Stephan Neumann
发表
Goran Doychev,
Dominik Feld,
J. Eckhardt,
2009
.
Stephan Neumann,
C. Feier,
P. Sahin,
2014
.
Melanie Volkamer,
Rüdiger Grimm,
Alexander Roßnagel,
2013,
Int. J. Inf. Secur. Priv..
Paula Ramos Delgado,
O. Kulyk,
Stephan Neumann,
2020,
ArXiv.
Melanie Volkamer,
David Bernhard,
Stephan Neumann,
2013,
VoteID.
Evaluation and improvement of internet voting schemes based on legally-founded security requirements
Stephan Neumann,
Stephan Neumann,
2016
.
Thorsten Holz,
Stephan Neumann,
Johannes Hoffmann,
2013,
RAID.
Melanie Volkamer,
Stephan Neumann,
Benjamin Reinheimer,
2017,
TrustBus.
Melanie Volkamer,
Oksana Kulyk,
Stephan Neumann,
2014,
2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).
Stephan Neumann,
Christian Feier,
Perihan Sahin,
2014,
IACR Cryptol. ePrint Arch..
Melanie Volkamer,
Reto E. Koenig,
Stephan Neumann,
2013,
GI-Jahrestagung.
Melanie Volkamer,
Maina M. Olembo,
Jurlind Budurushi,
2013,
2013 International Conference on Availability, Reliability and Security.
Melanie Volkamer,
Stephan Neumann,
M. Volkamer,
2012,
2012 Seventh International Conference on Availability, Reliability and Security.
Melanie Volkamer,
Fatemeh Shirazi,
Stephan Neumann,
2011,
2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
Melanie Volkamer,
Stephan Neumann,
M. Volkamer,
2014
.
Melanie Volkamer,
Stephan Neumann,
M. Volkamer,
2012,
IACR Cryptol. ePrint Arch..
Melanie Volkamer,
Stephan Neumann,
Christian Feier,
2014,
GI-Jahrestagung.
Peter Mayer,
Melanie Volkamer,
Daniel Storck,
2016,
HAISA.
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Melanie Volkamer,
Jurlind Budurushi,
Stephan Neumann,
2014
.
Melanie Volkamer,
Marco Prandini,
Jurlind Budurushi,
2016,
Annals of Telecommunications.