Publications

You can also find my articles on my Google Scholar profile.

Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations
Oksana Kulyk, Jan Henzel, Karen Renaud, Melanie Volkamer
In: 17th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT 2019), 519-538

Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Oksana Kulyk, Paul Gerber, Karola Marky, Christopher Beckmann, Melanie Volkamer
In: NDSS Symposium 2019 (USEC), San Diego, CA, February 18-21, 2019

A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
Oksana Kulyk, Melanie Volkamer
In: 52. Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea, Maui, Hawaii, 8 - 11 Januar 2019

Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability
Oksana Kulyk, Melanie Volkamer
In: Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press

“This Website Uses Cookies”: Users’ Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, Annika Hilt, Nina Gerber, Melanie Volkamer
In: 3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018, Internet Society

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
Oksana Kulyk, Peter Mayer, Oliver Käfer and Melanie Volkamer
In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), August 2018. IEEE

„This Website Uses Cookies”: Users’ Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer
In: The 3rd European Workshop on Usable Security (EuroUSEC), April 2018.

What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes
Karola Marky, Oksana Kulyk, Karen Renaud, Melanie Volkamer
In: Conference on Human Factors in Compu?ng Systems (CHI), April 2018. ACM

Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Karola Marky, Oksana Kulyk, Melanie Volkamer
In: SICHERHEIT 2018, April 2018

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
David Bernhard, Oksana Kulyk, Melanie Volkamer
In: 12th Interna?onal Conference on Availability, Reliability and Security (ARES), pp. 1-10, August 2017. IEEE

Advancing Trust Visualisations for Wider Applicability and User Acceptance Oksana Kulyk, Benjamin Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser
In: 16th IEEE Interna?onal Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 562-569, August 2017. IEEE

Coercion Resistant Proxy Voting (extended version)
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer
In: Computers & Security, Vol. 71, pp. 88-99, November 2017. Elsevier

Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information
Oksana Kulyk, Benjamin Reinheimer, Melanie Volkamer
In: International Conference on Human-Computer Interac?on (HCII), Vol. 10292, p. 675-690, July 2017. Springer

Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer
In: IEEE Security & Privacy, Vol. 15, p. 24-29, June 2017. IEEE

Enabling Vote Delegation in Boardroom Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer
In: In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, p. 419-433, April 2017. Springer

Introducing Proxy Voting to Helios
Oksana Kulyk, Karola Marky, Stephan Neumann and Melanie Volkamer
In: 11th International Conference on Availability, Reliability and Security (ARES), pp. 98-106, September 2016. IEEE

Coercion-resistant Proxy Voting
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi and Melanie Volkamer
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p. 3-16, June 2016. Springer

Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud, Melanie Volkamer
In: Usable Security Workshop (USEC), February 2016. Internet Society

Efficiency Comparison of Various Approaches in E-Voting Protocols
Oksana Kulyk, Melanie Volkamer
In: Financial Cryptography, 1st Workshop on Advances in Secure Electronic Voting Schemes (VOTING), pp. 209-223, February 2016. Springer

A Socio-Technical Investigation into Smartphone Security
Melanie Volkamer, Karen Renaud, Oksana Kulyk and Sinem Emeröz
In: 11th International Workshop on Security and Trust Management (STM), p. 265-273, September 2015. Springer

Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, Melanie Volkamer
In: 5th International Conference on E-Voting and Identity (VoteID), p. 57-73, September 2015. Springer

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, p. 224-229, August 2015. IEEE

Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Oksana Kulyk, Stephan Neumann, Christian Feier, Thorben Köster
In: 6th International Conference on Electronic Voting - EVOTE 2014, p. 1-10, October 2014. IEEE

A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Stephan Neumann, Oksana Kulyk, Melanie Volkamer
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, p. 198-207, September 2014. IEEE