default search action
Markus Jakobsson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j22]Markus Jakobsson:
Permissions and Privacy. IEEE Secur. Priv. 18(2): 46-55 (2020) - [i14]Markus Jakobsson:
Social Engineering Resistant 2FA. CoRR abs/2001.06075 (2020)
2010 – 2019
- 2019
- [j21]Markus Jakobsson:
The Rising Threat of Launchpad Attacks. IEEE Secur. Priv. 17(5): 68-72 (2019) - [j20]Jay Koven, Cristian Felix, Hossein Siadati, Markus Jakobsson, Enrico Bertini:
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities. IEEE Trans. Vis. Comput. Graph. 25(1): 225-234 (2019) - 2018
- [i13]Markus Jakobsson:
Secure Remote Attestation. IACR Cryptol. ePrint Arch. 2018: 31 (2018) - 2017
- [j19]Hossein Siadati, Toan Nguyen, Payas Gupta, Markus Jakobsson, Nasir D. Memon:
Mind your SMSes: Mitigating social engineering in second factor authentication. Comput. Secur. 65: 14-28 (2017) - [c97]Mayank Dhiman, Markus Jakobsson, Ting-Fang Yen:
Breaking and fixing content-based filtering. eCrime 2017: 52-56 - [c96]Markus Jakobsson:
Short Paper: Addressing Sophisticated Email Attacks. Financial Cryptography 2017: 310-317 - [e6]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - 2016
- [c95]Markus Jakobsson, Hossein Siadati:
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention. The New Codebreakers 2016: 177-194 - [c94]Markus Jakobsson:
User trust assessment: a new approach to combat deception. STAST 2016: 73-78 - [p12]Markus Jakobsson:
Scams and Targeting. Understanding Social Engineering Based Scams 2016: 1-3 - [p11]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Identifying Scams and Trends. Understanding Social Engineering Based Scams 2016: 7-19 - [p10]Ting-Fang Yen, Markus Jakobsson:
Predicting Trends. Understanding Social Engineering Based Scams 2016: 21-25 - [p9]Ana Ferreira, Markus Jakobsson:
Persuasion in Scams. Understanding Social Engineering Based Scams 2016: 29-47 - [p8]Hossein Siadati, Sima Jafarikhah, Markus Jakobsson:
Traditional Countermeasures to Unwanted Email. Understanding Social Engineering Based Scams 2016: 51-62 - [p7]Mayank Dhiman, Ting-Fang Yen, Markus Jakobsson:
Obfuscation in Spam and Scam. Understanding Social Engineering Based Scams 2016: 63-68 - [p6]Markus Jakobsson:
Semantic Analysis of Messages. Understanding Social Engineering Based Scams 2016: 69-74 - [p5]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Sales Scams. Understanding Social Engineering Based Scams 2016: 77-87 - [p4]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Rental Scams. Understanding Social Engineering Based Scams 2016: 89-102 - [p3]Ting-Fang Yen, Markus Jakobsson:
Case Study: Romance Scams. Understanding Social Engineering Based Scams 2016: 103-113 - [p2]Markus Jakobsson:
Case Study: Business Email Compromise. Understanding Social Engineering Based Scams 2016: 115-122 - [p1]Markus Jakobsson:
Conclusion and Next Steps. Understanding Social Engineering Based Scams 2016: 125-127 - [e5]Markus Jakobsson:
Understanding Social Engineering Based Scams. Springer 2016, ISBN 978-1-4939-6455-0 [contents] - 2014
- [j18]Martina Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean Camp:
Helping You Protect You. IEEE Secur. Priv. 12(1): 39-42 (2014) - [c93]Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. NDSS 2014 - [c92]Napa Sae-Bae, Markus Jakobsson:
Hand authentication on multi-touch tablets. HotMobile 2014: 8:1-8:6 - 2013
- [b1]Markus Jakobsson:
Mobile Authentication - Problems and Solutions. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-4877-8, pp. i-xiv, 1-113 - 2012
- [j17]Dirk Balfanz, Richard Chow, Ori Eisen, Markus Jakobsson, Steve Kirsch, Scott Matsumoto, Jesus Molina, Paul C. van Oorschot:
The Future of Authentication. IEEE Secur. Priv. 10(1): 22-27 (2012) - [c91]Markus Jakobsson, Hossein Siadati:
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention. STAST 2012: 3-10 - [c90]Markus Jakobsson, Hossein Siadati:
Improved Visual Preference Authentication. STAST 2012: 27-34 - [c89]Markus Jakobsson, Mayank Dhiman:
The Benefits of Understanding Passwords. HotSec 2012 - 2010
- [j16]XiaoFeng Wang, Philippe Golle, Markus Jakobsson, Alex Tsow:
Deterring voluntary trace disclosure in re-encryption mix-networks. ACM Trans. Inf. Syst. Secur. 13(2): 18:1-18:24 (2010) - [c88]Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song:
Authentication in the clouds: a framework and its application to mobile users. CCSW 2010: 1-6 - [c87]Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:
Implicit Authentication through Learning User Behavior. ISC 2010: 99-113 - [c86]Markus Jakobsson, Karl-Anders Johansson:
Retroactive Detection of Malware with Applications to Mobile Platforms. HotSec 2010 - [c85]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. Towards Trustworthy Elections 2010: 37-63 - [e4]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida:
Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7 [contents] - [r1]Markus Jakobsson, Sid Stamm, Christopher Soghoian:
Phishing. Handbook of Financial Cryptography and Security 2010: 301-339
2000 – 2009
- 2009
- [c84]Markus Jakobsson:
Captcha-free throttling. AISec 2009: 15-22 - [c83]Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina:
Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009: 85-90 - [c82]Markus Jakobsson, Ari Juels:
Server-side detection of malware infection. NSPW 2009: 11-22 - 2008
- [j15]Sukamol Srikwan, Markus Jakobsson:
Using Cartoons to Teach Internet Security. Cryptologia 32(2): 137-154 (2008) - [j14]Markus Jakobsson, Peter Finn, Nathaniel A. Johnson:
Why and How to Perform Fraud Experiments. IEEE Secur. Priv. 6(2): 66-68 (2008) - [j13]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. Int. J. Appl. Cryptogr. 1(1): 47-59 (2008) - [c81]Markus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang:
Love and authentication. CHI 2008: 197-200 - [c80]Markus Jakobsson, Liu Yang, Susanne Wetzel:
Quantifying the security of preference-based authentication. Digital Identity Management 2008: 61-70 - [c79]Christopher Soghoian, Oliver Friedrichs, Markus Jakobsson:
The Threat of Political Phishing. HAISA 2008: 126-143 - [c78]Richard Chow, Philippe Golle, Markus Jakobsson, Lusha Wang, XiaoFeng Wang:
Making CAPTCHAs clickable. HotMobile 2008: 91-94 - 2007
- [j12]Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer:
Social phishing. Commun. ACM 50(10): 94-100 (2007) - [j11]Markus Jakobsson, Sid Stamm:
Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks. IEEE Secur. Priv. 5(6): 16-24 (2007) - [j10]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. SIGACT News 38(3): 56-75 (2007) - [j9]Peter Finn, Markus Jakobsson:
Designing ethical phishing experiments. IEEE Technol. Soc. Mag. 26(1): 46-58 (2007) - [c77]Jeffrey Bardzell, Markus Jakobsson, Shaowen Bardzell, Tyler Pace, Will Odom, Aaron R. Houssian:
Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games. DiGRA Conference 2007 - [c76]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. Digital Identity Management 2007: 17-26 - [c75]Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim:
What Instills Trust? A Qualitative Study of Phishing. Financial Cryptography 2007: 356-361 - [c74]Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad:
Phishing IQ Tests Measure Fear, Not Ability. Financial Cryptography 2007: 362-366 - [c73]Sid Stamm, Zulfikar Ramzan, Markus Jakobsson:
Drive-By Pharming. ICICS 2007: 495-506 - [c72]Ari Juels, Sid Stamm, Markus Jakobsson:
Combating Click Fraud via Premium Clicks. USENIX Security Symposium 2007 - 2006
- [j8]Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz:
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. J. Digit. Forensic Pract. 1(2): 131-142 (2006) - [j7]Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel:
Warkitting: The Drive-by Subversion of Wireless Home Routers. J. Digit. Forensic Pract. 1(3): 179-192 (2006) - [j6]Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson:
Threshold Password-Authenticated Key Exchange. J. Cryptol. 19(1): 27-66 (2006) - [j5]Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson:
Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006) - [c71]Sukamol Srikwan, Markus Jakobsson, Andrew Albrecht, Mehmet M. Dalkilic:
Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems. CollaborateCom 2006 - [c70]Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44 - [c69]Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Auditable Privacy: On Tamper-Evident Mix Networks. Financial Cryptography 2006: 126-141 - [c68]Jiejun Kong, Ling-Jyh Chen, Markus Jakobsson, Stan Moyer, Dave Marples, Mario Gerla:
An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions. ICC 2006: 2351-2356 - [c67]Liu Yang, Markus Jakobsson, Susanne Wetzel:
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks. SecureComm 2006: 1-10 - [c66]Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. S&P 2006: 121-131 - [c65]Ari Juels, Markus Jakobsson, Tom N. Jagatic:
Cache Cookies for Browser Authentication (Extended Abstract). S&P 2006: 301-305 - [c64]Markus Jakobsson, Jacob Ratkiewicz:
Designing ethical phishing experiments: a study of (ROT13) rOnl query features. WWW 2006: 513-522 - [c63]Markus Jakobsson, Sid Stamm:
Invasive browser sniffing and countermeasures. WWW 2006: 523-532 - 2005
- [j4]Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson:
Reputation-based Wi-Fi deployment. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(3): 69-81 (2005) - [c62]Virgil Griffith, Markus Jakobsson:
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. ACNS 2005: 91-103 - [c61]Markus Jakobsson, Liu Yang:
Quantifying Security in Hybrid Cellular Networks. ACNS 2005: 350-363 - [c60]Yih-Chun Hu, Markus Jakobsson, Adrian Perrig:
Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441 - [c59]Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:
A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88 - [c58]Markus Jakobsson:
Modeling and Preventing Phishing Attacks. Financial Cryptography 2005: 89 - [c57]Jong Youl Choi, Markus Jakobsson, Susanne Wetzel:
Balancing auditability and privacy in vehicular networks. Q2SWinet 2005: 79-87 - [c56]Oleksiy Mazhelis, Jouni Markkula, Markus Jakobsson:
Specifying Patterns for Mobile Application Domain Using General Architectural Components. PROFES 2005: 157-172 - [c55]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-resistant electronic elections. WPES 2005: 61-70 - [e3]Markus Jakobsson, Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005. ACM 2005, ISBN 1-59593-142-2 [contents] - [i12]Markus Jakobsson, Adam L. Young:
Distributed Phishing Attacks. IACR Cryptol. ePrint Arch. 2005: 91 (2005) - [i11]Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware. IACR Cryptol. ePrint Arch. 2005: 147 (2005) - [i10]Sid Stamm, Markus Jakobsson:
Privacy-Preserving Polling using Playing Cards. IACR Cryptol. ePrint Arch. 2005: 444 (2005) - 2004
- [c54]Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson:
Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 - [c53]Markus Jakobsson, Susanne Wetzel:
Efficient attribute authentication with applications to ad hoc networks. Vehicular Ad Hoc Networks 2004: 38-46 - [c52]Andris Ambainis, Markus Jakobsson, Helger Lipmaa:
Cryptographic Randomized Response Techniques. Public Key Cryptography 2004: 425-438 - [c51]Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel:
Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222 - [c50]Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson:
Reputation-based Wi-Fi deployment protocols and security analysis. WMASH 2004: 29-40 - [e2]Markus Jakobsson, Moti Yung, Jianying Zhou:
Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Lecture Notes in Computer Science 3089, Springer 2004, ISBN 3-540-22217-0 [contents] - [e1]Markus Jakobsson, Adrian Perrig:
Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004. ACM 2004, ISBN 1-58113-925-X [contents] - 2003
- [j3]Markus Jakobsson, Filippo Menczer:
Untraceable Email Cluster Bombs. login Usenix Mag. 28(6) (2003) - [c49]Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo:
Fractal Merkle Tree Representation and Traversal. CT-RSA 2003: 314-326 - [c48]Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán:
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33 - [c47]Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson:
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24 - [c46]Philippe Golle, Markus Jakobsson:
Reusable anonymous return channels. WPES 2003: 94-100 - [i9]Andris Ambainis, Markus Jakobsson, Helger Lipmaa:
Cryptographic Randomized Response Techniques. CoRR cs.CC/0302025 (2003) - [i8]Markus Jakobsson, Filippo Menczer:
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service. CoRR cs.CY/0305042 (2003) - [i7]Andris Ambainis, Markus Jakobsson, Helger Lipmaa:
Cryptographic Randomized Response Techniques. IACR Cryptol. ePrint Arch. 2003: 27 (2003) - [i6]Markus Jakobsson, John Linn, Joy Algesheimer:
How to Protect Against a Militant Spammer. IACR Cryptol. ePrint Arch. 2003: 71 (2003) - 2002
- [c45]Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:
Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 - [c44]Filippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson:
IntelliShopper: a proactive, personal, private shopping assistant. AAMAS 2002: 1001-1008 - [c43]Alexandra Boldyreva, Markus Jakobsson:
Theft-Protected Proprietary Certificates. Digital Rights Management Workshop 2002: 208-220 - [c42]Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson:
Threshold Password-Authenticated Key Exchange. CRYPTO 2002: 385-400 - [c41]Markus Jakobsson, Ari Juels, Phong Q. Nguyen:
Proprietary Certificates. CT-RSA 2002: 164-181 - [c40]Markus Jakobsson:
Financial Instruments in Recommendation Mechanisms. Financial Cryptography 2002: 31-43 - [c39]Don Coppersmith, Markus Jakobsson:
Almost Optimal Hash Sequence Traversal. Financial Cryptography 2002: 102-119 - [c38]Juan A. Garay, Markus Jakobsson:
Timed Release of Standard Digital Signatures. Financial Cryptography 2002: 168-182 - [c37]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 - [i5]Markus Jakobsson:
Fractal Hash Sequence Representation and Traversal. IACR Cryptol. ePrint Arch. 2002: 1 (2002) - [i4]Don Coppersmith, Markus Jakobsson:
Almost Optimal Hash Sequence Traversal. IACR Cryptol. ePrint Arch. 2002: 23 (2002) - [i3]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. IACR Cryptol. ePrint Arch. 2002: 25 (2002) - [i2]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. IACR Cryptol. ePrint Arch. 2002: 165 (2002) - 2001
- [c36]Markus Jakobsson, Michael K. Reiter:
Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12 - [c35]Markus Jakobsson, David Pointcheval, Adam L. Young:
Secure Mobile Gambling. CT-RSA 2001: 110-125 - [c34]Markus Jakobsson, Susanne Wetzel:
Security Weaknesses in Bluetooth. CT-RSA 2001: 176-191 - [c33]Markus Jakobsson, David Pointcheval:
Mutual Authentication for Low-Power Mobile Devices. Financial Cryptography 2001: 169-186 - [c32]Markus Jakobsson, Susanne Wetzel:
Secure Server-Aided Signature Generation. Public Key Cryptography 2001: 383-401 - [c31]Markus Jakobsson, Ari Juels:
An optimally robust hybrid mix network. PODC 2001: 284-292 - 2000
- [j2]Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer:
How to turn loaded dice into fair coins. IEEE Trans. Inf. Theory 46(3): 911-921 (2000) - [c30]Claus-Peter Schnorr, Markus Jakobsson:
Security of Signed ElGamal Encryption. ASIACRYPT 2000: 73-89 - [c29]