-05-02 08:57 1.3M 
[   ]A_Socio-Technical_Investigation_into_Smartphone_Security.pdf2018-05-02 08:57 598K 
[   ]AdvancingTrustVisualisationsforWiderApplicabilityandUserAcceptance.pdf2018-05-02 08:57 871K 
[   ]AnEvaluationAndCertificationApproach.pdf2018-05-02 08:57 249K 
[   ]BasissatzVonSicherheitsanforderungen.pdf2018-05-02 08:58 545K 
[   ]BitsOrPaper.pdf2018-05-02 08:58 119K 
[   ]BoRoVo_ARES-2.pdf2018-05-02 08:58 125K 
[   ]Budurushi_EVOTE2014.pdf2018-05-02 08:58 2.7M 
[   ]Coercion-resistant_Proxy_Voting.pdf2018-05-02 08:58 355K 
[   ]CoercionResistantProxyVotingExtendedVersion.pdf2018-05-02 08:58 391K 
[   ]DevelopmentOfaFormalIT-SecurityModel.pdf2018-05-02 08:58 349K 
[   ]DieOnlineWahl-Durchbruch.pdf2018-05-02 08:58 415K 
[   ]EDEM2007_volkamer_krimmer_grimm_requirements_evaluation_techniques_for_online-voting_cameraready_final.pdf2018-05-02 08:58 88K 
[   ]EinPKI-ProtokollFuerSichereUndPraktikableOnlinewahlen.pdf2018-05-02 08:58 73K 
[   ]EmailSecurityCriteriaAnalysis_-_Final.pdf2018-05-02 08:58 64K 
[   ]EntwicklungEinesFormalenIT-Sicherheitsmodells.pdf2018-05-02 08:58 179K 
[   ]Extending_Helios_Towards_Private_Eligibility_Verifiability.pdf2018-05-02 08:58 300K 
[   ]FUSE-EinInternetwahlsystem.pdf2018-05-02 08:58 6.1M 
[   ]FeasibilityAnalysisofPretaVoterforGermanFederalElections.pdf2018-05-02 08:58 453K 
[   ]GI2014_BNSV.pdf2018-05-02 08:58 495K 
[   ]GI_Neumann_et_al.pdf2018-05-02 08:58 229K 
[   ]GI_Workshop_2014.pdf2018-05-02 08:58 1.1M 
[   ]Goals_Productivity_vs_Security.pdf2018-05-02 08:58 473K 
[   ]HAISA-WebPageVersion.pdf2018-05-02 08:58 115K 
[   ]HAISA_VolkamerEtAl2013_FinalVersion.pdf2018-05-02 08:58 141K 
[   ]HCII_2017.pdf2018-05-02 08:58 434K 
[   ]IRIS_2012.pdf2018-05-02 08:58 281K 
[   ]IRIS_2013.pdf2018-05-02 08:58 2.2M 
[   ]ImplementierbareZustandsuebergaenge.pdf2018-05-02 08:58 256K 
[   ]Implementingandevaluatingasoftware-independentvotingsystemforpollingstationelections.pdf2018-05-02 08:58 1.7M 
[   ]InformationFlowAnalysis.pdf2018-05-02 08:58 755K 
[   ]InformationFlowControl.pdf2018-05-02 08:58 478K 
[   ]IntroducingPrecautionaryBehaviorbyTemporalDiversionofVoterAttentionfromCastingtoVerifyingtheirVote.pdf2018-05-02 08:58 1.6M 
[   ]IntroducingProxyVotingToHelios.pdf2018-05-02 08:58 259K 
[   ]ItIsNotAboutTheDesign.pdf2018-05-02 08:58 177K 
[   ]MMR_HBV14.pdf2018-05-02 08:58 192K 
[   ]MPI_IT_Security_2012_kauer.pdf2018-05-02 08:58 557K 
[   ]MPI_IT_Security_2012_volkamer.pdf2018-05-02 08:58 1.2M 
[   ]MachbarkeitsanalysederscannergestuetztenStimmzettelanalysemittelsVividFormsundUniWahl4.pdf2018-05-02 08:58 481K 
[   ]Mayer_PortfolioKeyDerivation.pdf2018-05-02 08:58 550K 
[   ]Mayer_Volkamer_Kauer_AuthenticationSchemesComparisonAndEffectivePasswordSpaces_Final.pdf2018-05-02 08:58 1.0M 
[   ]MentalModels.pdf2018-05-02 08:58 342K 
[   ]MentalModelsofVerifiabilityinVoting.pdf2018-05-02 08:58 671K 
[   ]MotivatingVerifiability_Final.pdf2018-05-02 08:58 644K 
[   ]MuC_2016_PrivacyfriendlyCookie.pdf2018-05-02 08:58 461K 
[   ]Multiple_Casts_in_online_voting.pdf2018-05-02 08:58 284K 
[   ]NeumannDuD201511_db.pdf2018-05-02 08:58 18M 
[   ]NoPhish_IFIP_Sec.pdf2018-05-02 08:58 619K 
[   ]NoPhish_STM.pdf2018-05-02 08:58 476K 
[   ]NothingComesForFree.pdf2018-05-02 08:58 178K 
[   ]NzS_2016_-_NoPhish_-_Evaluation_of_a_web_application_that_teaches_people_being_aware_of_phishing_attacks.pdf2018-05-02 08:58 160K 
[   ]OEffentlichkeitsgrundsatzundStimmzettelbelege.pdf2018-05-02 08:58 414K 
[   ]ObservingThreatsToE-VotersAnonymity.pdf2018-05-02 08:58 151K 
[   ]On_the_security-_privacy_and_usability_of_online_seals._An_overview_.pdf2018-05-02 08:58 1.2M 
[   ]OnlineWahlenFuerGremien.pdf2018-05-02 08:58 117K 
[   ]OverviewOnlineWahlen.pdf2018-05-02 08:58 167K 
[   ]PaperAuditTrailsandVotersPrivacyConcerns_JurlindBudurushi.pdf2018-05-02 08:58 531K 
[   ]PartialVerifiabilityPOLYAS_FINAL.pdf2018-05-02 08:58 454K 
[   ]Password_card_ACSAC_Poster_Extended_Abstract.pdf2018-05-02 08:58 720K 
[   ]PositivebutSkeptical.pdf2018-05-02 08:58 831K 
[   ]Poster_On_the_Usability_of_Secure_GUIs.pdf2018-05-02 08:58 188K 
[   ]RecommendationsForUsabilityInEVoting-Updated09Nov2012.pdf2018-05-02 08:58 219K 
[   ]Renaud_Mayer_Volkamer_Maguire_GraphicalPassword_Security.pdf2018-05-02 08:58 122K 
[   ]RiLaHu_10.pdf2018-05-02 08:58 31K 
[   ]RiskKom_Gesamtkonzeptv2.pdf2018-05-02 08:58 356K 
[   ]SecurePlatformProblem_WithCopyright.pdf2018-05-02 08:58 339K 
[   ]SecurityProofsforParticipationPrivacyReceiptFreenessandBallotPrivacyfortheHeliosVotingScheme.pdf2018-05-02 08:58 689K 
[   ]SecurityRequirementsForNonPoliticalInternetVoting.pdf2018-05-02 08:58 120K 
[   ]TORPEDO-Final.pdf2018-05-02 08:58 4.2M 
[   ]TRUST2015.pdf2018-05-02 08:58 1.2M 
[   ]Tauglichkeit_von_Common_Criteria-Schutzprofilen_fuer_Internetwahlen_in_Deutschland_online.pdf2018-05-02 08:58 8.6M 
[   ]Teaching_Phishing-Security_Which_Way_is_Best.pdf2018-05-02 08:58 699K 
[   ]TheDevelopmentOfRemoteE-Voting.pdf2018-05-02 08:58 245K 
[   ]TowardsLong-TermFreeAndSeret.pdf2018-05-02 08:58 200K 
[   ]TowardsTheImpactOfTheOperationalEnvironment.pdf2018-05-02 08:58 156K 
[   ]TransparencyandTechnicalMeasurestoEstablishTrustinNorwegianInternetVoting.pdf2018-05-02 08:58 257K 
[   ]TrustModelsForRemoteElectronicVoting.pdf2018-05-02 08:58 66K 
[   ]UntersuchungdesSicherheitsbewusstseinsimKontextvonE-MailmadeinGermany_webseite.pdf2018-05-02 08:58 258K 
[   ]Uploaded_TechReport_AuthenticationMechanisms.pdf2018-05-02 08:58 103K 
[   ]UsabilityAnalysisOfHelios.pdf2018-05-02 08:58 1.5M 
[   ]UsabilityofNewHeliosInterfaces.pdf2018-05-02 08:58 589K 
[   ]UsableSecurityEvaluationofEasyVoteintheContextofComplexElections.pdf2018-05-02 08:58 16M 
[   ]Ver-Misstrauen.pdf2018-05-02 08:58 180K 
[   ]VerifiabilityInElectronicVoting.pdf2018-05-02 08:58 196K 
[   ]VerifiabilityPolyas.pdf2018-05-02 08:58 1.1M 
[   ]VerifizierbarkeitElektronischerWahlen.pdf2018-05-02 08:58 117K 
[   ]VoteCastinginanypreferredConstituency.pdf2018-05-02 08:58 397K 
[   ]VoteID_2013_Demo.pdf2018-05-02 08:58 414K 
[   ]WaehlenAufDistanz.pdf2018-05-02 08:58 48K 
[   ]WirksamkeitVonAntiPhish.pdf2018-05-02 08:58 323K 
[   ]ZeTA_author_version.pdf2018-05-02 08:58 601K 
[   ]Zertifizierte_Datensicherheit_fuer_Android-Anwendungen.pdf2018-05-02 08:58 345K 
[   ]aFormalIT-SscurityModel.pdf2018-05-02 08:57 288K 
[   ]ares13.pdf2018-05-02 08:57 283K 
[   ]automatic_password_change.pdf2018-05-02 08:57 204K 
[   ]bare_conf.pdf2018-05-02 08:58 7.9M 
[   ]ePart_2013_01.pdf2018-05-02 08:58 418K 
[   ]encouraging-privacy-aware-smartphones-app-installation-what-would-the-technically-adept-do.pdf2018-05-02 08:58 291K 
[   ]expert-knowledge-submitted.pdf2018-05-02 08:58 872K 
[   ]final.pdf2018-05-02 08:58 388K 
[   ]final___stast-phishing-warning_10.06.2013_online_01.pdf2018-05-02 08:58 3.1M 
[   ]main.pdf2018-05-02 08:58 121K 
[   ]mobile-security-precautions.pdf2018-05-02 08:58 1.5M 
[   ]neumann_IJISP_7_3_.pdf2018-05-02 08:58 1.1M 
[   ]neumann_chap_zissis_book2014.pdf2018-05-02 08:58 554K 
[   ]neumann_chapter_4_zissis_book.pdf2018-05-02 08:58 1.1M 
[   ]olembo_chap_saeed_book.pdf2018-05-02 08:58 382K 
[   ]paper_52_-_final.pdf2018-05-02 08:58 114K 
[   ]published_Version.pdf2018-05-02 08:58 85K 
[   ]reliable-factors.pdf2018-05-02 08:58 633K 
[   ]requirements_for_onlinevoting.pdf2018-05-02 08:58 329K 
[   ]riskkom-context-comm.pdf2018-05-02 08:58 307K 
[   ]secsac12-decision.pdf2018-05-02 08:58 192K 
[   ]soups13_posters-final23.pdf2018-05-02 08:58 106K 
[   ]trust-context-warnings-final-with-ack.pdf2018-05-02 08:58 814K