Publikationen
Bis heute konnte ich mit meinen Koautoren zahlreiche wissenschaftliche Arbeiten publizieren. Autorenversionen der meisten Publikationen finden sich in meinem ResearchGate-Profil oder können auf Anfrage zur Verfügung gestellt werden.
Publikationen 2020
Human Factors in Coercion Resistant Internet Voting – A Review of Existing Solutions and Open Challenges
Oksana Kulyk, Stephan Neumann
In: Fifth International Joint Conference on Electronic Voting (E-Vote-ID 2020)
SARS-CoV-2, a Threat to Privacy?
Tim Daubenschuetz, Oksana Kulyk, Stephan Neumann, Isabella Hinterleitner, Paula Ramos Delgado, Carmen Hoffmann, Florian Scheible
In: arXiv preprint arXiv:2004.10305, April 2020. https://arxiv.org/abs/2004.10305
Publikationen 2018
Blockchain - Chancen und Herausforderungen für die Finanzbranche
Stephan Neumann
In: DigiPraktiker (Finanz Colloquium Heidelberg), vol. 6/2018, p. 74-79, Juni 2018.
Effektiver Schutz vor betrügerischen Nachrichten: Ein Schulungsprogramm zur Erkennung betrügerischer Nachrichten für KMU
Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer, Christian Schwartz, Alexandra Kunz
In: Datenschutz und Datensicherheit, vol. 5/2018, p. 301-306, Mai 2018.
Publikationen 2017
Election-Dependent Security Evaluation of Internet Voting Schemes
Stephan Neumann, Manuel Noll, Melanie Volkamer
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Vol. 502, p. 371-382, May 2017
Don't be Deceived: The Message Might be Fake
Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer
In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), August 2017
Enabling Vote Delegation in Boardroom Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, April 2017
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Silke Rehfeld, Melanie Volkamer, Stephan Neumann
In: Mittelstand 4.0 - Agentur Kommunikation, January 2017
[Online-Edition: http://kommunikation-mittelstand.digital/fachartikel/sicherheit-in-der-kommunikation-kostenloses-massnahmen-angebot-fuer-kmu-gegen-internetbetrug/]
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer
In: IEEE Security & Privacy Special Issue on Electronic Voting, 2017
[Online-Edition: https://www.computer.org/web/computingnow/spcfp3]
Publikationen 2016
Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann and Melanie Volkamer
In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, September 2016.
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Peter Meyer, Stephan Neumann and Melanie Volkamer
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Juli 2016.
Coercion-resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi and Melanie Volkamer
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p. 3-16, Springer, Juni 2016.
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
Juni 2016.
SecIVo: a quantitative security evaluation framework for internet voting schemes
Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini
In: Annals of Telecommunications, p. 1--16, Juni 2016.
http://link.springer.com/article/10.1007%2Fs12243-016-0520-0.
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer
In: Datenschutz und Datensicherheit, vol. 5/2016, p. 295-299, Mai 2016.
Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements
Stephan Neumann
PhD Thesis, 2016.
Publikationen 2015
Certification of ICTs in Elections
Peter Wolf, Jordi Barrat, Eden Bolo, Alejandro Bravo, Robert Krimmer, Stephan Neumann, Al A. Parreño, Carsten Schürmann, Melanie Volkamer
In: International Institute for Democracy and Electoral Assistance, Dezember 2015. http://www.idea.int/es/publications/certification-of-icts-in-elections/loader.cfm?csModule=security/getfile&pageID=74636.
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle
In: Datenschutz und Datensicherheit, vol. 11/2015, p. 747-752, Oktober 2015.
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
In: Availability, Reliability and Security (ARES), 2015 10th International Conference on, p. 224-229, IEEE, August 2015.
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
Cryptology ePrint Archive, Report 2015/558, Juni 2015. http://eprint.iacr.org/2015/558.
Publikationen 2014
Pretty Understandable Democracy 2.0
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
In: 6th International Conference on Electronic Voting (EVOTE), p. 69 - 72, TUT Press, Oktober 2014.
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Oksana Kulyk, Stephan Neumann, Christian Feier, Melanie Volkamer and Thorben Köster
In: 6th International Conference on Electronic Voting (EVOTE), p. 1-10, IEEE, Oktober 2014. ISBN 978-3-200-03697-0. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7001142.
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Stephan Neumann, Maina M. Olembo, Karen Renaud and Melanie Volkamer
In: Andrea Kö and Enrico Francesconi: Lecture Notes in Computer Science, 3rd International Conference on Electronic Government and the Information Systems Perspective, vol. 8650, p. 246-260, Springer, September 2014. ISBN 978-3-319-10177-4. ISSN 0302-9743.
Coercion-Resistant Internet Voting in Practice
Christian Feier, Stephan Neumann and Melanie Volkamer
In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1401-1414, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8. ISSN 1617-5468. http://informatik2014.de/workshops14.html.
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Jurlind Budurushi, Stephan Neumann, Genc Shala and Melanie Volkamer
In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1415-1426, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8. ISSN 1617-5468. http://informatik2014.de/workshops14.html.
Pretty Understandable Democracy 2.0
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach
Cryptology ePrint Archive: Report 2014/625, August 2014. http://eprint.iacr.org/2014/625.pdf.
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Stephan Neumann, Jurlind Budurushi, Melanie Volkamer
In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 2, p. 27-61, IGI Global, 2014.
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland
Johannes Buchmann, Stephan Neumann, Melanie Volkamer
In: Datenschutz und Datensicherheit, Datenschutz und Datensicherheit - DuD, vol. 38, no. 2, p. 98-102, Springer Gabler Verlag, 2014.
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Stephan Neumann, Oksana Kulyk, Melanie Volkamer
In: 9th International Workshop on Frontiers in Availability, Reliability and Security, p. 198-207, IEEE, 2014.
A Holistic Framework for the Evaluation of Internet Voting Systems
Stephan Neumann, Melanie Volkamer
In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 4, p. 76-91, IGI Global, 2014.
Publikationen 2013
Modeling the German Legal Latitude Principles
Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer
In: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh: Lecture Notes in Computer Science, 5th International Conference on eParticipation (ePart 2013) , vol. 8075, p. 49-56, Springer, September 2013. http://link.springer.com/chapter/10.1007%2F978-3-642-40346-0_5.
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme
Jurlind Budurushi, Stephan Neumann, Maina Olembo, Melanie Volkamer
In: Günther Pernul, Ravi Sandhu: 8th International Conference on Availability, Reliability and Security (AReS 2013), p. 198-207, IEEE, Juli 2013. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6657241&tag=1.
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
David Bernhard, Stephan Neumann and Melanie Volkamer
In: Steve Schneider, James Heather, Vanessa Teague: Lecture Notes in Computer Science, 4th International Conference on e-Voting and Identity (VoteID13), vol. 7985, p. 176 - 192, Springer, Juli 2013. http://link.springer.com/chapter/10.1007%2F978-3-642-39185-9_11.
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
In: In: Cryptology ePrint Archive: Report 2013/464, 2013. , Juli 2013. http://eprint.iacr.org/2013/464.
Towards a Practical Mobile Application for Election Authorities (Demo)
Stephan Neumann, Oksana Kulyk, Lulzim Murati, Melanie Volkamer
In: 4th International Conference on e-Voting and Identity (VoteID13), Juli 2013.
Towards A Practical JCJ / Civitas Implementation
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig
In: Matthias Horbach: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p. 804-818, Juli 2013. http://www.uni-koblenz-landau.de/koblenz/fb4/institute/iwvi/aggrimm/events_folder/gitag43.
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Stephan Neumann, Anna Kahlert, Maria Henning, Hugo Jonker, Melanie Volkamer
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), p. 277-284, Februar 2013.
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Alexander Roßnagel, Philipp Richter and Anna Kahlert, Melanie Volkamer, Stephan Neumann, Rüdiger Grimm and Daniela Simić-Draws
In: 7, International Journal of Information Security and Privacy (IJISP), vol. 7, no. 3, p. 16-35, 2013.
http://www.igi-global.com/journal/international-journal-information-security-privacy/1096.
Publikationen 2012
Civitas and the Real World: Problems and Solutions from a Practical Point of View
Stephan Neumann, Melanie Volkamer
In: IEEE Computer Society: 7th International Conference on Availability, Reliability and Security (ARES), p. 180-185, August 2012. ISBN 978-1-4673-2244-7.
Partial Verifiability in POLYAS for the GI Elections
Maina M. Olembo, Anna Kahlert, Stephan Neumann and Melanie Volkamer
In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm : LNI - Lecture Notes in Informatics, 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 95-109, Gesellschaft für Informatik, Juli 2012. ISBN 978-3-88579-299-4. ISSN 1617-5468.
Smart Cards in Electronic Voting - Lessons learned from applications in legally binding elections and approaches proposed in scientific papers
Jurlind Budurushi, Stephan Neumann, and Melanie Volkamer
In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm: LNI - Series of the Gesellschaft für Informatik (GI) , 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 257-270, Gesellschaft für Informatik, Juli 2012. ISBN 978-3-88579-299-4. ISSN 1617-5468.
Formal Treatment of Distributed Trust in Electronic Voting
Stephan Neumann and Melanie Volkamer
In: ThinkMind, The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), vol. ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, p. 30-39, Mai 2012. ISBN 978-1-61208-201-1. http://www.thinkmind.org/index.php?view=article&articleid=icimp_2012_2_10_30029.
Publikationen 2011
Robust Electronic Voting: Introducing robustness in Civitas
Fatemeh Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer
In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011 , p. 47 -55, August 2011. ed.fbk.eu/revote/.