Jurlind Budurushi
Jurlind Budurushi
Head of Security at Cloudical Deutschland GmbH
Geverifieerd e-mailadres voor cloudical.io - Homepage
Geciteerd door
Geciteerd door
Pretty understandable democracy-a secure and understandable internet voting scheme
J Budurushi, S Neumann, MM Olembo, M Volkamer
2013 International Conference on Availability, Reliability and Security, 198-207, 2013
Nothing comes for free: How much usability can you sacrifice for security?
O Kulyk, S Neumann, J Budurushi, M Volkamer
IEEE Security & Privacy 15 (3), 24-29, 2017
Analysis of security and cryptographic approaches to provide secret and verifiable electronic voting
S Neumann, J Budurushi, M Volkamer
Design, development, and use of secure electronic voting systems, 27-61, 2014
Coercion-resistant proxy voting
O Kulyk, S Neumann, K Marky, J Budurushi, M Volkamer
computers & Security 71, 88-99, 2017
An investigation into the usability of electronic voting systems for complex elections
J Budurushi, K Renaud, M Volkamer, M Woide
Annals of Telecommunications 71 (7), 309-322, 2016
Smart cards in electronic voting: lessons learned from applications in legally-binding elections and approaches proposed in scientific papers
J Budurushi, S Neumann, M Volkamer
5th International Conference on Electronic Voting 2012 (EVOTE2012), 2012
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
M Volkamer, J Budurushi, D Demirel
2011 International Workshop on Requirements Engineering for Electronic …, 2011
Implementing and evaluating a software-independent voting system for polling station elections
J Budurushi, R Jöris, M Volkamer
Journal of information security and applications 19 (2), 105-114, 2014
Positive but skeptical: A study of attitudes towards Internet voting in Sweden
M Faraon, G Stenberg, J Budurushi, M Kaipainen
CeDEM Asia 2014: International Conference for E-Democracy and Open …, 2015
Introducing precautionary behavior by temporal diversion of voter attention from casting to verifying their vote
J Budurushi, M Woide, M Volkamer
Workshop on Usable Security (USEC), 2014
Side-channels and evoting machine security: Identifying vulnerabilities and defining requirements
R Frankland, D Demirel, J Budurushi, M Volkamer
2011 International Workshop on Requirements Engineering for Electronic …, 2011
Feasibility analysis of various electronic voting systems for complex elections
J Budurushi, M Volkamer
Conference for E-Democracy and Open Governement, 141, 2014
Elektronische kandidatenauswahl und automatisierte stimmermittlung am beispiel hessischer kommunalwahlen
M Henning, M Volkamer, J Budurushi
Die Offentliche Verwaltung (DOV), 2012
SecIVo: a quantitative security evaluation framework for internet voting schemes
S Neumann, M Volkamer, J Budurushi, M Prandini
Annals of Telecommunications 71 (7), 337-352, 2016
Efficiency evaluation of cryptographic protocols for boardroom voting
O Kulyk, S Neumann, J Budurushi, M Volkamer, R Haenni, R Koenig, ...
2015 10th International Conference on Availability, Reliability and Security …, 2015
Elektronische Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
M Henning, J Budurushi, M Volkamer
MultiMedia und Recht (MMR), 154-8, 2014
Assertion-based approaches to auditing complex elections, with application to party-list proportional elections
M Blom, J Budurushi, RL Rivest, PB Stark, PJ Stuckey, V Teague, ...
International Joint Conference on Electronic Voting, 47-62, 2021
Usable Security Evaluation of EasyVote in the Context of Complex Elections
J Budurushi
Technische Universität Darmstadt, 2016
Paper Audit Trails and Voters’ Privacy Concerns
J Budurushi, S Stockhardt, M Woide, M Volkamer
International Conference on Human Aspects of Information Security, Privacy …, 2014
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
J Budurushi, S Neumann, G Shala, M Volkamer
Informatik 2014, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20