default search action
Oksana Kulyk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Benjamin Maximilian Berens, Mark Bohlender, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer:
Cookie disclaimers: Dark patterns and lack of transparency. Comput. Secur. 136: 103507 (2024) - [c33]Jurlind Budurushi, Montathar Faraon, Samuel Agbesi, Asmita Dalela, Samuel Agbesi, Asmita Dalela, Oksana Kulyk:
Voting beyond borders: A Pilot Study Investigating Preferences and Trade-offs in remote Voting among the Albanian electorate. EGOV-CeDEM-ePart-* 2024 - [c32]Samuel Agbesi, Jurlind Budurushi, Asmita Dalela, Christina Nissen, Oksana Kulyk:
How to increase transparency and trust in internet voting systems: An experimental study. NordiCHI 2024: 29:1-29:18 - [e5]Aleksander Essex, Shin'ichiro Matsuo, Oksana Kulyk, Lewis Gudgeon, Ariah Klages-Mundt, Daniel Perez, Sam Werner, Andrea Bracciali, Geoff Goodell:
Financial Cryptography and Data Security. FC 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Brač, Croatia, May 5, 2023, Revised Selected Papers. Lecture Notes in Computer Science 13953, Springer 2024, ISBN 978-3-031-48805-4 [contents] - 2023
- [j6]Oksana Kulyk, Karen Renaud, Stefan Costica:
People want reassurance when making privacy-related decisions - Not technicalities. J. Syst. Softw. 200: 111620 (2023) - [c31]Mattia Mossano, Oksana Kulyk, Benjamin Maximilian Berens, Elena Marie Häußler, Melanie Volkamer:
Influence of URL Formatting on Users' Phishing URL Detection. EuroUSEC 2023: 318-333 - [c30]Samuel Agbesi, Jurlind Budurushi, Asmita Dalela, Oksana Kulyk:
Investigating Transparency Dimensions for Internet Voting. E-Vote-ID 2023: 1-17 - [c29]Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja:
Towards a Basic Security Framework for SMEs - Results From an Investigation of Cybersecurity Challenges in Denmark. REW 2023: 230-233 - [e4]Melanie Volkamer, David Duenas-Cid, Peter B. Rønne, Peter Y. A. Ryan, Jurlind Budurushi, Oksana Kulyk, Adrià Rodríguez-Pérez, Iuliia Spycher-Krivonosova:
Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14230, Springer 2023, ISBN 978-3-031-43755-7 [contents] - [i8]Anne Hennig, Lukas Schulte, Steffen Herbold, Oksana Kulyk, Peter Mayer:
Understanding issues related to personal data and data protection in open source projects on GitHub. CoRR abs/2304.06367 (2023) - 2022
- [j5]Oksana Kulyk, Lauren Britton-Steele, Elda Paja, Melanie Duckert, Louise Barkhuus:
#34;You have been in Close Contact with a Person Infected with COVID-19 and you may have been Infected#34;: Understanding Privacy Concerns, Trust and Adoption in Mobile COVID-19 Tracing Across Four Countries. Proc. ACM Hum. Comput. Interact. 6(MHCI): 1-27 (2022) - [c28]Benjamin Maximilian Berens, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer:
Cookie Disclaimers: Impact of Design and Users' Attitude. ARES 2022: 12:1-12:20 - [c27]Louise Halvorsen, Siv L. Steffensen, Willard Rafnsson, Oksana Kulyk, Raúl Pardo:
How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming. IWSPA@CODASPY 2022: 55-65 - [c26]Paul Tim Thürwächter, Melanie Volkamer, Oksana Kulyk:
Individual Verifiability with Return Codes: Manipulation Detection Efficacy. E-Vote-ID 2022: 139-156 - [c25]Oksana Kulyk, Melanie Volkamer, Niklas Fuhrberg, Benjamin Berens, Robert Krimmer:
German Voters' Attitudes Towards Voting Online with a Verifiable System. Financial Cryptography Workshops 2022: 335-350 - [c24]Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer:
Recent Developments in the Context of Online Elections and Digital Polls in Germany. Sicherheit 2022: 213-217 - [c23]Melanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg:
Increasing security without decreasing usability: A comparison of various verifiable voting systems. SOUPS @ USENIX Security Symposium 2022: 233-252 - 2021
- [c22]Chiara Krisam, Heike Dietmann, Melanie Volkamer, Oksana Kulyk:
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites. EuroUSEC 2021: 1-8 - [c21]Oksana Kulyk, Karen Renaud:
"I need to know I'm safe and protected and will check": Users Want Cues to Signal Data Custodians' Trustworthiness. ASE Workshops 2021: 171-178 - [e3]Martin Gilje Jaatun, Geir M. Køien, Oksana Kulyk:
EICC '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021. ACM 2021, ISBN 978-1-4503-9049-1 [contents] - [e2]Robert Krimmer, Melanie Volkamer, David Duenas-Cid, Oksana Kulyk, Peter B. Rønne, Mihkel Solvak, Micha Germann:
Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5-8, 2021, Proceedings. Lecture Notes in Computer Science 12900, Springer 2021, ISBN 978-3-030-86941-0 [contents] - [i7]Asmita Dalela, Saverio Giallorenzo, Oksana Kulyk, Jacopo Mauro, Elda Paja:
A Mixed-method Study on Security and Privacy Practices in Danish Companies. CoRR abs/2104.04030 (2021) - [i6]Asmita Dalela, Oksana Kulyk, Carsten Schürmann:
Voter Perceptions of Trust in Risk-Limiting Audits. CoRR abs/2109.07918 (2021) - 2020
- [j4]Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer:
Has the GDPR hype affected users' reaction to cookie disclaimers? J. Cybersecur. 6(1) (2020) - [c20]Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. Financial Cryptography Workshops 2020: 84-101 - [c19]Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. Financial Cryptography Workshops 2020: 291-309 - [c18]Oksana Kulyk, Kristina Milanovic, Jeremy Pitt:
Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems. NordiCHI 2020: 29:1-29:12 - [e1]Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Küsters, Oksana Kulyk, David Duenas-Cid, Mikhel Solvak:
Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings. Lecture Notes in Computer Science 12455, Springer 2020, ISBN 978-3-030-60346-5 [contents] - [i5]Tim Daubenschuetz, Oksana Kulyk, Stephan Neumann, Isabella Hinterleitner, Paula Ramos Delgado, Carmen Hoffmann, Florian Scheible:
SARS-CoV-2, a Threat to Privacy? CoRR abs/2004.10305 (2020) - [i4]Camilla Nadja Fleron, Jonas Kofod Jørgensen, Oksana Kulyk, Elda Paja:
"It's Not Something We Have Talked to Our Team About": Results From a Preliminary Investigation of Cybersecurity Challenges in Denmark. CoRR abs/2007.05259 (2020)
2010 – 2019
- 2019
- [j3]Oksana Kulyk, Nina Gerber, Melanie Volkamer, Annika Hilt:
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen. Datenschutz und Datensicherheit 43(2): 81-85 (2019) - [c17]Oksana Kulyk, Melanie Volkamer:
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness. HICSS 2019: 1-10 - [c16]Oksana Kulyk, Jan Henzel, Karen Renaud, Melanie Volkamer:
Comparing "Challenge-Based" and "Code-Based" Internet Voting Verification Implementations. INTERACT (1) 2019: 519-538 - 2018
- [c15]Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer:
What Did I Really Vote For? CHI 2018: 176 - [c14]Karola Marky, Oksana Kulyk, Melanie Volkamer:
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting. Sicherheit 2018: 197-208 - [c13]Oksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer:
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface. TrustCom/BigDataSE 2018: 1058-1063 - [i3]Oksana Kulyk, Melanie Volkamer:
Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability. IACR Cryptol. ePrint Arch. 2018: 683 (2018) - 2017
- [b1]Oksana Kulyk:
Extending the Helios internet voting scheme towards new election settings. Darmstadt University of Technology, Germany, 2017, pp. 1-143 - [j2]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer:
Coercion-resistant proxy voting. Comput. Secur. 71: 88-99 (2017) - [j1]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer:
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? IEEE Secur. Priv. 15(3): 24-29 (2017) - [c12]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. ARES 2017: 1:1-1:10 - [c11]Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer:
Enabling Vote Delegation for Boardroom Voting. Financial Cryptography Workshops 2017: 419-433 - [c10]Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. HCI (22) 2017: 675-690 - [c9]Oksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser:
Advancing Trust Visualisations for Wider Applicability and User Acceptance. TrustCom/BigDataSE/ICESS 2017: 562-569 - 2016
- [c8]Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer:
Introducing Proxy Voting to Helios. ARES 2016: 98-106 - [c7]Oksana Kulyk, Melanie Volkamer:
Efficiency Comparison of Various Approaches in E-Voting Protocols. Financial Cryptography Workshops 2016: 209-223 - [c6]Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer:
Coercion-Resistant Proxy Voting. SEC 2016: 3-16 - [i2]David Bernhard, Oksana Kulyk, Melanie Volkamer:
Security Proofs for Participation Privacy and Stronger Veri ability for Helios. IACR Cryptol. ePrint Arch. 2016: 431 (2016) - 2015
- [c5]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. ARES 2015: 224-229 - [c4]Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. STM 2015: 265-273 - [c3]Oksana Kulyk, Vanessa Teague, Melanie Volkamer:
Extending Helios Towards Private Eligibility Verifiability. VoteID 2015: 57-73 - [i1]Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. IACR Cryptol. ePrint Arch. 2015: 558 (2015) - 2014
- [c2]Stephan Neumann, Oksana Kulyk, Melanie Volkamer:
A Usable Android Application Implementing Distributed Cryptography for Election Authorities. ARES 2014: 207-216 - [c1]Oksana Kulyk, Stephan Neumann, Melanie Volkamer, Christian Feier, Thorben Koster:
Electronic voting with fully distributed trust and maximized flexibility regarding ballot design. EVOTE 2014: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint