Publications
You can also find my articles on my Google Scholar profile. Most of my articles are publicly available. Please do not hesistate to contact me if you cannot find specific articles.
Bearbeitungs- und Prüfungsleitfaden: Neue MaRisk, 5. Auflage (Link)
Stephan Neumann et al. In: Finanz Colloquium Heidelberg GmbH. Editors: Michael Berndt, Jochen Klein. September 2022.Fostering financial stability through quantitative security evaluation in credit processes (Poster) (Link)
Stephan Neumann, Oksana Kulyk. Accepted at Financial Cryptography and Data Security 2022 (FC22). May 2022. (Removed from the program because of absence)Recent Developments in the Context of Online Elections and Digital Polls in Germany (Link)
Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer. In: Sicherheit 2022: Sicherheit, Schutz und Zuverlässigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). April 2022.Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen (Link)
Bernhard Beckert, Jurlind Budurushi, Armin Grunwald, Robert Krimmer, Oksana Kulyk, Ralf Küsters, Andreas Mayer, Jörn Müller-Quade, Stephan Neumann, Melanie Volkamer. In: 10.5445/IR/1000137300. September 2021.Das Kundenportal der Saar LB - ein Impuls der Digitalisierungsstrategie (Link)
Matthias Böcker, Frank-Oliver Groß, Stephan Neumann. In: Zeitschrift für das gesamte Kreditwesen - 14/2021, July 2021.Human Factors in Coercion Resistant Internet Voting – A Review of Existing Solutions and Open Challenges (Link)
Oksana Kulyk, Stephan Neumann. In: Fifth International Joint Conference on Electronic Voting (E-Vote-ID 2020).SARS-CoV-2, a Threat to Privacy? (Link)
Tim Daubenschuetz, Oksana Kulyk, Stephan Neumann, Isabella Hinterleitner, Paula Ramos Delgado, Carmen Hoffmann, Florian Scheible. In: arXiv preprint arXiv:2004.10305, April 2020.Bearbeitungs- und Prüfungsleitfaden: Neue MaRisk, 4. Auflage
Stephan Neumann et al. In: Finanz Colloquium Heidelberg GmbH. Editors: Michael Berndt, Jochen Klein. 2018.Blockchain - Chancen und Herausforderungen für die Finanzbranche (Link)
Stephan Neumann. In: DigiPraktiker (Finanz Colloquium Heidelberg), vol. 6/2018, p. 74-79, June 2018.Effektiver Schutz vor betrügerischen Nachrichten: Ein Schulungsprogramm zur Erkennung betrügerischer Nachrichten für KMU (Link)
Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer, Christian Schwartz, Alexandra Kunz. In: Datenschutz und Datensicherheit, vol. 5/2018, p. 301-306, Mai 2018.Election-Dependent Security Evaluation of Internet Voting Schemes (Link)
Stephan Neumann, Manuel Noll, Melanie Volkamer. In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Vol. 502, p. 371-382, May 2017.Don’t be Deceived: The Message Might be Fake (Link)
Stephan Neumann, Benjamin Reinheimer, Melanie Volkamer. In: 14th International Conference On Trust, Privacy & Security In Digital Business (TrustBus), August 2017.Enabling Vote Delegation in Boardroom Voting (Link)
Oksana Kulyk, Stephan Neumann, Karola Marky, Melanie Volkamer. In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, April 2017.Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug (Link)
Silke Rehfeld, Melanie Volkamer, Stephan Neumann. In: Mittelstand 4.0 - Agentur Kommunikation, January 2017.Nothing Comes for Free: How Much Usability Can You Sacrifice for Security? (Link)
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer. In: IEEE Security & Privacy Special Issue on Electronic Voting, 2017.Introducing Proxy Voting to Helios (Link)
Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer. In: Availability, Reliability and Security (ARES), 2016 11th International Conference on, September 2016.Supporting Decision Makers in Choosing Suitable Authentication Schemes (Link)
Peter Meyer, Stephan Neumann, Melanie Volkamer. In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), July 2016.Coercion-resistant Proxy Voting (Link)
Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer. In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p. 3-16, Springer, June 2016.SecIVo: a quantitative security evaluation framework for internet voting schemes (Link)
Stephan Neumann, Melanie Volkamer, Jurlind Budurushi, Marco Prandini. In: Annals of Telecommunications, p. 1–16, June 2016.Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung (Link)
Verena Schochlow, Stephan Neumann, Kristoffer Braun, Melanie Volkamer. In: Datenschutz und Datensicherheit, vol. 5/2016, p. 295-299, May 2016.Evaluation and Improvement of Internet Voting Schemes Based on Legally-Founded Security Requirements (Link)
Stephan Neumann. PhD Thesis, 2016.Certification of ICTs in Elections (Link)
Peter Wolf, Jordi Barrat, Eden Bolo, Alejandro Bravo, Robert Krimmer, Stephan Neumann, Al A. Parreño, Carsten Schürmann, Melanie Volkamer. In: International Institute for Democracy and Electoral Assistance, December 2015.Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem (Link)
Stephan Neumann, Melanie Volkamer, Moritz Strube, Wolfgang Jung, Achim Brelle. In: Datenschutz und Datensicherheit, vol. 11/2015, p. 747-752, October 2015.Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting (Link)
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen. In: Availability, Reliability and Security (ARES), 2015 10th International Conference on, p. 224-229, IEEE, August 2015.Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting (Link)
Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen. Cryptology ePrint Archive, Report 2015/558, June 2015.Pretty Understandable Democracy 2.0 (Link)
Stephan Neumann, Christian Feier, Perihan Sahin, Sebastian Fach. In: 6th International Conference on Electronic Voting (EVOTE), p. 69 - 72, TUT Press, October 2014.Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design (Link)
Oksana Kulyk, Stephan Neumann, Christian Feier, Melanie Volkamer and Thorben Köster. In: 6th International Conference on Electronic Voting (EVOTE), p. 1-10, IEEE, October 2014. ISBN 978-3-200-03697-0.Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both? (Link)
Stephan Neumann, Maina M. Olembo, Karen Renaud, Melanie Volkamer. In: Andrea Kö and Enrico Francesconi: Lecture Notes in Computer Science, 3rd International Conference on Electronic Government and the Information Systems Perspective, vol. 8650, p. 246-260, Springer, September 2014. ISBN 978-3-319-10177-4.Coercion-Resistant Internet Voting in Practice (Link)
Christian Feier, Stephan Neumann, Melanie Volkamer. In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1401-1414, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8.Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail (Link)
Jurlind Budurushi, Stephan Neumann, Genc Shala, Melanie Volkamer. In: Erhard Plödereder, Lars Grunske, Eric Schneider and Dominik Ull: Lecture Notes in Informatics (LNI), INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, vol. 232, p. 1415-1426, Köllen Druck+Verlag GmbH, Bonn, September 2014. ISBN 978-3-88579-626-8.Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting (Link)
Stephan Neumann, Jurlind Budurushi, Melanie Volkamer. In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 2, p. 27-61, IGI Global, 2014.Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland (Link)
Johannes Buchmann, Stephan Neumann, Melanie Volkamer. In: Datenschutz und Datensicherheit, Datenschutz und Datensicherheit - DuD, vol. 38, no. 2, p. 98-102, Springer Gabler Verlag, 2014.A Usable Android Application Implementing Distributed Cryptography For Election Authorities (Link)
Stephan Neumann, Oksana Kulyk, Melanie Volkamer. In: 9th International Workshop on Frontiers in Availability, Reliability and Security, p. 198-207, IEEE, 2014.A Holistic Framework for the Evaluation of Internet Voting Systems (Link)
Stephan Neumann, Melanie Volkamer. In: Dimitrios Zissis, Dimitrios Lekkas, Design, Development, and Use of Secure Electronic Voting Systems, chap. 4, p. 76-91, IGI Global, 2014.Modeling the German Legal Latitude Principles (Link)
Stephan Neumann, Anna Kahlert, Maria Henning, Philipp Richter, Hugo Jonker, Melanie Volkamer. In: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh: Lecture Notes in Computer Science, 5th International Conference on eParticipation (ePart 2013) , vol. 8075, p. 49-56, Springer, September 2013.Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme (Link)
Jurlind Budurushi, Stephan Neumann, Maina Olembo, Melanie Volkamer. In: Günther Pernul, Ravi Sandhu: 8th International Conference on Availability, Reliability and Security (AReS 2013), p. 198-207, IEEE, July 2013.Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs (Link)
David Bernhard, Stephan Neumann, Melanie Volkamer. In: Steve Schneider, James Heather, Vanessa Teague: Lecture Notes in Computer Science, 4th International Conference on e-Voting and Identity (VoteID13), vol. 7985, p. 176 - 192, Springer, July 2013.Towards a Practical Mobile Application for Election Authorities (Demo) (Link)
Stephan Neumann, Oksana Kulyk, Lulzim Murati, Melanie Volkamer. In: 4th International Conference on e-Voting and Identity (VoteID13), July 2013.Towards A Practical JCJ / Civitas Implementation (Link)
Stephan Neumann, Christian Feier, Melanie Volkamer, Reto Koenig. In: Matthias Horbach: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p. 804-818, July 2013.Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme (Link)
Stephan Neumann, Anna Kahlert, Maria Henning, Hugo Jonker, Melanie Volkamer. In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), p. 277-284, February 2013.Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA (Link)
Alexander Roßnagel, Philipp Richter and Anna Kahlert, Melanie Volkamer, Stephan Neumann, Rüdiger Grimm, Daniela Simić-Draws. In: 7, International Journal of Information Security and Privacy (IJISP), vol. 7, no. 3, p. 16-35, 2013.Civitas and the Real World: Problems and Solutions from a Practical Point of View (Link)
Stephan Neumann, Melanie Volkamer. In: IEEE Computer Society: 7th International Conference on Availability, Reliability and Security (ARES), p. 180-185, August 2012. ISBN 978-1-4673-2244-7.Partial Verifiability in POLYAS for the GI Elections (Link)
Maina M. Olembo, Anna Kahlert, Stephan Neumann, Melanie Volkamer. In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm : LNI - Lecture Notes in Informatics, 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 95-109, Gesellschaft für Informatik, July 2012. ISBN 978-3-88579-299-4.Smart Cards in Electronic Voting - Lessons learned from applications in legally binding elections and approaches proposed in scientific papers (Link)
Jurlind Budurushi, Stephan Neumann, Melanie Volkamer. In: Manuel J. Kripp, Melanie Volkamer and Rüdiger Grimm: LNI - Series of the Gesellschaft für Informatik (GI) , 5th International Conference on Electronic Voting 2012 (EVOTE2012), vol. 205, p. 257-270, Gesellschaft für Informatik, Juli 2012. ISBN 978-3-88579-299-4.Formal Treatment of Distributed Trust in Electronic Voting (Link)
Stephan Neumann, Melanie Volkamer. In: ThinkMind, The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), vol. ICIMP 2012, The Seventh International Conference on Internet Monitoring and Protection, p. 30-39, May 2012. ISBN 978-1-61208-201-1. (Best Paper Award)Robust Electronic Voting: Introducing robustness in Civitas (Link)
Fatemeh Shirazi, Stephan Neumann, Ines Ciolacu, Melanie Volkamer. In: International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011 , p. 47 -55, August 2011.