dblp.uni-trier.dewww.uni-trier.de

Markus Jakobsson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
90EEMarkus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang: Love and authentication. CHI 2008: 197-200
89EEMarkus Jakobsson, Liu Yang, Susanne Wetzel: Quantifying the security of preference-based authentication. Digital Identity Management 2008: 61-70
88EESukamol Srikwan, Markus Jakobsson: Using Cartoons to Teach Internet Security. Cryptologia 32(2): 137-154 (2008)
87EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. IJACT 1(1): 47-59 (2008)
2007
86EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. Digital Identity Management 2007: 17-26
85EEMarkus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim: What Instills Trust? A Qualitative Study of Phishing. Financial Cryptography 2007: 356-361
84EEVivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad: Phishing IQ Tests Measure Fear, Not Ability. Financial Cryptography 2007: 362-366
83EESid Stamm, Zulfikar Ramzan, Markus Jakobsson: Drive-By Pharming. ICICS 2007: 495-506
82EETom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer: Social phishing. Commun. ACM 50(10): 94-100 (2007)
81EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. SIGACT News 38(3): 56-75 (2007)
2006
80EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44
79EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Auditable Privacy: On Tamper-Evident Mix Networks. Financial Cryptography 2006: 126-141
78EEPhilippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow: Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. IEEE Symposium on Security and Privacy 2006: 121-131
77EEAri Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305
76EEMarkus Jakobsson, Jacob Ratkiewicz: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. WWW 2006: 513-522
75EEMarkus Jakobsson, Sid Stamm: Invasive browser sniffing and countermeasures. WWW 2006: 523-532
74EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006)
73EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. J. Cryptology 19(1): 27-66 (2006)
72EEMona Gandhi, Markus Jakobsson, Jacob Ratkiewicz: Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. J. Digital Forensic Practice 1(2): 131-142 (2006)
71EEAlex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel: Warkitting: The Drive-by Subversion of Wireless Home Routers. J. Digital Forensic Practice 1(3): 179-192 (2006)
2005
70 Markus Jakobsson, Radha Poovendran: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 ACM 2005
69EEMarkus Jakobsson, Liu Yang: Quantifying Security in Hybrid Cellular Networks. ACNS 2005: 350-363
68EEYih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441
67EEVirgil Griffith, Markus Jakobsson: Messin' with Texas Deriving Mother's Maiden Names Using Public Records. ACNS 2005: 91-103
66EERichard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88
65EEMarkus Jakobsson: Modeling and Preventing Phishing Attacks. Financial Cryptography 2005: 89
64EEOleksiy Mazhelis, Jouni Markkula, Markus Jakobsson: Specifying Patterns for Mobile Application Domain Using General Architectural Components. PROFES 2005: 157-172
63EEJong Youl Choi, Markus Jakobsson, Susanne Wetzel: Balancing auditability and privacy in vehicular networks. Q2SWinet 2005: 79-87
62EEAri Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70
61EENaouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment. Mobile Computing and Communications Review 9(3): 69-81 (2005)
2004
60 Markus Jakobsson, Adrian Perrig: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 ACM 2004
59 Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004
58EEPhilippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178
57EEAndris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques. Public Key Cryptography 2004: 425-438
56EEMarkus Jakobsson, XiaoFeng Wang, Susanne Wetzel: Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222
55EEMarkus Jakobsson, Susanne Wetzel: Efficient attribute authentication with applications to ad hoc networks. Vehicular Ad Hoc Networks 2004: 38-46
54EENaouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment protocols and security analysis. WMASH 2004: 29-40
2003
53EEMarkus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo: Fractal Merkle Tree Representation and Traversal. CT-RSA 2003: 314-326
52EEMarkus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33
51EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24
50EEPhilippe Golle, Markus Jakobsson: Reusable anonymous return channels. WPES 2003: 94-100
49EEAndris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques CoRR cs.CC/0302025: (2003)
48EEMarkus Jakobsson, Filippo Menczer: Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service CoRR cs.CY/0305042: (2003)
2002
47EEFilippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson: IntelliShopper: a proactive, personal, private shopping assistant. AAMAS 2002: 1001-1008
46EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
45EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. CRYPTO 2002: 385-400
44EEMarkus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181
43EEAlexandra Boldyreva, Markus Jakobsson: Theft-Protected Proprietary Certificates. Digital Rights Management Workshop 2002: 208-220
42EEDon Coppersmith, Markus Jakobsson: Almost Optimal Hash Sequence Traversal. Financial Cryptography 2002: 102-119
41EEJuan A. Garay, Markus Jakobsson: Timed Release of Standard Digital Signatures. Financial Cryptography 2002: 168-182
40EEMarkus Jakobsson: Financial Instruments in Recommendation Mechanisms. Financial Cryptography 2002: 31-43
39EEMarkus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353
2001
38EEMarkus Jakobsson, David Pointcheval, Adam Young: Secure Mobile Gambling. CT-RSA 2001: 110-125
37EEMarkus Jakobsson, Susanne Wetzel: Security Weaknesses in Bluetooth. CT-RSA 2001: 176-191
36EEMarkus Jakobsson, Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12
35EEMarkus Jakobsson, David Pointcheval: Mutual Authentication for Low-Power Mobile Devices. Financial Cryptography 2001: 169-186
34EEMarkus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292
33EEMarkus Jakobsson, Susanne Wetzel: Secure Server-Aided Signature Generation. Public Key Cryptography 2001: 383-401
2000
32EERobert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184
31EEMarkus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177
30EEMarkus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358
29EEClaus-Peter Schnorr, Markus Jakobsson: Security of Signed ElGamal Encryption. ASIACRYPT 2000: 73-89
28 Philip Bohannon, Markus Jakobsson, Sukamol Srikwan: Cryptographic Approaches to Provacy in Forensic DNA Databases. Public Key Cryptography 2000: 373-390
27 Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000)
1999
26EEMarkus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung: Electronic Payments: Where Do We Go from Here?. CQRE 1999: 43-63
25EEJuan A. Garay, Markus Jakobsson, Philip D. MacKenzie: Abuse-Free Optimistic Contract Signing. CRYPTO 1999: 449-466
24 Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272
23 Markus Jakobsson, Claus-Peter Schnorr: Efficient Oblivious Proofs of Correct Exponentiation. Communications and Multimedia Security 1999: 71-86
22EEMarkus Jakobsson, Julien P. Stern, Moti Yung: Scramble All, Encrypt Small. FSE 1999: 95-111
21EEMarkus Jakobsson, Joy Müller: Improved Magic Ink Signatures Using Hints. Financial Cryptography 1999: 253-268
20EEMarkus Jakobsson: Flash Mixing. PODC 1999: 83-89
19EEMarkus Jakobsson: On Quorum Controlled Asymmetric Proxy Re-encryption. Public Key Cryptography 1999: 112-121
18EEMarkus Jakobsson: Mini-Cash: A Minimalistic Approach to E-Commerce. Public Key Cryptography 1999: 122-135
17EEGiovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, Markus Jakobsson: How to Forget a Secret. STACS 1999: 500-509
16EEMarkus Jakobsson, Philip D. MacKenzie, Julien P. Stern: Secure and Lightweight Advertising on the Web. Computer Networks 31(11-16): 1101-1109 (1999)
1998
15EEMarkus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111
14EEMarkus Jakobsson: A Practical Mix. EUROCRYPT 1998: 448-461
13EEMarkus Jakobsson, Moti Yung: On Assurance Structures for WWW Commerce. Financial Cryptography 1998: 141-157
12EEMarkus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27
11EEEran Gabber, Markus Jakobsson, Yossi Matias, Alain J. Mayer: Curbing Junk E-Mail via Secure Classification. Financial Cryptography 1998: 198-213
10EEMarkus Jakobsson, David M'Raïhi: Mix-Based Electronic Payments. Selected Areas in Cryptography 1998: 157-173
1997
9EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
8EEMihir Bellare, Markus Jakobsson, Moti Yung: Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. EUROCRYPT 1997: 280-305
7EEMarkus Jakobsson, Moti Yung: Distributed "Magic Ink" Signatures. EUROCRYPT 1997: 450-464
6 Markus Jakobsson, Moti Yung: Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. Financial Cryptography 1997: 217-238
1996
5EEMarkus Jakobsson, Moti Yung: Revokable and Versatile Electronic Money (extended abstract). ACM Conference on Computer and Communications Security 1996: 76-87
4EEMarkus Jakobsson, Moti Yung: Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. CRYPTO 1996: 186-200
3EEMarkus Jakobsson, Kazue Sako, Russell Impagliazzo: Designated Verifier Proofs and Their Applications. EUROCRYPT 1996: 143-154
1995
2EEMarkus Jakobsson: Ripping Coins For a Fair Exchange. EUROCRYPT 1995: 220-230
1994
1EEMarkus Jakobsson: Blackmailing using Undeniable Signatures. EUROCRYPT 1994: 425-427

Coauthor Index

1Andris Ambainis [49] [57]
2Vivek Anandpara [84]
3Robert M. Arlein [32]
4Mihir Bellare [8]
5Eli Blevis [85]
6Philip Bohannon [28]
7Alexandra Boldyreva [43]
8Dan Boneh [46]
9Levente Buttyán [51] [52] [74]
10Dario Catalano [62]
11Jong Youl Choi [63] [79] [80]
12Richard Clayton [66]
13Don Coppersmith [42]
14Giovanni Di Crescenzo [17]
15Drew Dean [66]
16Andrew Dingman [84]
17Niels Ferguson [17]
18Eran Gabber [11]
19Mona Gandhi [72]
20Juan A. Garay [25] [41]
21Philippe Golle [46] [50] [58] [78] [79] [80]
22Virgil Griffith [67]
23Amir Herzberg [9]
24Bruce Hillyer [15] [27]
25Yih-Chun Hu [68]
26Jean-Pierre Hubaux [51] [52] [54] [61] [74]
27Russell Impagliazzo [3] [17]
28Tom N. Jagatic [77] [82]
29Ben Jai [32]
30Stanislaw Jarecki [9]
31Nathaniel A. Johnson [82]
32Ari Juels [12] [15] [24] [27] [30] [31] [34] [39] [44] [46] [58] [62] [77]
33Hugo Krawczyk [9]
34Frank Thomson Leighton (Tom Leighton) [53]
35Youn-Kyung Lim [85]
36Helger Lipmaa [49] [57]
37Debin Liu [84]
38David M'Raïhi [10] [26]
39Philip D. MacKenzie [16] [25] [45] [73]
40Jouni Markkula [64]
41Yossi Matias [11]
42Alain J. Mayer [11]
43Oleksiy Mazhelis [64]
44Filippo Menczer [47] [48] [82]
45Silvio Micali [53]
46Alvaro E. Monge [47]
47Fabian Monrose [32]
48Joy Müller [21]
49Steven Myers [66] [81] [86] [87]
50Phong Q. Nguyen [44]
51Adrian Perrig [60] [68]
52David Pointcheval [35] [38]
53Radha Poovendran [70]
54Zulfikar Ramzan [83]
55Jacob Ratkiewicz [72] [76]
56Michael K. Reiter [32] [36]
57Ronald L. Rivest [39]
58Heather Roinestad [84]
59Kazue Sako [3]
60Naouel Ben Salem [51] [54] [61] [74]
61Claus-Peter Schnorr [23] [29]
62Ankur Shah [85]
63Thomas Shrimpton [45] [73]
64Elizabeth A. M. Shriver [15] [27]
65Sukamol Srikwan [28] [88]
66Sid Stamm [75] [83]
67Julien P. Stern [16] [22]
68Erik Stolterman [90]
69W. Nick Street [47]
70Stuart G. Stubblebine [66]
71Paul F. Syverson [58]
72Michael Szydlo [53] [66]
73Yiannis Tsiounis [26]
74Alex Tsow [71] [78] [85]
75Narayan Vishwakarma [47]
76XiaoFeng Wang [56] [78]
77Susanne Wetzel [33] [37] [55] [56] [63] [71] [89] [90]
78Liu Yang [69] [71] [89] [90]
79Adam L. Young (Adam Young) [38]
80Moti Yung (Mordechai M. Yung) [4] [5] [6] [7] [8] [9] [13] [22] [26] [59]
81Sheng Zhong [46]
82Jianying Zhou [59]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)