| 2007 |
| 6 | EE | Markus Jakobsson,
Alex Tsow,
Ankur Shah,
Eli Blevis,
Youn-Kyung Lim:
What Instills Trust? A Qualitative Study of Phishing.
Financial Cryptography 2007: 356-361 |
| 2006 |
| 5 | EE | Philippe Golle,
XiaoFeng Wang,
Markus Jakobsson,
Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
IEEE Symposium on Security and Privacy 2006: 121-131 |
| 4 | EE | Alex Tsow:
Phishing with Consumer Electronics - Malicious Home Routers.
MTW 2006 |
| 3 | EE | Alex Tsow,
Markus Jakobsson,
Liu Yang,
Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digital Forensic Practice 1(3): 179-192 (2006) |
| 2005 |
| 2 | EE | Alex Tsow,
Steven D. Johnson:
Data Refinement for Synchronous System Specification and Construction.
CHARME 2005: 398-401 |
| 2000 |
| 1 | EE | Alex Tsow,
Steven D. Johnson:
Visualizing System Factorizations with Behavior Tables.
FMCAD 2000: 520-537 |