2008 |
90 | EE | Markus Jakobsson,
Erik Stolterman,
Susanne Wetzel,
Liu Yang:
Love and authentication.
CHI 2008: 197-200 |
89 | EE | Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Quantifying the security of preference-based authentication.
Digital Identity Management 2008: 61-70 |
88 | EE | Sukamol Srikwan,
Markus Jakobsson:
Using Cartoons to Teach Internet Security.
Cryptologia 32(2): 137-154 (2008) |
87 | EE | Markus Jakobsson,
Steven Myers:
Delayed password disclosure.
IJACT 1(1): 47-59 (2008) |
2007 |
86 | EE | Markus Jakobsson,
Steven Myers:
Delayed password disclosure.
Digital Identity Management 2007: 17-26 |
85 | EE | Markus Jakobsson,
Alex Tsow,
Ankur Shah,
Eli Blevis,
Youn-Kyung Lim:
What Instills Trust? A Qualitative Study of Phishing.
Financial Cryptography 2007: 356-361 |
84 | EE | Vivek Anandpara,
Andrew Dingman,
Markus Jakobsson,
Debin Liu,
Heather Roinestad:
Phishing IQ Tests Measure Fear, Not Ability.
Financial Cryptography 2007: 362-366 |
83 | EE | Sid Stamm,
Zulfikar Ramzan,
Markus Jakobsson:
Drive-By Pharming.
ICICS 2007: 495-506 |
82 | EE | Tom N. Jagatic,
Nathaniel A. Johnson,
Markus Jakobsson,
Filippo Menczer:
Social phishing.
Commun. ACM 50(10): 94-100 (2007) |
81 | EE | Markus Jakobsson,
Steven Myers:
Delayed password disclosure.
SIGACT News 38(3): 56-75 (2007) |
2006 |
80 | EE | Jong Youl Choi,
Philippe Golle,
Markus Jakobsson:
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
DASC 2006: 37-44 |
79 | EE | Jong Youl Choi,
Philippe Golle,
Markus Jakobsson:
Auditable Privacy: On Tamper-Evident Mix Networks.
Financial Cryptography 2006: 126-141 |
78 | EE | Philippe Golle,
XiaoFeng Wang,
Markus Jakobsson,
Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
IEEE Symposium on Security and Privacy 2006: 121-131 |
77 | EE | Ari Juels,
Markus Jakobsson,
Tom N. Jagatic:
Cache Cookies for Browser Authentication (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 301-305 |
76 | EE | Markus Jakobsson,
Jacob Ratkiewicz:
Designing ethical phishing experiments: a study of (ROT13) rOnl query features.
WWW 2006: 513-522 |
75 | EE | Markus Jakobsson,
Sid Stamm:
Invasive browser sniffing and countermeasures.
WWW 2006: 523-532 |
74 | EE | Naouel Ben Salem,
Levente Buttyán,
Jean-Pierre Hubaux,
Markus Jakobsson:
Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput. 5(4): 365-376 (2006) |
73 | EE | Philip D. MacKenzie,
Thomas Shrimpton,
Markus Jakobsson:
Threshold Password-Authenticated Key Exchange.
J. Cryptology 19(1): 27-66 (2006) |
72 | EE | Mona Gandhi,
Markus Jakobsson,
Jacob Ratkiewicz:
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories.
J. Digital Forensic Practice 1(2): 131-142 (2006) |
71 | EE | Alex Tsow,
Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digital Forensic Practice 1(3): 179-192 (2006) |
2005 |
70 | | Markus Jakobsson,
Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005
ACM 2005 |
69 | EE | Markus Jakobsson,
Liu Yang:
Quantifying Security in Hybrid Cellular Networks.
ACNS 2005: 350-363 |
68 | EE | Yih-Chun Hu,
Markus Jakobsson,
Adrian Perrig:
Efficient Constructions for One-Way Hash Chains.
ACNS 2005: 423-441 |
67 | EE | Virgil Griffith,
Markus Jakobsson:
Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
ACNS 2005: 91-103 |
66 | EE | Richard Clayton,
Drew Dean,
Markus Jakobsson,
Steven Myers,
Stuart G. Stubblebine,
Michael Szydlo:
A Chat at the Old Phishin' Hole.
Financial Cryptography 2005: 88 |
65 | EE | Markus Jakobsson:
Modeling and Preventing Phishing Attacks.
Financial Cryptography 2005: 89 |
64 | EE | Oleksiy Mazhelis,
Jouni Markkula,
Markus Jakobsson:
Specifying Patterns for Mobile Application Domain Using General Architectural Components.
PROFES 2005: 157-172 |
63 | EE | Jong Youl Choi,
Markus Jakobsson,
Susanne Wetzel:
Balancing auditability and privacy in vehicular networks.
Q2SWinet 2005: 79-87 |
62 | EE | Ari Juels,
Dario Catalano,
Markus Jakobsson:
Coercion-resistant electronic elections.
WPES 2005: 61-70 |
61 | EE | Naouel Ben Salem,
Jean-Pierre Hubaux,
Markus Jakobsson:
Reputation-based Wi-Fi deployment.
Mobile Computing and Communications Review 9(3): 69-81 (2005) |
2004 |
60 | | Markus Jakobsson,
Adrian Perrig:
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004
ACM 2004 |
59 | | Markus Jakobsson,
Moti Yung,
Jianying Zhou:
Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings
Springer 2004 |
58 | EE | Philippe Golle,
Markus Jakobsson,
Ari Juels,
Paul F. Syverson:
Universal Re-encryption for Mixnets.
CT-RSA 2004: 163-178 |
57 | EE | Andris Ambainis,
Markus Jakobsson,
Helger Lipmaa:
Cryptographic Randomized Response Techniques.
Public Key Cryptography 2004: 425-438 |
56 | EE | Markus Jakobsson,
XiaoFeng Wang,
Susanne Wetzel:
Stealth attacks in vehicular technologies.
VTC Fall (2) 2004: 1218-1222 |
55 | EE | Markus Jakobsson,
Susanne Wetzel:
Efficient attribute authentication with applications to ad hoc networks.
Vehicular Ad Hoc Networks 2004: 38-46 |
54 | EE | Naouel Ben Salem,
Jean-Pierre Hubaux,
Markus Jakobsson:
Reputation-based Wi-Fi deployment protocols and security analysis.
WMASH 2004: 29-40 |
2003 |
53 | EE | Markus Jakobsson,
Frank Thomson Leighton,
Silvio Micali,
Michael Szydlo:
Fractal Merkle Tree Representation and Traversal.
CT-RSA 2003: 314-326 |
52 | EE | Markus Jakobsson,
Jean-Pierre Hubaux,
Levente Buttyán:
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Financial Cryptography 2003: 15-33 |
51 | EE | Naouel Ben Salem,
Levente Buttyán,
Jean-Pierre Hubaux,
Markus Jakobsson:
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
MobiHoc 2003: 13-24 |
50 | EE | Philippe Golle,
Markus Jakobsson:
Reusable anonymous return channels.
WPES 2003: 94-100 |
49 | EE | Andris Ambainis,
Markus Jakobsson,
Helger Lipmaa:
Cryptographic Randomized Response Techniques
CoRR cs.CC/0302025: (2003) |
48 | EE | Markus Jakobsson,
Filippo Menczer:
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service
CoRR cs.CY/0305042: (2003) |
2002 |
47 | EE | Filippo Menczer,
W. Nick Street,
Narayan Vishwakarma,
Alvaro E. Monge,
Markus Jakobsson:
IntelliShopper: a proactive, personal, private shopping assistant.
AAMAS 2002: 1001-1008 |
46 | EE | Philippe Golle,
Sheng Zhong,
Dan Boneh,
Markus Jakobsson,
Ari Juels:
Optimistic Mixing for Exit-Polls.
ASIACRYPT 2002: 451-465 |
45 | EE | Philip D. MacKenzie,
Thomas Shrimpton,
Markus Jakobsson:
Threshold Password-Authenticated Key Exchange.
CRYPTO 2002: 385-400 |
44 | EE | Markus Jakobsson,
Ari Juels,
Phong Q. Nguyen:
Proprietary Certificates.
CT-RSA 2002: 164-181 |
43 | EE | Alexandra Boldyreva,
Markus Jakobsson:
Theft-Protected Proprietary Certificates.
Digital Rights Management Workshop 2002: 208-220 |
42 | EE | Don Coppersmith,
Markus Jakobsson:
Almost Optimal Hash Sequence Traversal.
Financial Cryptography 2002: 102-119 |
41 | EE | Juan A. Garay,
Markus Jakobsson:
Timed Release of Standard Digital Signatures.
Financial Cryptography 2002: 168-182 |
40 | EE | Markus Jakobsson:
Financial Instruments in Recommendation Mechanisms.
Financial Cryptography 2002: 31-43 |
39 | EE | Markus Jakobsson,
Ari Juels,
Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
USENIX Security Symposium 2002: 339-353 |
2001 |
38 | EE | Markus Jakobsson,
David Pointcheval,
Adam Young:
Secure Mobile Gambling.
CT-RSA 2001: 110-125 |
37 | EE | Markus Jakobsson,
Susanne Wetzel:
Security Weaknesses in Bluetooth.
CT-RSA 2001: 176-191 |
36 | EE | Markus Jakobsson,
Michael K. Reiter:
Discouraging Software Piracy Using Software Aging.
Digital Rights Management Workshop 2001: 1-12 |
35 | EE | Markus Jakobsson,
David Pointcheval:
Mutual Authentication for Low-Power Mobile Devices.
Financial Cryptography 2001: 169-186 |
34 | EE | Markus Jakobsson,
Ari Juels:
An optimally robust hybrid mix network.
PODC 2001: 284-292 |
33 | EE | Markus Jakobsson,
Susanne Wetzel:
Secure Server-Aided Signature Generation.
Public Key Cryptography 2001: 383-401 |
2000 |
32 | EE | Robert M. Arlein,
Ben Jai,
Markus Jakobsson,
Fabian Monrose,
Michael K. Reiter:
Privacy-preserving global customization.
ACM Conference on Electronic Commerce 2000: 176-184 |
31 | EE | Markus Jakobsson,
Ari Juels:
Mix and Match: Secure Function Evaluation via Ciphertexts.
ASIACRYPT 2000: 162-177 |
30 | EE | Markus Jakobsson,
Ari Juels:
Addition of ElGamal Plaintexts.
ASIACRYPT 2000: 346-358 |
29 | EE | Claus-Peter Schnorr,
Markus Jakobsson:
Security of Signed ElGamal Encryption.
ASIACRYPT 2000: 73-89 |
28 | | Philip Bohannon,
Markus Jakobsson,
Sukamol Srikwan:
Cryptographic Approaches to Provacy in Forensic DNA Databases.
Public Key Cryptography 2000: 373-390 |
27 | | Ari Juels,
Markus Jakobsson,
Elizabeth A. M. Shriver,
Bruce Hillyer:
How to turn loaded dice into fair coins.
IEEE Transactions on Information Theory 46(3): 911-921 (2000) |
1999 |
26 | EE | Markus Jakobsson,
David M'Raïhi,
Yiannis Tsiounis,
Moti Yung:
Electronic Payments: Where Do We Go from Here?.
CQRE 1999: 43-63 |
25 | EE | Juan A. Garay,
Markus Jakobsson,
Philip D. MacKenzie:
Abuse-Free Optimistic Contract Signing.
CRYPTO 1999: 449-466 |
24 | | Markus Jakobsson,
Ari Juels:
Proofs of Work and Bread Pudding Protocols.
Communications and Multimedia Security 1999: 258-272 |
23 | | Markus Jakobsson,
Claus-Peter Schnorr:
Efficient Oblivious Proofs of Correct Exponentiation.
Communications and Multimedia Security 1999: 71-86 |
22 | EE | Markus Jakobsson,
Julien P. Stern,
Moti Yung:
Scramble All, Encrypt Small.
FSE 1999: 95-111 |
21 | EE | Markus Jakobsson,
Joy Müller:
Improved Magic Ink Signatures Using Hints.
Financial Cryptography 1999: 253-268 |
20 | EE | Markus Jakobsson:
Flash Mixing.
PODC 1999: 83-89 |
19 | EE | Markus Jakobsson:
On Quorum Controlled Asymmetric Proxy Re-encryption.
Public Key Cryptography 1999: 112-121 |
18 | EE | Markus Jakobsson:
Mini-Cash: A Minimalistic Approach to E-Commerce.
Public Key Cryptography 1999: 122-135 |
17 | EE | Giovanni Di Crescenzo,
Niels Ferguson,
Russell Impagliazzo,
Markus Jakobsson:
How to Forget a Secret.
STACS 1999: 500-509 |
16 | EE | Markus Jakobsson,
Philip D. MacKenzie,
Julien P. Stern:
Secure and Lightweight Advertising on the Web.
Computer Networks 31(11-16): 1101-1109 (1999) |
1998 |
15 | EE | Markus Jakobsson,
Elizabeth A. M. Shriver,
Bruce Hillyer,
Ari Juels:
A Practical Secure Physical Random Bit Generator.
ACM Conference on Computer and Communications Security 1998: 103-111 |
14 | EE | Markus Jakobsson:
A Practical Mix.
EUROCRYPT 1998: 448-461 |
13 | EE | Markus Jakobsson,
Moti Yung:
On Assurance Structures for WWW Commerce.
Financial Cryptography 1998: 141-157 |
12 | EE | Markus Jakobsson,
Ari Juels:
X-Cash: Executable Digital Cash.
Financial Cryptography 1998: 16-27 |
11 | EE | Eran Gabber,
Markus Jakobsson,
Yossi Matias,
Alain J. Mayer:
Curbing Junk E-Mail via Secure Classification.
Financial Cryptography 1998: 198-213 |
10 | EE | Markus Jakobsson,
David M'Raïhi:
Mix-Based Electronic Payments.
Selected Areas in Cryptography 1998: 157-173 |
1997 |
9 | EE | Amir Herzberg,
Markus Jakobsson,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Public Key and Signature Systems.
ACM Conference on Computer and Communications Security 1997: 100-110 |
8 | EE | Mihir Bellare,
Markus Jakobsson,
Moti Yung:
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
EUROCRYPT 1997: 280-305 |
7 | EE | Markus Jakobsson,
Moti Yung:
Distributed "Magic Ink" Signatures.
EUROCRYPT 1997: 450-464 |
6 | | Markus Jakobsson,
Moti Yung:
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Financial Cryptography 1997: 217-238 |
1996 |
5 | EE | Markus Jakobsson,
Moti Yung:
Revokable and Versatile Electronic Money (extended abstract).
ACM Conference on Computer and Communications Security 1996: 76-87 |
4 | EE | Markus Jakobsson,
Moti Yung:
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
CRYPTO 1996: 186-200 |
3 | EE | Markus Jakobsson,
Kazue Sako,
Russell Impagliazzo:
Designated Verifier Proofs and Their Applications.
EUROCRYPT 1996: 143-154 |
1995 |
2 | EE | Markus Jakobsson:
Ripping Coins For a Fair Exchange.
EUROCRYPT 1995: 220-230 |
1994 |
1 | EE | Markus Jakobsson:
Blackmailing using Undeniable Signatures.
EUROCRYPT 1994: 425-427 |