Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Markus Jakobsson
@article{DBLP:journals/ieeesp/Jakobsson20, author = {Markus Jakobsson}, title = {Permissions and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {2}, pages = {46--55}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2019.2946330}, doi = {10.1109/MSEC.2019.2946330}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Jakobsson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06075, author = {Markus Jakobsson}, title = {Social Engineering Resistant 2FA}, journal = {CoRR}, volume = {abs/2001.06075}, year = {2020}, url = {https://arxiv.org/abs/2001.06075}, eprinttype = {arXiv}, eprint = {2001.06075}, timestamp = {Fri, 24 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06075.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Jakobsson19, author = {Markus Jakobsson}, title = {The Rising Threat of Launchpad Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {5}, pages = {68--72}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2922865}, doi = {10.1109/MSEC.2019.2922865}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Jakobsson19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/KovenFSJB19, author = {Jay Koven and Cristian Felix and Hossein Siadati and Markus Jakobsson and Enrico Bertini}, title = {Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {25}, number = {1}, pages = {225--234}, year = {2019}, url = {https://doi.org/10.1109/TVCG.2018.2865023}, doi = {10.1109/TVCG.2018.2865023}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvcg/KovenFSJB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jakobsson18, author = {Markus Jakobsson}, title = {Secure Remote Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2018}, url = {http://eprint.iacr.org/2018/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jakobsson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SiadatiNGJM17, author = {Hossein Siadati and Toan Nguyen and Payas Gupta and Markus Jakobsson and Nasir D. Memon}, title = {Mind your SMSes: Mitigating social engineering in second factor authentication}, journal = {Comput. Secur.}, volume = {65}, pages = {14--28}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.09.009}, doi = {10.1016/J.COSE.2016.09.009}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SiadatiNGJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DhimanJY17, author = {Mayank Dhiman and Markus Jakobsson and Ting{-}Fang Yen}, title = {Breaking and fixing content-based filtering}, booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix, AZ, USA, April 25-27, 2017}, pages = {52--56}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ECRIME.2017.7945054}, doi = {10.1109/ECRIME.2017.7945054}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DhimanJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jakobsson17, author = {Markus Jakobsson}, editor = {Aggelos Kiayias}, title = {Short Paper: Addressing Sophisticated Email Attacks}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {310--317}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_17}, doi = {10.1007/978-3-319-70972-7\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jakobsson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/JakobssonS16, author = {Markus Jakobsson and Hossein Siadati}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {177--194}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_13}, doi = {10.1007/978-3-662-49301-4\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/JakobssonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/Jakobsson16, author = {Markus Jakobsson}, editor = {Gabriele Lenzini and Giampaolo Bella and Zinaida Benenson and Carrie E. Gates}, title = {User trust assessment: a new approach to combat deception}, booktitle = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016}, pages = {73--78}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3046055.3046063}, doi = {10.1145/3046055.3046063}, timestamp = {Mon, 06 Jul 2020 18:11:38 +0200}, biburl = {https://dblp.org/rec/conf/stast/Jakobsson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/Jakobsson16, author = {Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Scams and Targeting}, booktitle = {Understanding Social Engineering Based Scams}, pages = {1--3}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_1}, doi = {10.1007/978-1-4939-6457-4\_1}, timestamp = {Tue, 16 May 2017 14:01:45 +0200}, biburl = {https://dblp.org/rec/books/sp/16/Jakobsson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Identifying Scams and Trends}, booktitle = {Understanding Social Engineering Based Scams}, pages = {7--19}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_2}, doi = {10.1007/978-1-4939-6457-4\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/YenJ16, author = {Ting{-}Fang Yen and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Predicting Trends}, booktitle = {Understanding Social Engineering Based Scams}, pages = {21--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_3}, doi = {10.1007/978-1-4939-6457-4\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/YenJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/FerreiraJ16, author = {Ana Ferreira and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Persuasion in Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {29--47}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_4}, doi = {10.1007/978-1-4939-6457-4\_4}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/FerreiraJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/SiadatiJJ16, author = {Hossein Siadati and Sima Jafarikhah and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Traditional Countermeasures to Unwanted Email}, booktitle = {Understanding Social Engineering Based Scams}, pages = {51--62}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_5}, doi = {10.1007/978-1-4939-6457-4\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/SiadatiJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/DhimanYJ16, author = {Mayank Dhiman and Ting{-}Fang Yen and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Obfuscation in Spam and Scam}, booktitle = {Understanding Social Engineering Based Scams}, pages = {63--68}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_6}, doi = {10.1007/978-1-4939-6457-4\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/DhimanYJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/Jakobsson16a, author = {Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Semantic Analysis of Messages}, booktitle = {Understanding Social Engineering Based Scams}, pages = {69--74}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_7}, doi = {10.1007/978-1-4939-6457-4\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/Jakobsson16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16a, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Sales Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {77--87}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_8}, doi = {10.1007/978-1-4939-6457-4\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/McCoyPSJ16b, author = {Damon McCoy and Youngsam Park and Elaine Shi and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Rental Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {89--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_9}, doi = {10.1007/978-1-4939-6457-4\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/McCoyPSJ16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/YenJ16a, author = {Ting{-}Fang Yen and Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Romance Scams}, booktitle = {Understanding Social Engineering Based Scams}, pages = {103--113}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_10}, doi = {10.1007/978-1-4939-6457-4\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/YenJ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/Jakobsson16b, author = {Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Case Study: Business Email Compromise}, booktitle = {Understanding Social Engineering Based Scams}, pages = {115--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_11}, doi = {10.1007/978-1-4939-6457-4\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/Jakobsson16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/Jakobsson16c, author = {Markus Jakobsson}, editor = {Markus Jakobsson}, title = {Conclusion and Next Steps}, booktitle = {Understanding Social Engineering Based Scams}, pages = {125--127}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4\_12}, doi = {10.1007/978-1-4939-6457-4\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/Jakobsson16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/J2016, editor = {Markus Jakobsson}, title = {Understanding Social Engineering Based Scams}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6457-4}, doi = {10.1007/978-1-4939-6457-4}, isbn = {978-1-4939-6455-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/J2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SassePJCWC14, author = {Martina Angela Sasse and Charles C. Palmer and Markus Jakobsson and Sunny Consolvo and Rick Wash and L. Jean Camp}, title = {Helping You Protect You}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {39--42}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.4}, doi = {10.1109/MSP.2014.4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/SassePJCWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ParkJMSJ14, author = {Youngsam Park and Jackie Jones and Damon McCoy and Elaine Shi and Markus Jakobsson}, title = {Scambaiter: Understanding Targeted Nigerian Scams on Craigslist}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/scambaiter-understanding-targeted-nigerian-scams-craigslist}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ParkJMSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/Sae-BaeJ14, author = {Napa Sae{-}Bae and Markus Jakobsson}, title = {Hand authentication on multi-touch tablets}, booktitle = {15th Workshop on Mobile Computing Systems and Applications, HotMobile '14, Santa Barbara, CA, USA, February 26-27, 2014}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2565585.2565586}, doi = {10.1145/2565585.2565586}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/Sae-BaeJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/Jakobsson13, author = {Markus Jakobsson}, title = {Mobile Authentication - Problems and Solutions}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-4878-5}, doi = {10.1007/978-1-4614-4878-5}, isbn = {978-1-4614-4877-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/Jakobsson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalfanzCEJKMMO12, author = {Dirk Balfanz and Richard Chow and Ori Eisen and Markus Jakobsson and Steve Kirsch and Scott Matsumoto and Jesus Molina and Paul C. van Oorschot}, title = {The Future of Authentication}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {1}, pages = {22--27}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.24}, doi = {10.1109/MSP.2012.24}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalfanzCEJKMMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/JakobssonS12, author = {Markus Jakobsson and Hossein Siadati}, title = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention}, booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2012, Cambridge, MA, USA, June 25, 2012}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/STAST.2012.12}, doi = {10.1109/STAST.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/JakobssonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/JakobssonS12a, author = {Markus Jakobsson and Hossein Siadati}, title = {Improved Visual Preference Authentication}, booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2012, Cambridge, MA, USA, June 25, 2012}, pages = {27--34}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/STAST.2012.13}, doi = {10.1109/STAST.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/JakobssonS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JakobssonD12, author = {Markus Jakobsson and Mayank Dhiman}, editor = {Patrick Traynor}, title = {The Benefits of Understanding Passwords}, booktitle = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/jakobsson}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/JakobssonD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangGJT10, author = {XiaoFeng Wang and Philippe Golle and Markus Jakobsson and Alex Tsow}, title = {Deterring voluntary trace disclosure in re-encryption mix-networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {18:1--18:24}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698758}, doi = {10.1145/1698750.1698758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangGJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowJMMNSS10, author = {Richard Chow and Markus Jakobsson and Ryusuke Masuoka and Jesus Molina and Yuan Niu and Elaine Shi and Zhexuan Song}, editor = {Adrian Perrig and Radu Sion}, title = {Authentication in the clouds: a framework and its application to mobile users}, booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW} 2010, Chicago, IL, USA, October 8, 2010}, pages = {1--6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866835.1866837}, doi = {10.1145/1866835.1866837}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChowJMMNSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShiNJC10, author = {Elaine Shi and Yuan Niu and Markus Jakobsson and Richard Chow}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Implicit Authentication through Learning User Behavior}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {99--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_9}, doi = {10.1007/978-3-642-18178-8\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ShiNJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JakobssonJ10, author = {Markus Jakobsson and Karl{-}Anders Johansson}, editor = {Wietse Z. Venema}, title = {Retroactive Detection of Malware with Applications to Mobile Platforms}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/retroactive-detection-malware-applications-mobile-platforms}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/JakobssonJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/JuelsCJ10, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Coercion-Resistant Electronic Elections}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {37--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_2}, doi = {10.1007/978-3-642-12980-3\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/JuelsCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wote/2010lncs, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3}, doi = {10.1007/978-3-642-12980-3}, isbn = {978-3-642-12979-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wote/2010lncs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/JakobssonSS10, author = {Markus Jakobsson and Sid Stamm and Christopher Soghoian}, editor = {Burton Rosenberg}, title = {Phishing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {301--339}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c12}, doi = {10.1201/9781420059823-C12}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jakobsson09, author = {Markus Jakobsson}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Captcha-free throttling}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {15--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1654988.1654994}, doi = {10.1145/1654988.1654994}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Jakobsson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowGJSSMM09, author = {Richard Chow and Philippe Golle and Markus Jakobsson and Elaine Shi and Jessica Staddon and Ryusuke Masuoka and Jesus Molina}, editor = {Radu Sion and Dawn Song}, title = {Controlling data in the cloud: outsourcing computation without outsourcing control}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {85--90}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655020}, doi = {10.1145/1655008.1655020}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChowGJSSMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JakobssonJ09, author = {Markus Jakobsson and Ari Juels}, editor = {Anil Somayaji and Richard Ford}, title = {Server-side detection of malware infection}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719033}, doi = {10.1145/1719030.1719033}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SrikwanJ08, author = {Sukamol Srikwan and Markus Jakobsson}, title = {Using Cartoons to Teach Internet Security}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {137--154}, year = {2008}, url = {https://doi.org/10.1080/01611190701743724}, doi = {10.1080/01611190701743724}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JakobssonFJ08, author = {Markus Jakobsson and Peter Finn and Nathaniel A. Johnson}, title = {Why and How to Perform Fraud Experiments}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {66--68}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.52}, doi = {10.1109/MSP.2008.52}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/JakobssonFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JakobssonM08, author = {Markus Jakobsson and Steven A. Myers}, title = {Delayed password disclosure}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {47--59}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017051}, doi = {10.1504/IJACT.2008.017051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/JakobssonSWY08, author = {Markus Jakobsson and Erik Stolterman and Susanne Wetzel and Liu Yang}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {Love and authentication}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {197--200}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357087}, doi = {10.1145/1357054.1357087}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/JakobssonSWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/JakobssonYW08, author = {Markus Jakobsson and Liu Yang and Susanne Wetzel}, editor = {Elisa Bertino and Kenji Takahashi}, title = {Quantifying the security of preference-based authentication}, booktitle = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008}, pages = {61--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456424.1456435}, doi = {10.1145/1456424.1456435}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dim/JakobssonYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/SoghoianFJ08, author = {Christopher Soghoian and Oliver Friedrichs and Markus Jakobsson}, editor = {Nathan L. Clarke and Steven Furnell}, title = {The Threat of Political Phishing}, booktitle = {2nd International Conference on Human Aspects of Information Security and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings}, pages = {126--143}, publisher = {University of Plymouth}, year = {2008}, url = {http://www.cscan.org/openaccess/?paperid=44}, timestamp = {Tue, 06 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/haisa/SoghoianFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/ChowGJWW08, author = {Richard Chow and Philippe Golle and Markus Jakobsson and Lusha Wang and XiaoFeng Wang}, editor = {Mirjana Spasojevic and Mark D. Corner}, title = {Making CAPTCHAs clickable}, booktitle = {Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008}, pages = {91--94}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411759.1411783}, doi = {10.1145/1411759.1411783}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/ChowGJWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JagaticJJM07, author = {Tom N. Jagatic and Nathaniel A. Johnson and Markus Jakobsson and Filippo Menczer}, title = {Social phishing}, journal = {Commun. {ACM}}, volume = {50}, number = {10}, pages = {94--100}, year = {2007}, url = {https://doi.org/10.1145/1290958.1290968}, doi = {10.1145/1290958.1290968}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JagaticJJM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JakobssonS07, author = {Markus Jakobsson and Sid Stamm}, title = {Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {6}, pages = {16--24}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.182}, doi = {10.1109/MSP.2007.182}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/JakobssonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/JakobssonM07, author = {Markus Jakobsson and Steven A. Myers}, title = {Delayed password disclosure}, journal = {{SIGACT} News}, volume = {38}, number = {3}, pages = {56--75}, year = {2007}, url = {https://doi.org/10.1145/1324215.1324228}, doi = {10.1145/1324215.1324228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/JakobssonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tasm/FinnJ07, author = {Peter Finn and Markus Jakobsson}, title = {Designing ethical phishing experiments}, journal = {{IEEE} Technol. Soc. Mag.}, volume = {26}, number = {1}, pages = {46--58}, year = {2007}, url = {https://doi.org/10.1109/MTAS.2007.335565}, doi = {10.1109/MTAS.2007.335565}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tasm/FinnJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/digra/BardzellJBPOH07, author = {Jeffrey Bardzell and Markus Jakobsson and Shaowen Bardzell and Tyler Pace and Will Odom and Aaron R. Houssian}, editor = {Akira Baba}, title = {Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games}, booktitle = {Proceedings of the 2007 DiGRA International Conference: Situated Play, DiGRA 2007, Tokyo, Japan, September 24-28, 2007}, publisher = {Digital Games Research Association}, year = {2007}, url = {http://www.digra.org/digital-library/publications/virtual-worlds-and-fraud-approaching-cybersecurity-in-massively-multiplayer-online-games/}, timestamp = {Wed, 10 Feb 2021 08:45:57 +0100}, biburl = {https://dblp.org/rec/conf/digra/BardzellJBPOH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/JakobssonM07, author = {Markus Jakobsson and Steven A. Myers}, editor = {Atsuhiro Goto}, title = {Delayed password disclosure}, booktitle = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007}, pages = {17--26}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314403.1314407}, doi = {10.1145/1314403.1314407}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/JakobssonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonTSBL07, author = {Markus Jakobsson and Alex Tsow and Ankur Shah and Eli Blevis and Youn{-}Kyung Lim}, editor = {Sven Dietrich and Rachna Dhamija}, title = {What Instills Trust? {A} Qualitative Study of Phishing}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {356--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_32}, doi = {10.1007/978-3-540-77366-5\_32}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/JakobssonTSBL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AnandparaDJLR07, author = {Vivek Anandpara and Andrew Dingman and Markus Jakobsson and Debin Liu and Heather Roinestad}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Phishing {IQ} Tests Measure Fear, Not Ability}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {362--366}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_33}, doi = {10.1007/978-3-540-77366-5\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AnandparaDJLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/StammRJ07, author = {Sid Stamm and Zulfikar Ramzan and Markus Jakobsson}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Drive-By Pharming}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {495--506}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_38}, doi = {10.1007/978-3-540-77048-0\_38}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/StammRJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JuelsSJ07, author = {Ari Juels and Sid Stamm and Markus Jakobsson}, editor = {Niels Provos}, title = {Combating Click Fraud via Premium Clicks}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/combating-click-fraud-premium-clicks}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/JuelsSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/GandhiJR06, author = {Mona Gandhi and Markus Jakobsson and Jacob Ratkiewicz}, title = {Badvertisements: Stealthy Click-Fraud with Unwitting Accessories}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {2}, pages = {131--142}, year = {2006}, url = {https://doi.org/10.1080/15567280601015598}, doi = {10.1080/15567280601015598}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/GandhiJR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfp/TsowJYW06, author = {Alex Tsow and Markus Jakobsson and Liu Yang and Susanne Wetzel}, title = {Warkitting: The Drive-by Subversion of Wireless Home Routers}, journal = {J. Digit. Forensic Pract.}, volume = {1}, number = {3}, pages = {179--192}, year = {2006}, url = {https://doi.org/10.1080/15567280600995832}, doi = {10.1080/15567280600995832}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfp/TsowJYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MacKenzieSJ06, author = {Philip D. MacKenzie and Thomas Shrimpton and Markus Jakobsson}, title = {Threshold Password-Authenticated Key Exchange}, journal = {J. Cryptol.}, volume = {19}, number = {1}, pages = {27--66}, year = {2006}, url = {https://doi.org/10.1007/s00145-005-0232-5}, doi = {10.1007/S00145-005-0232-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MacKenzieSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/SalemBHJ06, author = {Naouel Ben Salem and Levente Butty{\'{a}}n and Jean{-}Pierre Hubaux and Markus Jakobsson}, title = {Node Cooperation in Hybrid Ad Hoc Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {5}, number = {4}, pages = {365--376}, year = {2006}, url = {https://doi.org/10.1109/TMC.2006.1599405}, doi = {10.1109/TMC.2006.1599405}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/SalemBHJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/SrikwanJAD06, author = {Sukamol Srikwan and Markus Jakobsson and Andrew Albrecht and Mehmet M. Dalkilic}, editor = {Enrico Blanzieri and Tao Zhang}, title = {Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems}, booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2006}, url = {https://doi.org/10.1109/COLCOM.2006.361904}, doi = {10.1109/COLCOM.2006.361904}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/SrikwanJAD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ChoiGJ06, author = {Jong Youl Choi and Philippe Golle and Markus Jakobsson}, title = {Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware}, booktitle = {Second International Symposium on Dependable Autonomic and Secure Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis, Indiana, {USA}}, pages = {37--44}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DASC.2006.46}, doi = {10.1109/DASC.2006.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ChoiGJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChoiGJ06, author = {Jong Youl Choi and Philippe Golle and Markus Jakobsson}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Auditable Privacy: On Tamper-Evident Mix Networks}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {126--141}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_9}, doi = {10.1007/11889663\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChoiGJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KongCJMMG06, author = {Jiejun Kong and Ling{-}Jyh Chen and Markus Jakobsson and Stan Moyer and Dave Marples and Mario Gerla}, title = {An Enhanced Digital Content Mediator {(DCM)} Approach to Implementing Legitimate and Secure {P2P} Online Transactions}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2351--2356}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255121}, doi = {10.1109/ICC.2006.255121}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KongCJMMG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangJW06, author = {Liu Yang and Markus Jakobsson and Susanne Wetzel}, title = {Discount Anonymous On Demand Routing for Mobile Ad hoc Networks}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359533}, doi = {10.1109/SECCOMW.2006.359533}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/YangJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GolleWJT06, author = {Philippe Golle and XiaoFeng Wang and Markus Jakobsson and Alex Tsow}, title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {121--131}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.14}, doi = {10.1109/SP.2006.14}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/GolleWJT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JuelsJJ06, author = {Ari Juels and Markus Jakobsson and Tom N. Jagatic}, title = {Cache Cookies for Browser Authentication (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {301--305}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.8}, doi = {10.1109/SP.2006.8}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JuelsJJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JakobssonR06, author = {Markus Jakobsson and Jacob Ratkiewicz}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {Designing ethical phishing experiments: a study of {(ROT13)} rOnl query features}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {513--522}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135853}, doi = {10.1145/1135777.1135853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JakobssonR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JakobssonS06, author = {Markus Jakobsson and Sid Stamm}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {Invasive browser sniffing and countermeasures}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {523--532}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135854}, doi = {10.1145/1135777.1135854}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/JakobssonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/SalemHJ05, author = {Naouel Ben Salem and Jean{-}Pierre Hubaux and Markus Jakobsson}, title = {Reputation-based Wi-Fi deployment}, journal = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.}, volume = {9}, number = {3}, pages = {69--81}, year = {2005}, url = {https://doi.org/10.1145/1094549.1094559}, doi = {10.1145/1094549.1094559}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmobile/SalemHJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GriffithJ05, author = {Virgil Griffith and Markus Jakobsson}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Messin' with Texas Deriving Mother's Maiden Names Using Public Records}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {91--103}, year = {2005}, url = {https://doi.org/10.1007/11496137\_7}, doi = {10.1007/11496137\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GriffithJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JakobssonY05, author = {Markus Jakobsson and Liu Yang}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Quantifying Security in Hybrid Cellular Networks}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {350--363}, year = {2005}, url = {https://doi.org/10.1007/11496137\_24}, doi = {10.1007/11496137\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/JakobssonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuJP05, author = {Yih{-}Chun Hu and Markus Jakobsson and Adrian Perrig}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Constructions for One-Way Hash Chains}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {423--441}, year = {2005}, url = {https://doi.org/10.1007/11496137\_29}, doi = {10.1007/11496137\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HuJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05, author = {Richard Clayton and Drew Dean and Markus Jakobsson and Steven A. Myers and Stuart G. Stubblebine and Michael Szydlo}, editor = {Andrew S. Patrick and Moti Yung}, title = {A Chat at the Old Phishin' Hole}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_8}, doi = {10.1007/11507840\_8}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jakobsson05, author = {Markus Jakobsson}, editor = {Andrew S. Patrick and Moti Yung}, title = {Modeling and Preventing Phishing Attacks}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {89}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_9}, doi = {10.1007/11507840\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jakobsson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/ChoiJW05, author = {Jong Youl Choi and Markus Jakobsson and Susanne Wetzel}, editor = {Azzedine Boukerche and Regina Borges de Araujo}, title = {Balancing auditability and privacy in vehicular networks}, booktitle = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005}, pages = {79--87}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1089761.1089775}, doi = {10.1145/1089761.1089775}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/ChoiJW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/MazhelisMJ05, author = {Oleksiy Mazhelis and Jouni Markkula and Markus Jakobsson}, editor = {Frank Bomarius and Seija Komi{-}Sirvi{\"{o}}}, title = {Specifying Patterns for Mobile Application Domain Using General Architectural Components}, booktitle = {Product Focused Software Process Improvement, 6th International Conference, {PROFES} 2005, Oulu, Finland, June 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3547}, pages = {157--172}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11497455\_14}, doi = {10.1007/11497455\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/profes/MazhelisMJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JuelsCJ05, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Coercion-resistant electronic elections}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {61--70}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102213}, doi = {10.1145/1102199.1102213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JuelsCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ws/2005, editor = {Markus Jakobsson and Radha Poovendran}, title = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne, Germany, September 2, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-142-2}, timestamp = {Thu, 07 Feb 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonY05, author = {Markus Jakobsson and Adam L. Young}, title = {Distributed Phishing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2005}, url = {http://eprint.iacr.org/2005/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiGJ05, author = {Jong Youl Choi and Philippe Golle and Markus Jakobsson}, title = {Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2005}, url = {http://eprint.iacr.org/2005/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiGJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StammJ05, author = {Sid Stamm and Markus Jakobsson}, title = {Privacy-Preserving Polling using Playing Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2005}, url = {http://eprint.iacr.org/2005/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StammJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GolleJJS04, author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul F. Syverson}, editor = {Tatsuaki Okamoto}, title = {Universal Re-encryption for Mixnets}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {163--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_14}, doi = {10.1007/978-3-540-24660-2\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GolleJJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/JakobssonW04, author = {Markus Jakobsson and Susanne Wetzel}, editor = {Kenneth P. Laberteaux and Raja Sengupta and Chen{-}Nee Chuah and Daniel Jiang}, title = {Efficient attribute authentication with applications to ad hoc networks}, booktitle = {Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004, Philadelphia, PA, USA, October 1, 2004}, pages = {38--46}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1023875.1023882}, doi = {10.1145/1023875.1023882}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/JakobssonW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AmbainisJL04, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Cryptographic Randomized Response Techniques}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {425--438}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_31}, doi = {10.1007/978-3-540-24632-9\_31}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/JakobssonWW04, author = {Markus Jakobsson and XiaoFeng Wang and Susanne Wetzel}, title = {Stealth attacks in vehicular technologies}, booktitle = {Proceedings of the 60th {IEEE} Vehicular Technology Conference, {VTC} Fall 2004, 26-29 September 2004, Los Angeles, CA, {USA}}, pages = {1218--1222}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/VETECF.2004.1400216}, doi = {10.1109/VETECF.2004.1400216}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/JakobssonWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmash/SalemHJ04, author = {Naouel Ben Salem and Jean{-}Pierre Hubaux and Markus Jakobsson}, editor = {Giuseppe Bianchi and Sunghyun Choi and Bill N. Schilit}, title = {Reputation-based Wi-Fi deployment protocols and security analysis}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on Wireless Mobile Applications and Services on {WLAN} Hotspots, {WMASH} 2004, Philadelphia, PA, USA, October 1, 2004}, pages = {29--40}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1024733.1024738}, doi = {10.1145/1024733.1024738}, timestamp = {Thu, 04 Nov 2021 14:40:55 +0100}, biburl = {https://dblp.org/rec/conf/wmash/SalemHJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2004, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98360}, doi = {10.1007/B98360}, isbn = {3-540-22217-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ws/2004, editor = {Markus Jakobsson and Adrian Perrig}, title = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-925-X}, timestamp = {Thu, 20 Jan 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JakobssonM03, author = {Markus Jakobsson and Filippo Menczer}, title = {Untraceable Email Cluster Bombs}, journal = {login Usenix Mag.}, volume = {28}, number = {6}, year = {2003}, url = {https://www.usenix.org/publications/login/december-2003-volume-28-number-6/untraceable-email-cluster-bombs}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JakobssonM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonLMS03, author = {Markus Jakobsson and Frank Thomson Leighton and Silvio Micali and Michael Szydlo}, editor = {Marc Joye}, title = {Fractal Merkle Tree Representation and Traversal}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {314--326}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_21}, doi = {10.1007/3-540-36563-X\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonLMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonHB03, author = {Markus Jakobsson and Jean{-}Pierre Hubaux and Levente Butty{\'{a}}n}, editor = {Rebecca N. Wright}, title = {A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {15--33}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_2}, doi = {10.1007/978-3-540-45126-6\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonHB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/SalemBHJ03, author = {Naouel Ben Salem and Levente Butty{\'{a}}n and Jean{-}Pierre Hubaux and Markus Jakobsson}, title = {A charging and rewarding scheme for packet forwarding in multi-hop cellular networks}, booktitle = {Proceedings of the 4th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA, June 1-3, 2003}, pages = {13--24}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/778415.778418}, doi = {10.1145/778415.778418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/SalemBHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GolleJ03, author = {Philippe Golle and Markus Jakobsson}, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {Reusable anonymous return channels}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, pages = {94--100}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1005140.1005155}, doi = {10.1145/1005140.1005155}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GolleJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CC-0302025, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, journal = {CoRR}, volume = {cs.CC/0302025}, year = {2003}, url = {http://arxiv.org/abs/cs/0302025}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CC-0302025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-0305042, author = {Markus Jakobsson and Filippo Menczer}, title = {Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service}, journal = {CoRR}, volume = {cs.CY/0305042}, year = {2003}, url = {http://arxiv.org/abs/cs/0305042}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-0305042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbainisJL03, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2003}, url = {http://eprint.iacr.org/2003/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonLA03, author = {Markus Jakobsson and John Linn and Joy Algesheimer}, title = {How to Protect Against a Militant Spammer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2003}, url = {http://eprint.iacr.org/2003/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonLA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02, author = {Philippe Golle and Sheng Zhong and Dan Boneh and Markus Jakobsson and Ari Juels}, editor = {Yuliang Zheng}, title = {Optimistic Mixing for Exit-Polls}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {451--465}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_28}, doi = {10.1007/3-540-36178-2\_28}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GolleZBJJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MenczerSVMJ02, author = {Filippo Menczer and W. Nick Street and Narayan Vishwakarma and Alvaro E. Monge and Markus Jakobsson}, title = {IntelliShopper: a proactive, personal, private shopping assistant}, booktitle = {The First International Joint Conference on Autonomous Agents {\&} Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy, Proceedings}, pages = {1001--1008}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/545056.545059}, doi = {10.1145/545056.545059}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/MenczerSVMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02, author = {Alexandra Boldyreva and Markus Jakobsson}, editor = {Joan Feigenbaum}, title = {Theft-Protected Proprietary Certificates}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {208--220}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_13}, doi = {10.1007/978-3-540-44993-5\_13}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MacKenzieSJ02, author = {Philip D. MacKenzie and Thomas Shrimpton and Markus Jakobsson}, editor = {Moti Yung}, title = {Threshold Password-Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {385--400}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_25}, doi = {10.1007/3-540-45708-9\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MacKenzieSJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonJN02, author = {Markus Jakobsson and Ari Juels and Phong Q. Nguyen}, editor = {Bart Preneel}, title = {Proprietary Certificates}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {164--181}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_12}, doi = {10.1007/3-540-45760-7\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonJN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jakobsson02, author = {Markus Jakobsson}, editor = {Matt Blaze}, title = {Financial Instruments in Recommendation Mechanisms}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {31--43}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_3}, doi = {10.1007/3-540-36504-4\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jakobsson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CoppersmithJ02, author = {Don Coppersmith and Markus Jakobsson}, editor = {Matt Blaze}, title = {Almost Optimal Hash Sequence Traversal}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {102--119}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_8}, doi = {10.1007/3-540-36504-4\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CoppersmithJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GarayJ02, author = {Juan A. Garay and Markus Jakobsson}, editor = {Matt Blaze}, title = {Timed Release of Standard Digital Signatures}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {168--182}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_13}, doi = {10.1007/3-540-36504-4\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GarayJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JakobssonJR02, author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, editor = {Dan Boneh}, title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, pages = {339--353}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/sec02/jakobsson.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JakobssonJR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jakobsson02, author = {Markus Jakobsson}, title = {Fractal Hash Sequence Representation and Traversal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2002}, url = {http://eprint.iacr.org/2002/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jakobsson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoppersmithJ02, author = {Don Coppersmith and Markus Jakobsson}, title = {Almost Optimal Hash Sequence Traversal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2002}, url = {http://eprint.iacr.org/2002/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoppersmithJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonJR02, author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, title = {Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2002}, url = {http://eprint.iacr.org/2002/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsCJ02, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, title = {Coercion-Resistant Electronic Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2002}, url = {http://eprint.iacr.org/2002/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonR01, author = {Markus Jakobsson and Michael K. Reiter}, editor = {Tomas Sander}, title = {Discouraging Software Piracy Using Software Aging}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2320}, pages = {1--12}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47870-1\_1}, doi = {10.1007/3-540-47870-1\_1}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonPY01, author = {Markus Jakobsson and David Pointcheval and Adam L. Young}, editor = {David Naccache}, title = {Secure Mobile Gambling}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {110--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_10}, doi = {10.1007/3-540-45353-9\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonPY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, editor = {David Naccache}, title = {Security Weaknesses in Bluetooth}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {176--191}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_14}, doi = {10.1007/3-540-45353-9\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonP01, author = {Markus Jakobsson and David Pointcheval}, editor = {Paul F. Syverson}, title = {Mutual Authentication for Low-Power Mobile Devices}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {169--186}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_17}, doi = {10.1007/3-540-46088-8\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, editor = {Kwangjo Kim}, title = {Secure Server-Aided Signature Generation}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {383--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_28}, doi = {10.1007/3-540-44586-2\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/JakobssonJ01, author = {Markus Jakobsson and Ari Juels}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {An optimally robust hybrid mix network}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {284--292}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.384046}, doi = {10.1145/383962.384046}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/JakobssonJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JuelsJSH00, author = {Ari Juels and Markus Jakobsson and Elizabeth A. M. Shriver and Bruce Hillyer}, title = {How to turn loaded dice into fair coins}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {911--921}, year = {2000}, url = {https://doi.org/10.1109/18.841170}, doi = {10.1109/18.841170}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JuelsJSH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SchnorrJ00, author = {Claus{-}Peter Schnorr and Markus Jakobsson}, editor = {Tatsuaki Okamoto}, title = {Security of Signed ElGamal Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {73--89}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_7}, doi = {10.1007/3-540-44448-3\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SchnorrJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00, author = {Markus Jakobsson and Ari Juels}, editor = {Tatsuaki Okamoto}, title = {Mix and Match: Secure Function Evaluation via Ciphertexts}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {162--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_13}, doi = {10.1007/3-540-44448-3\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00a, author = {Markus Jakobsson and Ari Juels}, editor = {Tatsuaki Okamoto}, title = {Addition of ElGamal Plaintexts}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {346--358}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_26}, doi = {10.1007/3-540-44448-3\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohannonJS00, author = {Philip Bohannon and Markus Jakobsson and Sukamol Srikwan}, editor = {Hideki Imai and Yuliang Zheng}, title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {373--390}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_25}, doi = {10.1007/978-3-540-46588-1\_25}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/ArleinJJMR00, author = {Robert M. Arlein and Ben Jai and Markus Jakobsson and Fabian Monrose and Michael K. Reiter}, editor = {Anant Jhingran and Jeff MacKie{-}Mason and Doug J. Tygar}, title = {Privacy-preserving global customization}, booktitle = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00), Minneapolis, MN, USA, October 17-20, 2000}, pages = {176--184}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352871.352891}, doi = {10.1145/352871.352891}, timestamp = {Sat, 15 May 2021 14:27:12 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/ArleinJJMR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JakobssonMS99, author = {Markus Jakobsson and Philip D. MacKenzie and Julien P. Stern}, title = {Secure and Lightweight Advertising on the Web}, journal = {Comput. Networks}, volume = {31}, number = {11-16}, pages = {1101--1109}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(99)00041-9}, doi = {10.1016/S1389-1286(99)00041-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JakobssonMS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/JakobssonS99, author = {Markus Jakobsson and Claus{-}Peter Schnorr}, editor = {Bart Preneel}, title = {Efficient Oblivious Proofs of Correct Exponentiation}, booktitle = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, pages = {71--86}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 12:00:15 +0200}, biburl = {https://dblp.org/rec/conf/cms/JakobssonS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/JakobssonJ99, author = {Markus Jakobsson and Ari Juels}, editor = {Bart Preneel}, title = {Proofs of Work and Bread Pudding Protocols}, booktitle = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, pages = {258--272}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/JakobssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqre/JakobssonMTY99, author = {Markus Jakobsson and David M'Ra{\"{\i}}hi and Yiannis Tsiounis and Moti Yung}, editor = {Rainer Baumgart}, title = {Electronic Payments: Where Do We Go from Here?}, booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition and Congress D{\"{u}}sseldorf, Germany, November 30 - December 2, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1740}, pages = {43--63}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46701-7\_4}, doi = {10.1007/3-540-46701-7\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cqre/JakobssonMTY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayJM99, author = {Juan A. Garay and Markus Jakobsson and Philip D. MacKenzie}, editor = {Michael J. Wiener}, title = {Abuse-Free Optimistic Contract Signing}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {449--466}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_29}, doi = {10.1007/3-540-48405-1\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayJM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonM99, author = {Markus Jakobsson and Joy M{\"{u}}ller}, editor = {Matthew K. Franklin}, title = {Improved Magic Ink Signatures Using Hints}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {253--268}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_19}, doi = {10.1007/3-540-48390-X\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JakobssonSY99, author = {Markus Jakobsson and Julien P. Stern and Moti Yung}, editor = {Lars R. Knudsen}, title = {Scramble All, Encrypt Small}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {95--111}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_8}, doi = {10.1007/3-540-48519-8\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JakobssonSY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jakobsson99, author = {Markus Jakobsson}, editor = {Hideki Imai and Yuliang Zheng}, title = {On Quorum Controlled Asymmetric Proxy Re-encryption}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {112--121}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_9}, doi = {10.1007/3-540-49162-7\_9}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Jakobsson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Jakobsson99a, author = {Markus Jakobsson}, editor = {Hideki Imai and Yuliang Zheng}, title = {Mini-Cash: {A} Minimalistic Approach to E-Commerce}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {122--135}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_10}, doi = {10.1007/3-540-49162-7\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Jakobsson99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Jakobsson99, author = {Markus Jakobsson}, editor = {Brian A. Coan and Jennifer L. Welch}, title = {Flash Mixing}, booktitle = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6, 1999}, pages = {83--89}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301308.301333}, doi = {10.1145/301308.301333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Jakobsson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/CrescenzoFIJ99, author = {Giovanni Di Crescenzo and Niels Ferguson and Russell Impagliazzo and Markus Jakobsson}, editor = {Christoph Meinel and Sophie Tison}, title = {How to Forget a Secret}, booktitle = {{STACS} 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1563}, pages = {500--509}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49116-3\_47}, doi = {10.1007/3-540-49116-3\_47}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/stacs/CrescenzoFIJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98, author = {Markus Jakobsson and Elizabeth A. M. Shriver and Bruce Hillyer and Ari Juels}, editor = {Li Gong and Michael K. Reiter}, title = {A Practical Secure Physical Random Bit Generator}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {103--111}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288114}, doi = {10.1145/288090.288114}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jakobsson98, author = {Markus Jakobsson}, editor = {Kaisa Nyberg}, title = {A Practical Mix}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {448--461}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054145}, doi = {10.1007/BFB0054145}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jakobsson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonJ98, author = {Markus Jakobsson and Ari Juels}, editor = {Rafael Hirschfeld}, title = {X-Cash: Executable Digital Cash}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {16--27}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055470}, doi = {10.1007/BFB0055470}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonY98, author = {Markus Jakobsson and Moti Yung}, editor = {Rafael Hirschfeld}, title = {On Assurance Structures for {WWW} Commerce}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {141--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055478}, doi = {10.1007/BFB0055478}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GabberJMM98, author = {Eran Gabber and Markus Jakobsson and Yossi Matias and Alain J. Mayer}, editor = {Rafael Hirschfeld}, title = {Curbing Junk E-Mail via Secure Classification}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {198--213}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055484}, doi = {10.1007/BFB0055484}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GabberJMM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JakobssonM98, author = {Markus Jakobsson and David M'Ra{\"{\i}}hi}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Mix-Based Electronic Payments}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {157--173}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_13}, doi = {10.1007/3-540-48892-8\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JakobssonM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HerzbergJJKY97, author = {Amir Herzberg and Markus Jakobsson and Stanislaw Jarecki and Hugo Krawczyk and Moti Yung}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {Proactive Public Key and Signature Systems}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {100--110}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266442}, doi = {10.1145/266420.266442}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HerzbergJJKY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareJY97, author = {Mihir Bellare and Markus Jakobsson and Moti Yung}, editor = {Walter Fumy}, title = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {280--305}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_20}, doi = {10.1007/3-540-69053-0\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareJY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JakobssonY97, author = {Markus Jakobsson and Moti Yung}, editor = {Walter Fumy}, title = {Distributed "Magic Ink" Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {450--464}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_31}, doi = {10.1007/3-540-69053-0\_31}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JakobssonY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonY97, author = {Markus Jakobsson and Moti Yung}, editor = {Rafael Hirschfeld}, title = {Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {217--238}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_80}, doi = {10.1007/3-540-63594-7\_80}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJY97, author = {Mihir Bellare and Markus Jakobsson and Moti Yung}, title = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {1997}, url = {http://eprint.iacr.org/1997/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonY96, author = {Markus Jakobsson and Moti Yung}, editor = {Li Gong and Jacques Stearn}, title = {Revokable and Versatile Electronic Money (extended abstract)}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {76--87}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238191}, doi = {10.1145/238168.238191}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JakobssonY96, author = {Markus Jakobsson and Moti Yung}, editor = {Neal Koblitz}, title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {186--200}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_15}, doi = {10.1007/3-540-68697-5\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JakobssonY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JakobssonSI96, author = {Markus Jakobsson and Kazue Sako and Russell Impagliazzo}, editor = {Ueli M. Maurer}, title = {Designated Verifier Proofs and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {143--154}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_13}, doi = {10.1007/3-540-68339-9\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JakobssonSI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jakobsson95, author = {Markus Jakobsson}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Ripping Coins For a Fair Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {220--230}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_18}, doi = {10.1007/3-540-49264-X\_18}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jakobsson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jakobsson94, author = {Markus Jakobsson}, editor = {Alfredo De Santis}, title = {Blackmailing using Undeniable Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {425--427}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053457}, doi = {10.1007/BFB0053457}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jakobsson94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.