|
Search the dblp DataBase
Markus Jakobsson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Virgil Griffith, Markus Jakobsson
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:91-103 [Conf]
- Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:423-441 [Conf]
- Markus Jakobsson, Liu Yang
Quantifying Security in Hybrid Cellular Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:350-363 [Conf]
- Markus Jakobsson, Ari Juels
Mix and Match: Secure Function Evaluation via Ciphertexts. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:162-177 [Conf]
- Markus Jakobsson, Ari Juels
Addition of ElGamal Plaintexts. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:346-358 [Conf]
- Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:451-465 [Conf]
- Claus-Peter Schnorr, Markus Jakobsson
Security of Signed ElGamal Encryption. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:73-89 [Conf]
- Filippo Menczer, W. Nick Street, Narayan Vishwakarma, Alvaro E. Monge, Markus Jakobsson
IntelliShopper: a proactive, personal, private shopping assistant. [Citation Graph (0, 0)][DBLP] AAMAS, 2002, pp:1001-1008 [Conf]
- Alexandra Boldyreva, Markus Jakobsson
Theft-Protected Proprietary Certificates. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:208-220 [Conf]
- Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
- Markus Jakobsson, Michael K. Reiter
Discouraging Software Piracy Using Software Aging. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2001, pp:1-12 [Conf]
- Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels
A Practical Secure Physical Random Bit Generator. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1998, pp:103-111 [Conf]
- Markus Jakobsson, Moti Yung
Revokable and Versatile Electronic Money (extended abstract). [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:76-87 [Conf]
- Markus Jakobsson, Ari Juels
Proofs of Work and Bread Pudding Protocols. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:258-272 [Conf]
- Markus Jakobsson, Claus-Peter Schnorr
Efficient Oblivious Proofs of Correct Exponentiation. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:71-86 [Conf]
- Markus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung
Electronic Payments: Where Do We Go from Here?. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:43-63 [Conf]
- Juan A. Garay, Markus Jakobsson, Philip D. MacKenzie
Abuse-Free Optimistic Contract Signing. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:449-466 [Conf]
- Markus Jakobsson, Moti Yung
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers. [Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:186-200 [Conf]
- Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson
Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] CRYPTO, 2002, pp:385-400 [Conf]
- Markus Jakobsson, David Pointcheval, Adam Young
Secure Mobile Gambling. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:110-125 [Conf]
- Markus Jakobsson, Susanne Wetzel
Security Weaknesses in Bluetooth. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:176-191 [Conf]
- Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson
Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:163-178 [Conf]
- Markus Jakobsson, Ari Juels, Phong Q. Nguyen
Proprietary Certificates. [Citation Graph (0, 0)][DBLP] CT-RSA, 2002, pp:164-181 [Conf]
- Markus Jakobsson, Frank Thomson Leighton, Silvio Micali, Michael Szydlo
Fractal Merkle Tree Representation and Traversal. [Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:314-326 [Conf]
- Jong Youl Choi, Philippe Golle, Markus Jakobsson
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. [Citation Graph (0, 0)][DBLP] DASC, 2006, pp:37-44 [Conf]
- Mihir Bellare, Markus Jakobsson, Moti Yung
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1997, pp:280-305 [Conf]
- Markus Jakobsson
Blackmailing using Undeniable Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:425-427 [Conf]
- Markus Jakobsson
Ripping Coins For a Fair Exchange. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:220-230 [Conf]
- Markus Jakobsson
A Practical Mix. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:448-461 [Conf]
- Markus Jakobsson, Kazue Sako, Russell Impagliazzo
Designated Verifier Proofs and Their Applications. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:143-154 [Conf]
- Markus Jakobsson, Moti Yung
Distributed "Magic Ink" Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1997, pp:450-464 [Conf]
- Markus Jakobsson
Modeling and Preventing Phishing Attacks. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:89- [Conf]
- Markus Jakobsson
Financial Instruments in Recommendation Mechanisms. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:31-43 [Conf]
- Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2003, pp:15-33 [Conf]
- Markus Jakobsson, Ari Juels
X-Cash: Executable Digital Cash. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:16-27 [Conf]
- Markus Jakobsson, Joy Müller
Improved Magic Ink Signatures Using Hints. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:253-268 [Conf]
- Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:88- [Conf]
- Don Coppersmith, Markus Jakobsson
Almost Optimal Hash Sequence Traversal. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:102-119 [Conf]
- Markus Jakobsson, David Pointcheval
Mutual Authentication for Low-Power Mobile Devices. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2001, pp:169-186 [Conf]
- Markus Jakobsson, Moti Yung
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1997, pp:217-238 [Conf]
- Markus Jakobsson, Moti Yung
On Assurance Structures for WWW Commerce. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:141-157 [Conf]
- Eran Gabber, Markus Jakobsson, Yossi Matias, Alain J. Mayer
Curbing Junk E-Mail via Secure Classification. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:198-213 [Conf]
- Juan A. Garay, Markus Jakobsson
Timed Release of Standard Digital Signatures. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:168-182 [Conf]
- Jong Youl Choi, Philippe Golle, Markus Jakobsson
Auditable Privacy: On Tamper-Evident Mix Networks. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:126-141 [Conf]
- Markus Jakobsson, Julien P. Stern, Moti Yung
Scramble All, Encrypt Small. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:95-111 [Conf]
- Markus Jakobsson, Susanne Wetzel
Efficient attribute authentication with applications to ad hoc networks. [Citation Graph (0, 0)][DBLP] Vehicular Ad Hoc Networks, 2004, pp:38-46 [Conf]
- Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2003, pp:13-24 [Conf]
- Andris Ambainis, Markus Jakobsson, Helger Lipmaa
Cryptographic Randomized Response Techniques. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:425-438 [Conf]
- Philip Bohannon, Markus Jakobsson, Sukamol Srikwan
Cryptographic Approaches to Provacy in Forensic DNA Databases. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:373-390 [Conf]
- Markus Jakobsson
On Quorum Controlled Asymmetric Proxy Re-encryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:112-121 [Conf]
- Markus Jakobsson
Mini-Cash: A Minimalistic Approach to E-Commerce. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:122-135 [Conf]
- Markus Jakobsson, Susanne Wetzel
Secure Server-Aided Signature Generation. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:383-401 [Conf]
- Markus Jakobsson
Flash Mixing. [Citation Graph (0, 0)][DBLP] PODC, 1999, pp:83-89 [Conf]
- Markus Jakobsson, Ari Juels
An optimally robust hybrid mix network. [Citation Graph (0, 0)][DBLP] PODC, 2001, pp:284-292 [Conf]
- Oleksiy Mazhelis, Jouni Markkula, Markus Jakobsson
Specifying Patterns for Mobile Application Domain Using General Architectural Components. [Citation Graph (0, 0)][DBLP] PROFES, 2005, pp:157-172 [Conf]
- Markus Jakobsson, David M'Raïhi
Mix-Based Electronic Payments. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:157-173 [Conf]
- Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabian Monrose, Michael K. Reiter
Privacy-preserving global customization. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2000, pp:176-184 [Conf]
- Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:121-131 [Conf]
- Ari Juels, Markus Jakobsson, Tom N. Jagatic
Cache Cookies for Browser Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:301-305 [Conf]
- Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, Markus Jakobsson
How to Forget a Secret. [Citation Graph (0, 0)][DBLP] STACS, 1999, pp:500-509 [Conf]
- Markus Jakobsson, Ari Juels, Ronald L. Rivest
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:339-353 [Conf]
- Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson
Reputation-based Wi-Fi deployment protocols and security analysis. [Citation Graph (0, 0)][DBLP] WMASH, 2004, pp:29-40 [Conf]
- Philippe Golle, Markus Jakobsson
Reusable anonymous return channels. [Citation Graph (0, 0)][DBLP] WPES, 2003, pp:94-100 [Conf]
- Ari Juels, Dario Catalano, Markus Jakobsson
Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP] WPES, 2005, pp:61-70 [Conf]
- Markus Jakobsson, Jacob Ratkiewicz
Designing ethical phishing experiments: a study of (ROT13) rOnl query features. [Citation Graph (0, 0)][DBLP] WWW, 2006, pp:513-522 [Conf]
- Markus Jakobsson, Sid Stamm
Invasive browser sniffing and countermeasures. [Citation Graph (0, 0)][DBLP] WWW, 2006, pp:523-532 [Conf]
- Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel
Stealth attacks in vehicular technologies. [Citation Graph (0, 0)][DBLP] VTC Fall (2), 2004, pp:1218-1222 [Conf]
- Markus Jakobsson, Philip D. MacKenzie, Julien P. Stern
Secure and Lightweight Advertising on the Web. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:11-16, pp:1101-1109 [Journal]
- Andris Ambainis, Markus Jakobsson, Helger Lipmaa
Cryptographic Randomized Response Techniques [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Markus Jakobsson, Filippo Menczer
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson
Threshold Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:1, pp:27-66 [Journal]
- Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakobsson
Reputation-based Wi-Fi deployment. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2005, v:9, n:3, pp:69-81 [Journal]
- Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer
How to turn loaded dice into fair coins. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:911-921 [Journal]
- Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
Node Cooperation in Hybrid Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:365-376 [Journal]
- Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
Drive-By Pharming. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:495-506 [Conf]
- Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer
Social phishing. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2007, v:50, n:10, pp:94-100 [Journal]
Captcha-free throttling. [Citation Graph (, )][DBLP]
Love and authentication. [Citation Graph (, )][DBLP]
Delayed password disclosure. [Citation Graph (, )][DBLP]
Quantifying the security of preference-based authentication. [Citation Graph (, )][DBLP]
What Instills Trust? A Qualitative Study of Phishing. [Citation Graph (, )][DBLP]
Phishing IQ Tests Measure Fear, Not Ability. [Citation Graph (, )][DBLP]
Balancing auditability and privacy in vehicular networks. [Citation Graph (, )][DBLP]
Making CAPTCHAs clickable. [Citation Graph (, )][DBLP]
Coercion-Resistant Electronic Elections. [Citation Graph (, )][DBLP]
Search in 0.028secs, Finished in 0.031secs
|