dblp.uni-trier.dewww.uni-trier.de

Markus Jakobsson Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2008
93EEMarkus Jakobsson, Erik Stolterman, Susanne Wetzel, Liu Yang: Love and authentication. CHI 2008: 197-200
92EEMarkus Jakobsson, Liu Yang, Susanne Wetzel: Quantifying the security of preference-based authentication. Digital Identity Management 2008: 61-70
91EERichard Chow, Philippe Golle, Markus Jakobsson, Lusha Wang, XiaoFeng Wang: Making CAPTCHAs clickable. HotMobile 2008: 91-94
90EESukamol Srikwan, Markus Jakobsson: Using Cartoons to Teach Internet Security. Cryptologia 32(2): 137-154 (2008)
89EEMarkus Jakobsson, Peter Finn, Nathaniel A. Johnson: Why and How to Perform Fraud Experiments. IEEE Security & Privacy 6(2): 66-68 (2008)
88EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. IJACT 1(1): 47-59 (2008)
2007
87EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. Digital Identity Management 2007: 17-26
86EEMarkus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim: What Instills Trust? A Qualitative Study of Phishing. Financial Cryptography 2007: 356-361
85EEVivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad: Phishing IQ Tests Measure Fear, Not Ability. Financial Cryptography 2007: 362-366
84EESid Stamm, Zulfikar Ramzan, Markus Jakobsson: Drive-By Pharming. ICICS 2007: 495-506
83EETom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer: Social phishing. Commun. ACM 50(10): 94-100 (2007)
82EEMarkus Jakobsson, Sid Stamm: Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks. IEEE Security & Privacy 5(6): 16-24 (2007)
81EEMarkus Jakobsson, Steven Myers: Delayed password disclosure. SIGACT News 38(3): 56-75 (2007)
2006
80EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44
79EEJong Youl Choi, Philippe Golle, Markus Jakobsson: Auditable Privacy: On Tamper-Evident Mix Networks. Financial Cryptography 2006: 126-141
78EEPhilippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow: Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. IEEE Symposium on Security and Privacy 2006: 121-131
77EEAri Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305
76EEMarkus Jakobsson, Jacob Ratkiewicz: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. WWW 2006: 513-522
75EEMarkus Jakobsson, Sid Stamm: Invasive browser sniffing and countermeasures. WWW 2006: 523-532
74EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006)
73EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. J. Cryptology 19(1): 27-66 (2006)
72EEMona Gandhi, Markus Jakobsson, Jacob Ratkiewicz: Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. J. Digital Forensic Practice 1(2): 131-142 (2006)
71EEAlex Tsow, Markus Jakobsson, Liu Yang, Susanne Wetzel: Warkitting: The Drive-by Subversion of Wireless Home Routers. J. Digital Forensic Practice 1(3): 179-192 (2006)
2005
70 Markus Jakobsson, Radha Poovendran: Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 ACM 2005
69EEMarkus Jakobsson, Liu Yang: Quantifying Security in Hybrid Cellular Networks. ACNS 2005: 350-363
68EEYih-Chun Hu, Markus Jakobsson, Adrian Perrig: Efficient Constructions for One-Way Hash Chains. ACNS 2005: 423-441
67EEVirgil Griffith, Markus Jakobsson: Messin' with Texas Deriving Mother's Maiden Names Using Public Records. ACNS 2005: 91-103
66EERichard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo: A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88
65EEMarkus Jakobsson: Modeling and Preventing Phishing Attacks. Financial Cryptography 2005: 89
64EEOleksiy Mazhelis, Jouni Markkula, Markus Jakobsson: Specifying Patterns for Mobile Application Domain Using General Architectural Components. PROFES 2005: 157-172
63EEJong Youl Choi, Markus Jakobsson, Susanne Wetzel: Balancing auditability and privacy in vehicular networks. Q2SWinet 2005: 79-87
62EEAri Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70
61EENaouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment. Mobile Computing and Communications Review 9(3): 69-81 (2005)
2004
60 Markus Jakobsson, Adrian Perrig: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 ACM 2004
59 Markus Jakobsson, Moti Yung, Jianying Zhou: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Springer 2004
58EEPhilippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178
57EEAndris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques. Public Key Cryptography 2004: 425-438
56EEMarkus Jakobsson, XiaoFeng Wang, Susanne Wetzel: Stealth attacks in vehicular technologies. VTC Fall (2) 2004: 1218-1222
55EEMarkus Jakobsson, Susanne Wetzel: Efficient attribute authentication with applications to ad hoc networks. Vehicular Ad Hoc Networks 2004: 38-46
54EENaouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson: Reputation-based Wi-Fi deployment protocols and security analysis. WMASH 2004: 29-40
2003
53EEMarkus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo: Fractal Merkle Tree Representation and Traversal. CT-RSA 2003: 314-326
52EEMarkus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33
51EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24
50EEPhilippe Golle, Markus Jakobsson: Reusable anonymous return channels. WPES 2003: 94-100
49EEAndris Ambainis, Markus Jakobsson, Helger Lipmaa: Cryptographic Randomized Response Techniques CoRR cs.CC/0302025: (2003)
48EEMarkus Jakobsson, Filippo Menczer: Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service CoRR cs.CY/0305042: (2003)
2002
47EEFilippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson: IntelliShopper: a proactive, personal, private shopping assistant. AAMAS 2002: 1001-1008
46EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
45EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. CRYPTO 2002: 385-400
44EEMarkus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181
43EEAlexandra Boldyreva, Markus Jakobsson: Theft-Protected Proprietary Certificates. Digital Rights Management Workshop 2002: 208-220
42EEDon Coppersmith, Markus Jakobsson: Almost Optimal Hash Sequence Traversal. Financial Cryptography 2002: 102-119
41EEJuan A. Garay, Markus Jakobsson: Timed Release of Standard Digital Signatures. Financial Cryptography 2002: 168-182
40EEMarkus Jakobsson: Financial Instruments in Recommendation Mechanisms. Financial Cryptography 2002: 31-43
39EEMarkus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353
2001
38EEMarkus Jakobsson, David Pointcheval, Adam Young: Secure Mobile Gambling. CT-RSA 2001: 110-125
37EEMarkus Jakobsson, Susanne Wetzel: Security Weaknesses in Bluetooth. CT-RSA 2001: 176-191
36EEMarkus Jakobsson, Michael K. Reiter: Discouraging Software Piracy Using Software Aging. Digital Rights Management Workshop 2001: 1-12
35EEMarkus Jakobsson, David Pointcheval: Mutual Authentication for Low-Power Mobile Devices. Financial Cryptography 2001: 169-186
34EEMarkus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292
33EEMarkus Jakobsson, Susanne Wetzel: Secure Server-Aided Signature Generation. Public Key Cryptography 2001: 383-401
2000
32EERobert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter: Privacy-preserving global customization. ACM Conference on Electronic Commerce 2000: 176-184
31EEMarkus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177
30EEMarkus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358
29EEClaus-Peter Schnorr, Markus Jakobsson: Security of Signed ElGamal Encryption. ASIACRYPT 2000: 73-89
28 Philip Bohannon, Markus Jakobsson, Sukamol Srikwan: Cryptographic Approaches to Provacy in Forensic DNA Databases. Public Key Cryptography 2000: 373-390
27 Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000)
1999
26EEMarkus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung: Electronic Payments: Where Do We Go from Here?. CQRE 1999: 43-63
25EEJuan A. Garay, Markus Jakobsson, Philip D. MacKenzie: Abuse-Free Optimistic Contract Signing. CRYPTO 1999: 449-466
24 Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272
23 Markus Jakobsson, Claus-Peter Schnorr: Efficient Oblivious Proofs of Correct Exponentiation. Communications and Multimedia Security 1999: 71-86
22EEMarkus Jakobsson, Julien P. Stern, Moti Yung: Scramble All, Encrypt Small. FSE 1999: 95-111
21EEMarkus Jakobsson, Joy Müller: Improved Magic Ink Signatures Using Hints. Financial Cryptography 1999: 253-268
20EEMarkus Jakobsson: Flash Mixing. PODC 1999: 83-89
19EEMarkus Jakobsson: On Quorum Controlled Asymmetric Proxy Re-encryption. Public Key Cryptography 1999: 112-121
18EEMarkus Jakobsson: Mini-Cash: A Minimalistic Approach to E-Commerce. Public Key Cryptography 1999: 122-135
17EEGiovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, Markus Jakobsson: How to Forget a Secret. STACS 1999: 500-509
16EEMarkus Jakobsson, Philip D. MacKenzie, Julien P. Stern: Secure and Lightweight Advertising on the Web. Computer Networks 31(11-16): 1101-1109 (1999)
1998
15EEMarkus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111
14EEMarkus Jakobsson: A Practical Mix. EUROCRYPT 1998: 448-461
13EEMarkus Jakobsson, Moti Yung: On Assurance Structures for WWW Commerce. Financial Cryptography 1998: 141-157
12EEMarkus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27
11EEEran Gabber, Markus Jakobsson, Yossi Matias, Alain J. Mayer: Curbing Junk E-Mail via Secure Classification. Financial Cryptography 1998: 198-213
10EEMarkus Jakobsson, David M'Raïhi: Mix-Based Electronic Payments. Selected Areas in Cryptography 1998: 157-173
1997
9EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
8EEMihir Bellare, Markus Jakobsson, Moti Yung: Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. EUROCRYPT 1997: 280-305
7EEMarkus Jakobsson, Moti Yung: Distributed "Magic Ink" Signatures. EUROCRYPT 1997: 450-464
6 Markus Jakobsson, Moti Yung: Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. Financial Cryptography 1997: 217-238
1996
5EEMarkus Jakobsson, Moti Yung: Revokable and Versatile Electronic Money (extended abstract). ACM Conference on Computer and Communications Security 1996: 76-87
4EEMarkus Jakobsson, Moti Yung: Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. CRYPTO 1996: 186-200
3EEMarkus Jakobsson, Kazue Sako, Russell Impagliazzo: Designated Verifier Proofs and Their Applications. EUROCRYPT 1996: 143-154
1995
2EEMarkus Jakobsson: Ripping Coins For a Fair Exchange. EUROCRYPT 1995: 220-230
1994
1EEMarkus Jakobsson: Blackmailing using Undeniable Signatures. EUROCRYPT 1994: 425-427

Coauthor Index

1Andris Ambainis [49] [57]
2Vivek Anandpara [85]
3Robert M. Arlein [32]
4Mihir Bellare [8]
5Eli Blevis [86]
6Philip Bohannon [28]
7Alexandra Boldyreva [43]
8Dan Boneh [46]
9Levente Buttyán [51] [52] [74]
10Dario Catalano [62]
11Jong Youl Choi [63] [79] [80]
12Richard Chow [91]
13Richard Clayton [66]
14Don Coppersmith [42]
15Giovanni Di Crescenzo [17]
16Drew Dean [66]
17Andrew Dingman [85]
18Niels Ferguson [17]
19Peter Finn [89]
20Eran Gabber [11]
21Mona Gandhi [72]
22Juan A. Garay [25] [41]
23Philippe Golle [46] [50] [58] [78] [79] [80] [91]
24Virgil Griffith [67]
25Amir Herzberg [9]
26Bruce Hillyer [15] [27]
27Yih-Chun Hu [68]
28Jean-Pierre Hubaux [51] [52] [54] [61] [74]
29Russell Impagliazzo [3] [17]
30Tom N. Jagatic [77] [83]
31Ben Jai [32]
32Stanislaw Jarecki [9]
33Nathaniel A. Johnson [83] [89]
34Ari Juels [12] [15] [24] [27] [30] [31] [34] [39] [44] [46] [58] [62] [77]
35Hugo Krawczyk [9]
36Frank Thomson Leighton (Tom Leighton) [53]
37Youn-Kyung Lim [86]
38Helger Lipmaa [49] [57]
39Debin Liu [85]
40David M'Raïhi [10] [26]
41Philip D. MacKenzie [16] [25] [45] [73]
42Jouni Markkula [64]
43Yossi Matias [11]
44Alain J. Mayer [11]
45Oleksiy Mazhelis [64]
46Filippo Menczer [47] [48] [83]
47Silvio Micali [53]
48Alvaro E. Monge [47]
49Fabian Monrose [32]
50Joy Müller [21]
51Steven Myers [66] [81] [87] [88]
52Phong Q. Nguyen [44]
53Adrian Perrig [60] [68]
54David Pointcheval [35] [38]
55Radha Poovendran [70]
56Zulfikar Ramzan [84]
57Jacob Ratkiewicz [72] [76]
58Michael K. Reiter [32] [36]
59Ronald L. Rivest [39]
60Heather Roinestad [85]
61Kazue Sako [3]
62Naouel Ben Salem [51] [54] [61] [74]
63Claus-Peter Schnorr [23] [29]
64Ankur Shah [86]
65Thomas Shrimpton [45] [73]
66Elizabeth A. M. Shriver [15] [27]
67Sukamol Srikwan [28] [90]
68Sid Stamm [75] [82] [84]
69Julien P. Stern [16] [22]
70Erik Stolterman [93]
71W. Nick Street [47]
72Stuart G. Stubblebine [66]
73Paul F. Syverson [58]
74Michael Szydlo [53] [66]
75Yiannis Tsiounis [26]
76Alex Tsow [71] [78] [86]
77Narayan Vishwakarma [47]
78Lusha Wang [91]
79XiaoFeng Wang [56] [78] [91]
80Susanne Wetzel [33] [37] [55] [56] [63] [71] [92] [93]
81Liu Yang [69] [71] [92] [93]
82Adam L. Young (Adam Young) [38]
83Moti Yung (Mordechai M. Yung) [4] [5] [6] [7] [8] [9] [13] [22] [26] [59]
84Sheng Zhong [46]
85Jianying Zhou [59]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)