2008 | ||
---|---|---|
90 | EE | Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang: Love and authentication. CHI 2008: 197-200 |
89 | EE | Markus Jakobsson, Liu Yang, Susanne Wetzel: Quantifying the security of preference-based authentication. Digital Identity Management 2008: 61-70 |
88 | EE | Sukamol Srikwan, Markus Jakobsson: Using Cartoons to Teach Internet Security. Cryptologia 32(2): 137-154 (2008) |
87 | EE | Markus Jakobsson, Steven Myers: Delayed password disclosure. IJACT 1(1): 47-59 (2008) |
2007 | ||
86 | EE | Markus Jakobsson, Steven Myers: Delayed password disclosure. Digital Identity Management 2007: 17-26 |
85 | EE | Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim: What Instills Trust? A Qualitative Study of Phishing. Financial Cryptography 2007: 356-361 |
84 | EE | Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad: Phishing IQ Tests Measure Fear, Not Ability. Financial Cryptography 2007: 362-366 |
83 | EE | Sid Stamm, Zulfikar Ramzan, Markus Jakobsson: Drive-By Pharming. ICICS 2007: 495-506 |
82 | EE | Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer: Social phishing. Commun. ACM 50(10): 94-100 (2007) |
81 | EE | Markus Jakobsson, Steven Myers: Delayed password disclosure. SIGACT News 38(3): 56-75 (2007) |
2006 | ||
80 | EE | Jong Youl Choi, Philippe Golle, Markus Jakobsson: Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44 |
79 | EE | Jong Youl Choi, Philippe Golle, Markus Jakobsson: Auditable Privacy: On Tamper-Evident Mix Networks. Financial Cryptography 2006: 126-141 |
78 | EE | Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow: Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. IEEE Symposium on Security and Privacy 2006: 121-131 |
77 | EE | Ari Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305 |
76 | EE | Markus Jakobsson, Jacob Ratkiewicz: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. WWW 2006: 513-522 |
75 | EE | Markus Jakobsson, Sid Stamm: Invasive browser sniffing and countermeasures. WWW 2006: 523-532 |
74 | EE | Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006) |
73 | EE | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. J. Cryptology 19(1): 27-66 (2006) |
72 | EE | Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz: Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. J. Digital Forensic Practice 1(2): 131-142 (2006) |
71 | EE | Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel: Warkitting: The Drive-by Subversion of Wireless Home Routers. J. Digital Forensic Practice 1(3): 179-192 (2006) |
2005 | ||
70 | Markus Jakobsson, Radha Poovendran: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 ACM 2005 | |
69 | EE | Markus Jakobsson, Liu Yang: Quantifying Security in Hybrid Cellular Networks. ACNS 2005: 350-363 |
68 | EE | Yih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 |
67 | EE | Virgil Griffith, Markus Jakobsson: Messin' with Texas Deriving Mother's Maiden Names Using Public Records. ACNS 2005: 91-103 |
66 | EE | Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88 |
65 | EE | Markus Jakobsson: Modeling and Preventing Phishing Attacks. Financial Cryptography 2005: 89 |
64 | EE | Oleksiy Mazhelis, Jouni Markkula, Markus Jakobsson: Specifying Patterns for Mobile Application Domain Using General Architectural Components. PROFES 2005: 157-172 |
63 | EE | Jong Youl Choi, Markus Jakobsson, Susanne Wetzel: Balancing auditability and privacy in vehicular networks. Q2SWinet 2005: 79-87 |
62 | EE | Ari Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70 |
61 | EE | Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment. Mobile Computing and Communications Review 9(3): 69-81 (2005) |
2004 | ||
60 | Markus Jakobsson, Adrian Perrig: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 ACM 2004 | |
59 | Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004 | |
58 | EE | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 |
57 | EE | Andris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques. Public Key Cryptography 2004: 425-438 |
56 | EE | Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel: Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222 |
55 | EE | Markus Jakobsson, Susanne Wetzel: Efficient attribute authentication with applications to ad hoc networks. Vehicular Ad Hoc Networks 2004: 38-46 |
54 | EE | Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment protocols and security analysis. WMASH 2004: 29-40 |
2003 | ||
53 | EE | Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo: Fractal Merkle Tree Representation and Traversal. CT-RSA 2003: 314-326 |
52 | EE | Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33 |
51 | EE | Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24 |
50 | EE | Philippe Golle, Markus Jakobsson: Reusable anonymous return channels. WPES 2003: 94-100 |
49 | EE | Andris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques CoRR cs.CC/0302025: (2003) |
48 | EE | Markus Jakobsson, Filippo Menczer: Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service CoRR cs.CY/0305042: (2003) |
2002 | ||
47 | EE | Filippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson: IntelliShopper: a proactive, personal, private shopping assistant. AAMAS 2002: 1001-1008 |
46 | EE | Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 |
45 | EE | Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. CRYPTO 2002: 385-400 |
44 | EE | Markus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181 |
43 | EE | Alexandra Boldyreva, Markus Jakobsson: Theft-Protected Proprietary Certificates. Digital Rights Management Workshop 2002: 208-220 |
42 | EE | Don Coppersmith, Markus Jakobsson: Almost Optimal Hash Sequence Traversal. Financial Cryptography 2002: 102-119 |
41 | EE | Juan A. Garay, Markus Jakobsson: Timed Release of Standard Digital Signatures. Financial Cryptography 2002: 168-182 |
40 | EE | Markus Jakobsson: Financial Instruments in Recommendation Mechanisms. Financial Cryptography 2002: 31-43 |
39 | EE | Markus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 |
2001 | ||
38 | EE | Markus Jakobsson, David Pointcheval, Adam Young: Secure Mobile Gambling. CT-RSA 2001: 110-125 |
37 | EE | Markus Jakobsson, Susanne Wetzel: Security Weaknesses in Bluetooth. CT-RSA 2001: 176-191 |
36 | EE | Markus Jakobsson, Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12 |
35 | EE | Markus Jakobsson, David Pointcheval: Mutual Authentication for Low-Power Mobile Devices. Financial Cryptography 2001: 169-186 |
34 | EE | Markus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292 |
33 | EE | Markus Jakobsson, Susanne Wetzel: Secure Server-Aided Signature Generation. Public Key Cryptography 2001: 383-401 |
2000 | ||
32 | EE | Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184 |
31 | EE | Markus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177 |
30 | EE | Markus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358 |
29 | EE | Claus-Peter Schnorr, Markus Jakobsson: Security of Signed ElGamal Encryption. ASIACRYPT 2000: 73-89 |
28 | Philip Bohannon, Markus Jakobsson, Sukamol Srikwan: Cryptographic Approaches to Provacy in Forensic DNA Databases. Public Key Cryptography 2000: 373-390 | |
27 | Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000) | |
1999 | ||
26 | EE | Markus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung: Electronic Payments: Where Do We Go from Here?. CQRE 1999: 43-63 |
25 | EE | Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie: Abuse-Free Optimistic Contract Signing. CRYPTO 1999: 449-466 |
24 | Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 | |
23 | Markus Jakobsson, Claus-Peter Schnorr: Efficient Oblivious Proofs of Correct Exponentiation. Communications and Multimedia Security 1999: 71-86 | |
22 | EE | Markus Jakobsson, Julien P. Stern, Moti Yung: Scramble All, Encrypt Small. FSE 1999: 95-111 |
21 | EE | Markus Jakobsson, Joy Müller: Improved Magic Ink Signatures Using Hints. Financial Cryptography 1999: 253-268 |
20 | EE | Markus Jakobsson: Flash Mixing. PODC 1999: 83-89 |
19 | EE | Markus Jakobsson: On Quorum Controlled Asymmetric Proxy Re-encryption. Public Key Cryptography 1999: 112-121 |
18 | EE | Markus Jakobsson: Mini-Cash: A Minimalistic Approach to E-Commerce. Public Key Cryptography 1999: 122-135 |
17 | EE | Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, Markus Jakobsson: How to Forget a Secret. STACS 1999: 500-509 |
16 | EE | Markus Jakobsson, Philip D. MacKenzie, Julien P. Stern: Secure and Lightweight Advertising on the Web. Computer Networks 31(11-16): 1101-1109 (1999) |
1998 | ||
15 | EE | Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111 |
14 | EE | Markus Jakobsson: A Practical Mix. EUROCRYPT 1998: 448-461 |
13 | EE | Markus Jakobsson, Moti Yung: On Assurance Structures for WWW Commerce. Financial Cryptography 1998: 141-157 |
12 | EE | Markus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27 |
11 | EE | Eran Gabber, Markus Jakobsson, Yossi Matias, Alain J. Mayer: Curbing Junk E-Mail via Secure Classification. Financial Cryptography 1998: 198-213 |
10 | EE | Markus Jakobsson, David M'Raïhi: Mix-Based Electronic Payments. Selected Areas in Cryptography 1998: 157-173 |
1997 | ||
9 | EE | Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110 |
8 | EE | Mihir Bellare, Markus Jakobsson, Moti Yung: Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. EUROCRYPT 1997: 280-305 |
7 | EE | Markus Jakobsson, Moti Yung: Distributed "Magic Ink" Signatures. EUROCRYPT 1997: 450-464 |
6 | Markus Jakobsson, Moti Yung: Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. Financial Cryptography 1997: 217-238 | |
1996 | ||
5 | EE | Markus Jakobsson, Moti Yung: Revokable and Versatile Electronic Money (extended abstract). ACM Conference on Computer and Communications Security 1996: 76-87 |
4 | EE | Markus Jakobsson, Moti Yung: Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. CRYPTO 1996: 186-200 |
3 | EE | Markus Jakobsson, Kazue Sako, Russell Impagliazzo: Designated Verifier Proofs and Their Applications. EUROCRYPT 1996: 143-154 |
1995 | ||
2 | EE | Markus Jakobsson: Ripping Coins For a Fair Exchange. EUROCRYPT 1995: 220-230 |
1994 | ||
1 | EE | Markus Jakobsson: Blackmailing using Undeniable Signatures. EUROCRYPT 1994: 425-427 |