BibTeX records: Markus Jakobsson

download as .bib file

@article{DBLP:journals/ieeesp/Jakobsson20,
  author       = {Markus Jakobsson},
  title        = {Permissions and Privacy},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {2},
  pages        = {46--55},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2946330},
  doi          = {10.1109/MSEC.2019.2946330},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Jakobsson20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-06075,
  author       = {Markus Jakobsson},
  title        = {Social Engineering Resistant 2FA},
  journal      = {CoRR},
  volume       = {abs/2001.06075},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.06075},
  eprinttype    = {arXiv},
  eprint       = {2001.06075},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-06075.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Jakobsson19,
  author       = {Markus Jakobsson},
  title        = {The Rising Threat of Launchpad Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {5},
  pages        = {68--72},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2922865},
  doi          = {10.1109/MSEC.2019.2922865},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Jakobsson19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvcg/KovenFSJB19,
  author       = {Jay Koven and
                  Cristian Felix and
                  Hossein Siadati and
                  Markus Jakobsson and
                  Enrico Bertini},
  title        = {Lessons Learned Developing a Visual Analytics Solution for Investigative
                  Analysis of Scamming Activities},
  journal      = {{IEEE} Trans. Vis. Comput. Graph.},
  volume       = {25},
  number       = {1},
  pages        = {225--234},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVCG.2018.2865023},
  doi          = {10.1109/TVCG.2018.2865023},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvcg/KovenFSJB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson18,
  author       = {Markus Jakobsson},
  title        = {Secure Remote Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jakobsson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SiadatiNGJM17,
  author       = {Hossein Siadati and
                  Toan Nguyen and
                  Payas Gupta and
                  Markus Jakobsson and
                  Nasir D. Memon},
  title        = {Mind your SMSes: Mitigating social engineering in second factor authentication},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {14--28},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.09.009},
  doi          = {10.1016/J.COSE.2016.09.009},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SiadatiNGJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DhimanJY17,
  author       = {Mayank Dhiman and
                  Markus Jakobsson and
                  Ting{-}Fang Yen},
  title        = {Breaking and fixing content-based filtering},
  booktitle    = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
                  AZ, USA, April 25-27, 2017},
  pages        = {52--56},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ECRIME.2017.7945054},
  doi          = {10.1109/ECRIME.2017.7945054},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/DhimanJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson17,
  author       = {Markus Jakobsson},
  editor       = {Aggelos Kiayias},
  title        = {Short Paper: Addressing Sophisticated Email Attacks},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {310--317},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_17},
  doi          = {10.1007/978-3-319-70972-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jakobsson17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017w,
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0},
  doi          = {10.1007/978-3-319-70278-0},
  isbn         = {978-3-319-70277-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/JakobssonS16,
  author       = {Markus Jakobsson and
                  Hossein Siadati},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {177--194},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_13},
  doi          = {10.1007/978-3-662-49301-4\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/JakobssonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/Jakobsson16,
  author       = {Markus Jakobsson},
  editor       = {Gabriele Lenzini and
                  Giampaolo Bella and
                  Zinaida Benenson and
                  Carrie E. Gates},
  title        = {User trust assessment: a new approach to combat deception},
  booktitle    = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016},
  pages        = {73--78},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3046055.3046063},
  doi          = {10.1145/3046055.3046063},
  timestamp    = {Mon, 06 Jul 2020 18:11:38 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/Jakobsson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16,
  author       = {Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Scams and Targeting},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_1},
  doi          = {10.1007/978-1-4939-6457-4\_1},
  timestamp    = {Tue, 16 May 2017 14:01:45 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/Jakobsson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Identifying Scams and Trends},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {7--19},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_2},
  doi          = {10.1007/978-1-4939-6457-4\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/YenJ16,
  author       = {Ting{-}Fang Yen and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Predicting Trends},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {21--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_3},
  doi          = {10.1007/978-1-4939-6457-4\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/YenJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/FerreiraJ16,
  author       = {Ana Ferreira and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Persuasion in Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {29--47},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_4},
  doi          = {10.1007/978-1-4939-6457-4\_4},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/FerreiraJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/SiadatiJJ16,
  author       = {Hossein Siadati and
                  Sima Jafarikhah and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Traditional Countermeasures to Unwanted Email},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {51--62},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_5},
  doi          = {10.1007/978-1-4939-6457-4\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/SiadatiJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/DhimanYJ16,
  author       = {Mayank Dhiman and
                  Ting{-}Fang Yen and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Obfuscation in Spam and Scam},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {63--68},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_6},
  doi          = {10.1007/978-1-4939-6457-4\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/DhimanYJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16a,
  author       = {Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Semantic Analysis of Messages},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {69--74},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_7},
  doi          = {10.1007/978-1-4939-6457-4\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/Jakobsson16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16a,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Sales Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_8},
  doi          = {10.1007/978-1-4939-6457-4\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16b,
  author       = {Damon McCoy and
                  Youngsam Park and
                  Elaine Shi and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Rental Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {89--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_9},
  doi          = {10.1007/978-1-4939-6457-4\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/McCoyPSJ16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/YenJ16a,
  author       = {Ting{-}Fang Yen and
                  Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Romance Scams},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {103--113},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_10},
  doi          = {10.1007/978-1-4939-6457-4\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/YenJ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16b,
  author       = {Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Case Study: Business Email Compromise},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_11},
  doi          = {10.1007/978-1-4939-6457-4\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/Jakobsson16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16c,
  author       = {Markus Jakobsson},
  editor       = {Markus Jakobsson},
  title        = {Conclusion and Next Steps},
  booktitle    = {Understanding Social Engineering Based Scams},
  pages        = {125--127},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4\_12},
  doi          = {10.1007/978-1-4939-6457-4\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/Jakobsson16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/J2016,
  editor       = {Markus Jakobsson},
  title        = {Understanding Social Engineering Based Scams},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-6457-4},
  doi          = {10.1007/978-1-4939-6457-4},
  isbn         = {978-1-4939-6455-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/J2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SassePJCWC14,
  author       = {Martina Angela Sasse and
                  Charles C. Palmer and
                  Markus Jakobsson and
                  Sunny Consolvo and
                  Rick Wash and
                  L. Jean Camp},
  title        = {Helping You Protect You},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {1},
  pages        = {39--42},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.4},
  doi          = {10.1109/MSP.2014.4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SassePJCWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ParkJMSJ14,
  author       = {Youngsam Park and
                  Jackie Jones and
                  Damon McCoy and
                  Elaine Shi and
                  Markus Jakobsson},
  title        = {Scambaiter: Understanding Targeted Nigerian Scams on Craigslist},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/scambaiter-understanding-targeted-nigerian-scams-craigslist},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ParkJMSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/Sae-BaeJ14,
  author       = {Napa Sae{-}Bae and
                  Markus Jakobsson},
  title        = {Hand authentication on multi-touch tablets},
  booktitle    = {15th Workshop on Mobile Computing Systems and Applications, HotMobile
                  '14, Santa Barbara, CA, USA, February 26-27, 2014},
  pages        = {8:1--8:6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2565585.2565586},
  doi          = {10.1145/2565585.2565586},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/Sae-BaeJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/Jakobsson13,
  author       = {Markus Jakobsson},
  title        = {Mobile Authentication - Problems and Solutions},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-4878-5},
  doi          = {10.1007/978-1-4614-4878-5},
  isbn         = {978-1-4614-4877-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/Jakobsson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalfanzCEJKMMO12,
  author       = {Dirk Balfanz and
                  Richard Chow and
                  Ori Eisen and
                  Markus Jakobsson and
                  Steve Kirsch and
                  Scott Matsumoto and
                  Jesus Molina and
                  Paul C. van Oorschot},
  title        = {The Future of Authentication},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {1},
  pages        = {22--27},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.24},
  doi          = {10.1109/MSP.2012.24},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BalfanzCEJKMMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/JakobssonS12,
  author       = {Markus Jakobsson and
                  Hossein Siadati},
  title        = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention},
  booktitle    = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2012, Cambridge, MA, USA, June 25, 2012},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/STAST.2012.12},
  doi          = {10.1109/STAST.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/JakobssonS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/JakobssonS12a,
  author       = {Markus Jakobsson and
                  Hossein Siadati},
  title        = {Improved Visual Preference Authentication},
  booktitle    = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2012, Cambridge, MA, USA, June 25, 2012},
  pages        = {27--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/STAST.2012.13},
  doi          = {10.1109/STAST.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/JakobssonS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonD12,
  author       = {Markus Jakobsson and
                  Mayank Dhiman},
  editor       = {Patrick Traynor},
  title        = {The Benefits of Understanding Passwords},
  booktitle    = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
                  WA, USA, August 7, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/jakobsson},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JakobssonD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangGJT10,
  author       = {XiaoFeng Wang and
                  Philippe Golle and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring voluntary trace disclosure in re-encryption mix-networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {18:1--18:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698758},
  doi          = {10.1145/1698750.1698758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangGJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowJMMNSS10,
  author       = {Richard Chow and
                  Markus Jakobsson and
                  Ryusuke Masuoka and
                  Jesus Molina and
                  Yuan Niu and
                  Elaine Shi and
                  Zhexuan Song},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Authentication in the clouds: a framework and its application to mobile
                  users},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866837},
  doi          = {10.1145/1866835.1866837},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowJMMNSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShiNJC10,
  author       = {Elaine Shi and
                  Yuan Niu and
                  Markus Jakobsson and
                  Richard Chow},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Implicit Authentication through Learning User Behavior},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_9},
  doi          = {10.1007/978-3-642-18178-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ShiNJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonJ10,
  author       = {Markus Jakobsson and
                  Karl{-}Anders Johansson},
  editor       = {Wietse Z. Venema},
  title        = {Retroactive Detection of Malware with Applications to Mobile Platforms},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/retroactive-detection-malware-applications-mobile-platforms},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JakobssonJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/JuelsCJ10,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Coercion-Resistant Electronic Elections},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {37--63},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_2},
  doi          = {10.1007/978-3-642-12980-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/JuelsCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3},
  doi          = {10.1007/978-3-642-12980-3},
  isbn         = {978-3-642-12979-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/2010lncs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/JakobssonSS10,
  author       = {Markus Jakobsson and
                  Sid Stamm and
                  Christopher Soghoian},
  editor       = {Burton Rosenberg},
  title        = {Phishing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {301--339},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c12},
  doi          = {10.1201/9781420059823-C12},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jakobsson09,
  author       = {Markus Jakobsson},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Captcha-free throttling},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1654988.1654994},
  doi          = {10.1145/1654988.1654994},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Jakobsson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowGJSSMM09,
  author       = {Richard Chow and
                  Philippe Golle and
                  Markus Jakobsson and
                  Elaine Shi and
                  Jessica Staddon and
                  Ryusuke Masuoka and
                  Jesus Molina},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Controlling data in the cloud: outsourcing computation without outsourcing
                  control},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655020},
  doi          = {10.1145/1655008.1655020},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowGJSSMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JakobssonJ09,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Server-side detection of malware infection},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719033},
  doi          = {10.1145/1719030.1719033},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SrikwanJ08,
  author       = {Sukamol Srikwan and
                  Markus Jakobsson},
  title        = {Using Cartoons to Teach Internet Security},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {137--154},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743724},
  doi          = {10.1080/01611190701743724},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JakobssonFJ08,
  author       = {Markus Jakobsson and
                  Peter Finn and
                  Nathaniel A. Johnson},
  title        = {Why and How to Perform Fraud Experiments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {2},
  pages        = {66--68},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.52},
  doi          = {10.1109/MSP.2008.52},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JakobssonFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JakobssonM08,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  title        = {Delayed password disclosure},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {47--59},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017051},
  doi          = {10.1504/IJACT.2008.017051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/JakobssonSWY08,
  author       = {Markus Jakobsson and
                  Erik Stolterman and
                  Susanne Wetzel and
                  Liu Yang},
  editor       = {Mary Czerwinski and
                  Arnold M. Lund and
                  Desney S. Tan},
  title        = {Love and authentication},
  booktitle    = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
                  {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages        = {197--200},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1357054.1357087},
  doi          = {10.1145/1357054.1357087},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/JakobssonSWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JakobssonYW08,
  author       = {Markus Jakobsson and
                  Liu Yang and
                  Susanne Wetzel},
  editor       = {Elisa Bertino and
                  Kenji Takahashi},
  title        = {Quantifying the security of preference-based authentication},
  booktitle    = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
                  VA, USA, October 31, 2008},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456424.1456435},
  doi          = {10.1145/1456424.1456435},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/JakobssonYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SoghoianFJ08,
  author       = {Christopher Soghoian and
                  Oliver Friedrichs and
                  Markus Jakobsson},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {The Threat of Political Phishing},
  booktitle    = {2nd International Conference on Human Aspects of Information Security
                  and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings},
  pages        = {126--143},
  publisher    = {University of Plymouth},
  year         = {2008},
  url          = {http://www.cscan.org/openaccess/?paperid=44},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/SoghoianFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/ChowGJWW08,
  author       = {Richard Chow and
                  Philippe Golle and
                  Markus Jakobsson and
                  Lusha Wang and
                  XiaoFeng Wang},
  editor       = {Mirjana Spasojevic and
                  Mark D. Corner},
  title        = {Making CAPTCHAs clickable},
  booktitle    = {Proceedings of the 9th Workshop on Mobile Computing Systems and Applications,
                  HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008},
  pages        = {91--94},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411759.1411783},
  doi          = {10.1145/1411759.1411783},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/ChowGJWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JagaticJJM07,
  author       = {Tom N. Jagatic and
                  Nathaniel A. Johnson and
                  Markus Jakobsson and
                  Filippo Menczer},
  title        = {Social phishing},
  journal      = {Commun. {ACM}},
  volume       = {50},
  number       = {10},
  pages        = {94--100},
  year         = {2007},
  url          = {https://doi.org/10.1145/1290958.1290968},
  doi          = {10.1145/1290958.1290968},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JagaticJJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JakobssonS07,
  author       = {Markus Jakobsson and
                  Sid Stamm},
  title        = {Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {6},
  pages        = {16--24},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.182},
  doi          = {10.1109/MSP.2007.182},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JakobssonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/JakobssonM07,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  title        = {Delayed password disclosure},
  journal      = {{SIGACT} News},
  volume       = {38},
  number       = {3},
  pages        = {56--75},
  year         = {2007},
  url          = {https://doi.org/10.1145/1324215.1324228},
  doi          = {10.1145/1324215.1324228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/JakobssonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/FinnJ07,
  author       = {Peter Finn and
                  Markus Jakobsson},
  title        = {Designing ethical phishing experiments},
  journal      = {{IEEE} Technol. Soc. Mag.},
  volume       = {26},
  number       = {1},
  pages        = {46--58},
  year         = {2007},
  url          = {https://doi.org/10.1109/MTAS.2007.335565},
  doi          = {10.1109/MTAS.2007.335565},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tasm/FinnJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/digra/BardzellJBPOH07,
  author       = {Jeffrey Bardzell and
                  Markus Jakobsson and
                  Shaowen Bardzell and
                  Tyler Pace and
                  Will Odom and
                  Aaron R. Houssian},
  editor       = {Akira Baba},
  title        = {Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer
                  Online Games},
  booktitle    = {Proceedings of the 2007 DiGRA International Conference: Situated Play,
                  DiGRA 2007, Tokyo, Japan, September 24-28, 2007},
  publisher    = {Digital Games Research Association},
  year         = {2007},
  url          = {http://www.digra.org/digital-library/publications/virtual-worlds-and-fraud-approaching-cybersecurity-in-massively-multiplayer-online-games/},
  timestamp    = {Wed, 10 Feb 2021 08:45:57 +0100},
  biburl       = {https://dblp.org/rec/conf/digra/BardzellJBPOH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JakobssonM07,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  editor       = {Atsuhiro Goto},
  title        = {Delayed password disclosure},
  booktitle    = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 2, 2007},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314403.1314407},
  doi          = {10.1145/1314403.1314407},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/JakobssonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonTSBL07,
  author       = {Markus Jakobsson and
                  Alex Tsow and
                  Ankur Shah and
                  Eli Blevis and
                  Youn{-}Kyung Lim},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {What Instills Trust? {A} Qualitative Study of Phishing},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {356--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_32},
  doi          = {10.1007/978-3-540-77366-5\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonTSBL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AnandparaDJLR07,
  author       = {Vivek Anandpara and
                  Andrew Dingman and
                  Markus Jakobsson and
                  Debin Liu and
                  Heather Roinestad},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Phishing {IQ} Tests Measure Fear, Not Ability},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {362--366},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_33},
  doi          = {10.1007/978-3-540-77366-5\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AnandparaDJLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/StammRJ07,
  author       = {Sid Stamm and
                  Zulfikar Ramzan and
                  Markus Jakobsson},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Drive-By Pharming},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {495--506},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_38},
  doi          = {10.1007/978-3-540-77048-0\_38},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/StammRJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JuelsSJ07,
  author       = {Ari Juels and
                  Sid Stamm and
                  Markus Jakobsson},
  editor       = {Niels Provos},
  title        = {Combating Click Fraud via Premium Clicks},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/combating-click-fraud-premium-clicks},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JuelsSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GandhiJR06,
  author       = {Mona Gandhi and
                  Markus Jakobsson and
                  Jacob Ratkiewicz},
  title        = {Badvertisements: Stealthy Click-Fraud with Unwitting Accessories},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {2},
  pages        = {131--142},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280601015598},
  doi          = {10.1080/15567280601015598},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/GandhiJR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/TsowJYW06,
  author       = {Alex Tsow and
                  Markus Jakobsson and
                  Liu Yang and
                  Susanne Wetzel},
  title        = {Warkitting: The Drive-by Subversion of Wireless Home Routers},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {179--192},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995832},
  doi          = {10.1080/15567280600995832},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MacKenzieSJ06,
  author       = {Philip D. MacKenzie and
                  Thomas Shrimpton and
                  Markus Jakobsson},
  title        = {Threshold Password-Authenticated Key Exchange},
  journal      = {J. Cryptol.},
  volume       = {19},
  number       = {1},
  pages        = {27--66},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00145-005-0232-5},
  doi          = {10.1007/S00145-005-0232-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MacKenzieSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SalemBHJ06,
  author       = {Naouel Ben Salem and
                  Levente Butty{\'{a}}n and
                  Jean{-}Pierre Hubaux and
                  Markus Jakobsson},
  title        = {Node Cooperation in Hybrid Ad Hoc Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {365--376},
  year         = {2006},
  url          = {https://doi.org/10.1109/TMC.2006.1599405},
  doi          = {10.1109/TMC.2006.1599405},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/SalemBHJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SrikwanJAD06,
  author       = {Sukamol Srikwan and
                  Markus Jakobsson and
                  Andrew Albrecht and
                  Mehmet M. Dalkilic},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {Trust Establishment in Data Sharing: An Incentive Model for Biodiversity
                  Information Systems},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361904},
  doi          = {10.1109/COLCOM.2006.361904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/SrikwanJAD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/ChoiGJ06,
  author       = {Jong Youl Choi and
                  Philippe Golle and
                  Markus Jakobsson},
  title        = {Tamper-Evident Digital Signature Protecting Certification Authorities
                  Against Malware},
  booktitle    = {Second International Symposium on Dependable Autonomic and Secure
                  Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
                  Indiana, {USA}},
  pages        = {37--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DASC.2006.46},
  doi          = {10.1109/DASC.2006.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/ChoiGJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChoiGJ06,
  author       = {Jong Youl Choi and
                  Philippe Golle and
                  Markus Jakobsson},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Auditable Privacy: On Tamper-Evident Mix Networks},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_9},
  doi          = {10.1007/11889663\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChoiGJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KongCJMMG06,
  author       = {Jiejun Kong and
                  Ling{-}Jyh Chen and
                  Markus Jakobsson and
                  Stan Moyer and
                  Dave Marples and
                  Mario Gerla},
  title        = {An Enhanced Digital Content Mediator {(DCM)} Approach to Implementing
                  Legitimate and Secure {P2P} Online Transactions},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2351--2356},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255121},
  doi          = {10.1109/ICC.2006.255121},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KongCJMMG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangJW06,
  author       = {Liu Yang and
                  Markus Jakobsson and
                  Susanne Wetzel},
  title        = {Discount Anonymous On Demand Routing for Mobile Ad hoc Networks},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359533},
  doi          = {10.1109/SECCOMW.2006.359533},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GolleWJT06,
  author       = {Philippe Golle and
                  XiaoFeng Wang and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {121--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.14},
  doi          = {10.1109/SP.2006.14},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GolleWJT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JuelsJJ06,
  author       = {Ari Juels and
                  Markus Jakobsson and
                  Tom N. Jagatic},
  title        = {Cache Cookies for Browser Authentication (Extended Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {301--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.8},
  doi          = {10.1109/SP.2006.8},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JuelsJJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JakobssonR06,
  author       = {Markus Jakobsson and
                  Jacob Ratkiewicz},
  editor       = {Les Carr and
                  David De Roure and
                  Arun Iyengar and
                  Carole A. Goble and
                  Michael Dahlin},
  title        = {Designing ethical phishing experiments: a study of {(ROT13)} rOnl
                  query features},
  booktitle    = {Proceedings of the 15th international conference on World Wide Web,
                  {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages        = {513--522},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1135777.1135853},
  doi          = {10.1145/1135777.1135853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JakobssonR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JakobssonS06,
  author       = {Markus Jakobsson and
                  Sid Stamm},
  editor       = {Les Carr and
                  David De Roure and
                  Arun Iyengar and
                  Carole A. Goble and
                  Michael Dahlin},
  title        = {Invasive browser sniffing and countermeasures},
  booktitle    = {Proceedings of the 15th international conference on World Wide Web,
                  {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages        = {523--532},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1135777.1135854},
  doi          = {10.1145/1135777.1135854},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/JakobssonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/SalemHJ05,
  author       = {Naouel Ben Salem and
                  Jean{-}Pierre Hubaux and
                  Markus Jakobsson},
  title        = {Reputation-based Wi-Fi deployment},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {69--81},
  year         = {2005},
  url          = {https://doi.org/10.1145/1094549.1094559},
  doi          = {10.1145/1094549.1094559},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/SalemHJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GriffithJ05,
  author       = {Virgil Griffith and
                  Markus Jakobsson},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Messin' with Texas Deriving Mother's Maiden Names Using Public Records},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {91--103},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_7},
  doi          = {10.1007/11496137\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GriffithJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JakobssonY05,
  author       = {Markus Jakobsson and
                  Liu Yang},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Quantifying Security in Hybrid Cellular Networks},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {350--363},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_24},
  doi          = {10.1007/11496137\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JakobssonY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuJP05,
  author       = {Yih{-}Chun Hu and
                  Markus Jakobsson and
                  Adrian Perrig},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Constructions for One-Way Hash Chains},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {423--441},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_29},
  doi          = {10.1007/11496137\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HuJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05,
  author       = {Richard Clayton and
                  Drew Dean and
                  Markus Jakobsson and
                  Steven A. Myers and
                  Stuart G. Stubblebine and
                  Michael Szydlo},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A Chat at the Old Phishin' Hole},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_8},
  doi          = {10.1007/11507840\_8},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson05,
  author       = {Markus Jakobsson},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Modeling and Preventing Phishing Attacks},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {89},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_9},
  doi          = {10.1007/11507840\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jakobsson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/ChoiJW05,
  author       = {Jong Youl Choi and
                  Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {Azzedine Boukerche and
                  Regina Borges de Araujo},
  title        = {Balancing auditability and privacy in vehicular networks},
  booktitle    = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and
                  Security for Wireless and Mobile Networks, Montreal, Quebec, Canada,
                  October 13, 2005},
  pages        = {79--87},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1089761.1089775},
  doi          = {10.1145/1089761.1089775},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/ChoiJW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/MazhelisMJ05,
  author       = {Oleksiy Mazhelis and
                  Jouni Markkula and
                  Markus Jakobsson},
  editor       = {Frank Bomarius and
                  Seija Komi{-}Sirvi{\"{o}}},
  title        = {Specifying Patterns for Mobile Application Domain Using General Architectural
                  Components},
  booktitle    = {Product Focused Software Process Improvement, 6th International Conference,
                  {PROFES} 2005, Oulu, Finland, June 13-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3547},
  pages        = {157--172},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11497455\_14},
  doi          = {10.1007/11497455\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/profes/MazhelisMJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JuelsCJ05,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Coercion-resistant electronic elections},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102213},
  doi          = {10.1145/1102199.1102213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JuelsCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2005,
  editor       = {Markus Jakobsson and
                  Radha Poovendran},
  title        = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
                  Germany, September 2, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-142-2},
  timestamp    = {Thu, 07 Feb 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonY05,
  author       = {Markus Jakobsson and
                  Adam L. Young},
  title        = {Distributed Phishing Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiGJ05,
  author       = {Jong Youl Choi and
                  Philippe Golle and
                  Markus Jakobsson},
  title        = {Tamper-Evident Digital Signatures: Protecting Certification Authorities
                  Against Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiGJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StammJ05,
  author       = {Sid Stamm and
                  Markus Jakobsson},
  title        = {Privacy-Preserving Polling using Playing Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StammJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GolleJJS04,
  author       = {Philippe Golle and
                  Markus Jakobsson and
                  Ari Juels and
                  Paul F. Syverson},
  editor       = {Tatsuaki Okamoto},
  title        = {Universal Re-encryption for Mixnets},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_14},
  doi          = {10.1007/978-3-540-24660-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GolleJJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/JakobssonW04,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {Kenneth P. Laberteaux and
                  Raja Sengupta and
                  Chen{-}Nee Chuah and
                  Daniel Jiang},
  title        = {Efficient attribute authentication with applications to ad hoc networks},
  booktitle    = {Proceedings of the First International Workshop on Vehicular Ad Hoc
                  Networks, 2004, Philadelphia, PA, USA, October 1, 2004},
  pages        = {38--46},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1023875.1023882},
  doi          = {10.1145/1023875.1023882},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/JakobssonW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AmbainisJL04,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Cryptographic Randomized Response Techniques},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {425--438},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_31},
  doi          = {10.1007/978-3-540-24632-9\_31},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/JakobssonWW04,
  author       = {Markus Jakobsson and
                  XiaoFeng Wang and
                  Susanne Wetzel},
  title        = {Stealth attacks in vehicular technologies},
  booktitle    = {Proceedings of the 60th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2004, 26-29 September 2004, Los Angeles, CA, {USA}},
  pages        = {1218--1222},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/VETECF.2004.1400216},
  doi          = {10.1109/VETECF.2004.1400216},
  timestamp    = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/JakobssonWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmash/SalemHJ04,
  author       = {Naouel Ben Salem and
                  Jean{-}Pierre Hubaux and
                  Markus Jakobsson},
  editor       = {Giuseppe Bianchi and
                  Sunghyun Choi and
                  Bill N. Schilit},
  title        = {Reputation-based Wi-Fi deployment protocols and security analysis},
  booktitle    = {Proceedings of the 2nd {ACM} International Workshop on Wireless Mobile
                  Applications and Services on {WLAN} Hotspots, {WMASH} 2004, Philadelphia,
                  PA, USA, October 1, 2004},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1024733.1024738},
  doi          = {10.1145/1024733.1024738},
  timestamp    = {Thu, 04 Nov 2021 14:40:55 +0100},
  biburl       = {https://dblp.org/rec/conf/wmash/SalemHJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98360},
  doi          = {10.1007/B98360},
  isbn         = {3-540-22217-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2004,
  editor       = {Markus Jakobsson and
                  Adrian Perrig},
  title        = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
                  PA, USA, October 1, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-925-X},
  timestamp    = {Thu, 20 Jan 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/JakobssonM03,
  author       = {Markus Jakobsson and
                  Filippo Menczer},
  title        = {Untraceable Email Cluster Bombs},
  journal      = {login Usenix Mag.},
  volume       = {28},
  number       = {6},
  year         = {2003},
  url          = {https://www.usenix.org/publications/login/december-2003-volume-28-number-6/untraceable-email-cluster-bombs},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/JakobssonM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonLMS03,
  author       = {Markus Jakobsson and
                  Frank Thomson Leighton and
                  Silvio Micali and
                  Michael Szydlo},
  editor       = {Marc Joye},
  title        = {Fractal Merkle Tree Representation and Traversal},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_21},
  doi          = {10.1007/3-540-36563-X\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonLMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonHB03,
  author       = {Markus Jakobsson and
                  Jean{-}Pierre Hubaux and
                  Levente Butty{\'{a}}n},
  editor       = {Rebecca N. Wright},
  title        = {A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular
                  Networks},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_2},
  doi          = {10.1007/978-3-540-45126-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonHB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/SalemBHJ03,
  author       = {Naouel Ben Salem and
                  Levente Butty{\'{a}}n and
                  Jean{-}Pierre Hubaux and
                  Markus Jakobsson},
  title        = {A charging and rewarding scheme for packet forwarding in multi-hop
                  cellular networks},
  booktitle    = {Proceedings of the 4th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA,
                  June 1-3, 2003},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/778415.778418},
  doi          = {10.1145/778415.778418},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/SalemBHJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GolleJ03,
  author       = {Philippe Golle and
                  Markus Jakobsson},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Paul F. Syverson},
  title        = {Reusable anonymous return channels},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {94--100},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1005140.1005155},
  doi          = {10.1145/1005140.1005155},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GolleJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CC-0302025,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  title        = {Cryptographic Randomized Response Techniques},
  journal      = {CoRR},
  volume       = {cs.CC/0302025},
  year         = {2003},
  url          = {http://arxiv.org/abs/cs/0302025},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CC-0302025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CY-0305042,
  author       = {Markus Jakobsson and
                  Filippo Menczer},
  title        = {Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial
                  of Service},
  journal      = {CoRR},
  volume       = {cs.CY/0305042},
  year         = {2003},
  url          = {http://arxiv.org/abs/cs/0305042},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CY-0305042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbainisJL03,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  title        = {Cryptographic Randomized Response Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonLA03,
  author       = {Markus Jakobsson and
                  John Linn and
                  Joy Algesheimer},
  title        = {How to Protect Against a Militant Spammer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonLA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02,
  author       = {Philippe Golle and
                  Sheng Zhong and
                  Dan Boneh and
                  Markus Jakobsson and
                  Ari Juels},
  editor       = {Yuliang Zheng},
  title        = {Optimistic Mixing for Exit-Polls},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {451--465},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_28},
  doi          = {10.1007/3-540-36178-2\_28},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GolleZBJJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MenczerSVMJ02,
  author       = {Filippo Menczer and
                  W. Nick Street and
                  Narayan Vishwakarma and
                  Alvaro E. Monge and
                  Markus Jakobsson},
  title        = {IntelliShopper: a proactive, personal, private shopping assistant},
  booktitle    = {The First International Joint Conference on Autonomous Agents {\&}
                  Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy,
                  Proceedings},
  pages        = {1001--1008},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/545056.545059},
  doi          = {10.1145/545056.545059},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/MenczerSVMJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02,
  author       = {Alexandra Boldyreva and
                  Markus Jakobsson},
  editor       = {Joan Feigenbaum},
  title        = {Theft-Protected Proprietary Certificates},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {208--220},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_13},
  doi          = {10.1007/978-3-540-44993-5\_13},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MacKenzieSJ02,
  author       = {Philip D. MacKenzie and
                  Thomas Shrimpton and
                  Markus Jakobsson},
  editor       = {Moti Yung},
  title        = {Threshold Password-Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {385--400},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_25},
  doi          = {10.1007/3-540-45708-9\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MacKenzieSJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonJN02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Phong Q. Nguyen},
  editor       = {Bart Preneel},
  title        = {Proprietary Certificates},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_12},
  doi          = {10.1007/3-540-45760-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonJN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson02,
  author       = {Markus Jakobsson},
  editor       = {Matt Blaze},
  title        = {Financial Instruments in Recommendation Mechanisms},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_3},
  doi          = {10.1007/3-540-36504-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jakobsson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CoppersmithJ02,
  author       = {Don Coppersmith and
                  Markus Jakobsson},
  editor       = {Matt Blaze},
  title        = {Almost Optimal Hash Sequence Traversal},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {102--119},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_8},
  doi          = {10.1007/3-540-36504-4\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CoppersmithJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GarayJ02,
  author       = {Juan A. Garay and
                  Markus Jakobsson},
  editor       = {Matt Blaze},
  title        = {Timed Release of Standard Digital Signatures},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {168--182},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_13},
  doi          = {10.1007/3-540-36504-4\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GarayJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonJR02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Ronald L. Rivest},
  editor       = {Dan Boneh},
  title        = {Making Mix Nets Robust for Electronic Voting by Randomized Partial
                  Checking},
  booktitle    = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  pages        = {339--353},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/sec02/jakobsson.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JakobssonJR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson02,
  author       = {Markus Jakobsson},
  title        = {Fractal Hash Sequence Representation and Traversal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jakobsson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoppersmithJ02,
  author       = {Don Coppersmith and
                  Markus Jakobsson},
  title        = {Almost Optimal Hash Sequence Traversal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoppersmithJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonJR02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Ronald L. Rivest},
  title        = {Making Mix Nets Robust For Electronic Voting By Randomized Partial
                  Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsCJ02,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  title        = {Coercion-Resistant Electronic Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonR01,
  author       = {Markus Jakobsson and
                  Michael K. Reiter},
  editor       = {Tomas Sander},
  title        = {Discouraging Software Piracy Using Software Aging},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
                  {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2320},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47870-1\_1},
  doi          = {10.1007/3-540-47870-1\_1},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonPY01,
  author       = {Markus Jakobsson and
                  David Pointcheval and
                  Adam L. Young},
  editor       = {David Naccache},
  title        = {Secure Mobile Gambling},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_10},
  doi          = {10.1007/3-540-45353-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonPY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonW01,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {David Naccache},
  title        = {Security Weaknesses in Bluetooth},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_14},
  doi          = {10.1007/3-540-45353-9\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonP01,
  author       = {Markus Jakobsson and
                  David Pointcheval},
  editor       = {Paul F. Syverson},
  title        = {Mutual Authentication for Low-Power Mobile Devices},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_17},
  doi          = {10.1007/3-540-46088-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JakobssonW01,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {Kwangjo Kim},
  title        = {Secure Server-Aided Signature Generation},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_28},
  doi          = {10.1007/3-540-44586-2\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JakobssonJ01,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {An optimally robust hybrid mix network},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {284--292},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.384046},
  doi          = {10.1145/383962.384046},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/JakobssonJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JuelsJSH00,
  author       = {Ari Juels and
                  Markus Jakobsson and
                  Elizabeth A. M. Shriver and
                  Bruce Hillyer},
  title        = {How to turn loaded dice into fair coins},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {911--921},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841170},
  doi          = {10.1109/18.841170},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JuelsJSH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SchnorrJ00,
  author       = {Claus{-}Peter Schnorr and
                  Markus Jakobsson},
  editor       = {Tatsuaki Okamoto},
  title        = {Security of Signed ElGamal Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_7},
  doi          = {10.1007/3-540-44448-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SchnorrJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Tatsuaki Okamoto},
  title        = {Mix and Match: Secure Function Evaluation via Ciphertexts},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_13},
  doi          = {10.1007/3-540-44448-3\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00a,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Tatsuaki Okamoto},
  title        = {Addition of ElGamal Plaintexts},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {346--358},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_26},
  doi          = {10.1007/3-540-44448-3\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohannonJS00,
  author       = {Philip Bohannon and
                  Markus Jakobsson and
                  Sukamol Srikwan},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_25},
  doi          = {10.1007/978-3-540-46588-1\_25},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ArleinJJMR00,
  author       = {Robert M. Arlein and
                  Ben Jai and
                  Markus Jakobsson and
                  Fabian Monrose and
                  Michael K. Reiter},
  editor       = {Anant Jhingran and
                  Jeff MacKie{-}Mason and
                  Doug J. Tygar},
  title        = {Privacy-preserving global customization},
  booktitle    = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00),
                  Minneapolis, MN, USA, October 17-20, 2000},
  pages        = {176--184},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352871.352891},
  doi          = {10.1145/352871.352891},
  timestamp    = {Sat, 15 May 2021 14:27:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/ArleinJJMR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JakobssonMS99,
  author       = {Markus Jakobsson and
                  Philip D. MacKenzie and
                  Julien P. Stern},
  title        = {Secure and Lightweight Advertising on the Web},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {11-16},
  pages        = {1101--1109},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(99)00041-9},
  doi          = {10.1016/S1389-1286(99)00041-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/JakobssonMS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/JakobssonS99,
  author       = {Markus Jakobsson and
                  Claus{-}Peter Schnorr},
  editor       = {Bart Preneel},
  title        = {Efficient Oblivious Proofs of Correct Exponentiation},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {71--86},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/JakobssonS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/JakobssonJ99,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Bart Preneel},
  title        = {Proofs of Work and Bread Pudding Protocols},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {258--272},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/JakobssonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/JakobssonMTY99,
  author       = {Markus Jakobsson and
                  David M'Ra{\"{\i}}hi and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Rainer Baumgart},
  title        = {Electronic Payments: Where Do We Go from Here?},
  booktitle    = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
                  and Congress D{\"{u}}sseldorf, Germany, November 30 - December
                  2, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1740},
  pages        = {43--63},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46701-7\_4},
  doi          = {10.1007/3-540-46701-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cqre/JakobssonMTY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayJM99,
  author       = {Juan A. Garay and
                  Markus Jakobsson and
                  Philip D. MacKenzie},
  editor       = {Michael J. Wiener},
  title        = {Abuse-Free Optimistic Contract Signing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_29},
  doi          = {10.1007/3-540-48405-1\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayJM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonM99,
  author       = {Markus Jakobsson and
                  Joy M{\"{u}}ller},
  editor       = {Matthew K. Franklin},
  title        = {Improved Magic Ink Signatures Using Hints},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {253--268},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_19},
  doi          = {10.1007/3-540-48390-X\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobssonSY99,
  author       = {Markus Jakobsson and
                  Julien P. Stern and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Scramble All, Encrypt Small},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {95--111},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_8},
  doi          = {10.1007/3-540-48519-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99,
  author       = {Markus Jakobsson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On Quorum Controlled Asymmetric Proxy Re-encryption},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_9},
  doi          = {10.1007/3-540-49162-7\_9},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Jakobsson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99a,
  author       = {Markus Jakobsson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Mini-Cash: {A} Minimalistic Approach to E-Commerce},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {122--135},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_10},
  doi          = {10.1007/3-540-49162-7\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jakobsson99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Jakobsson99,
  author       = {Markus Jakobsson},
  editor       = {Brian A. Coan and
                  Jennifer L. Welch},
  title        = {Flash Mixing},
  booktitle    = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6,
                  1999},
  pages        = {83--89},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301308.301333},
  doi          = {10.1145/301308.301333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Jakobsson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/CrescenzoFIJ99,
  author       = {Giovanni Di Crescenzo and
                  Niels Ferguson and
                  Russell Impagliazzo and
                  Markus Jakobsson},
  editor       = {Christoph Meinel and
                  Sophie Tison},
  title        = {How to Forget a Secret},
  booktitle    = {{STACS} 99, 16th Annual Symposium on Theoretical Aspects of Computer
                  Science, Trier, Germany, March 4-6, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1563},
  pages        = {500--509},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49116-3\_47},
  doi          = {10.1007/3-540-49116-3\_47},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/CrescenzoFIJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98,
  author       = {Markus Jakobsson and
                  Elizabeth A. M. Shriver and
                  Bruce Hillyer and
                  Ari Juels},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Practical Secure Physical Random Bit Generator},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288114},
  doi          = {10.1145/288090.288114},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson98,
  author       = {Markus Jakobsson},
  editor       = {Kaisa Nyberg},
  title        = {A Practical Mix},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {448--461},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054145},
  doi          = {10.1007/BFB0054145},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Jakobsson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonJ98,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Rafael Hirschfeld},
  title        = {X-Cash: Executable Digital Cash},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055470},
  doi          = {10.1007/BFB0055470},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY98,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {On Assurance Structures for {WWW} Commerce},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055478},
  doi          = {10.1007/BFB0055478},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GabberJMM98,
  author       = {Eran Gabber and
                  Markus Jakobsson and
                  Yossi Matias and
                  Alain J. Mayer},
  editor       = {Rafael Hirschfeld},
  title        = {Curbing Junk E-Mail via Secure Classification},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {198--213},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055484},
  doi          = {10.1007/BFB0055484},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GabberJMM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JakobssonM98,
  author       = {Markus Jakobsson and
                  David M'Ra{\"{\i}}hi},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Mix-Based Electronic Payments},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_13},
  doi          = {10.1007/3-540-48892-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JakobssonM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HerzbergJJKY97,
  author       = {Amir Herzberg and
                  Markus Jakobsson and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Moti Yung},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Proactive Public Key and Signature Systems},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {100--110},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266442},
  doi          = {10.1145/266420.266442},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HerzbergJJKY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareJY97,
  author       = {Mihir Bellare and
                  Markus Jakobsson and
                  Moti Yung},
  editor       = {Walter Fumy},
  title        = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {280--305},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_20},
  doi          = {10.1007/3-540-69053-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareJY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JakobssonY97,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Walter Fumy},
  title        = {Distributed "Magic Ink" Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {450--464},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_31},
  doi          = {10.1007/3-540-69053-0\_31},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JakobssonY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY97,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Rafael Hirschfeld},
  title        = {Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money
                  System},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {217--238},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_80},
  doi          = {10.1007/3-540-63594-7\_80},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJY97,
  author       = {Mihir Bellare and
                  Markus Jakobsson and
                  Moti Yung},
  title        = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonY96,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Revokable and Versatile Electronic Money (extended abstract)},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {76--87},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238191},
  doi          = {10.1145/238168.238191},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JakobssonY96,
  author       = {Markus Jakobsson and
                  Moti Yung},
  editor       = {Neal Koblitz},
  title        = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_15},
  doi          = {10.1007/3-540-68697-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JakobssonY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JakobssonSI96,
  author       = {Markus Jakobsson and
                  Kazue Sako and
                  Russell Impagliazzo},
  editor       = {Ueli M. Maurer},
  title        = {Designated Verifier Proofs and Their Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_13},
  doi          = {10.1007/3-540-68339-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JakobssonSI96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson95,
  author       = {Markus Jakobsson},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Ripping Coins For a Fair Exchange},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {220--230},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_18},
  doi          = {10.1007/3-540-49264-X\_18},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Jakobsson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson94,
  author       = {Markus Jakobsson},
  editor       = {Alfredo De Santis},
  title        = {Blackmailing using Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {425--427},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053457},
  doi          = {10.1007/BFB0053457},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Jakobsson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics