What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Markus Jakobsson
Google Scholar
63
publications in security and cryptology related venues
Year
Venue
Title
2017
journals/compsec
Mind your SMSes: Mitigating social engineering in second factor authentication.
Hossein Siadati
Toan Nguyen
Payas Gupta
Markus Jakobsson
Nasir D. Memon
2017
conf/fc
Short Paper: Addressing Sophisticated Email Attacks.
Markus Jakobsson
2014
conf/ndss
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Youngsam Park
Jackie Jones
Damon McCoy
Elaine Shi
Markus Jakobsson
2012
conf/uss
The Benefits of Understanding Passwords.
Markus Jakobsson
Mayank Dhiman
2010
conf/ccs
Authentication in the clouds: a framework and its application to mobile users.
Richard Chow
Markus Jakobsson
Ryusuke Masuoka
Jesus Molina
Yuan Niu
Elaine Shi
Zhexuan Song
2010
conf/uss
Retroactive Detection of Malware with Applications to Mobile Platforms.
Markus Jakobsson
Karl-Anders Johansson
2009
conf/ccs
Captcha-free throttling.
Markus Jakobsson
2009
conf/ccs
Controlling data in the cloud: outsourcing computation without outsourcing control.
Richard Chow
Philippe Golle
Markus Jakobsson
Elaine Shi
Jessica Staddon
Ryusuke Masuoka
Jesus Molina
2009
conf/nspw
Server-side detection of malware infection.
Markus Jakobsson
Ari Juels
2007
conf/uss
Combating Click Fraud via Premium Clicks.
Ari Juels
Sid Stamm
Markus Jakobsson
2007
conf/fc
What Instills Trust? A Qualitative Study of Phishing.
Markus Jakobsson
Alex Tsow
Ankur Shah
Eli Blevis
Youn-Kyung Lim
2007
conf/fc
Phishing IQ Tests Measure Fear, Not Ability.
Vivek Anandpara
Andrew Dingman
Markus Jakobsson
Debin Liu
Heather Roinestad
2007
conf/icics
Drive-By Pharming.
Sid Stamm
Zulfikar Ramzan
Markus Jakobsson
2006
journals/joc
Threshold Password-Authenticated Key Exchange.
Philip D. MacKenzie
Thomas Shrimpton
Markus Jakobsson
2006
conf/fc
Auditable Privacy: On Tamper-Evident Mix Networks.
Jong Youl Choi
Philippe Golle
Markus Jakobsson
2006
conf/sp
Cache Cookies for Browser Authentication (Extended Abstract).
Ari Juels
Markus Jakobsson
Tom N. Jagatic
2006
conf/sp
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
Philippe Golle
XiaoFeng Wang
Markus Jakobsson
Alex Tsow
2005
conf/fc
A Chat at the Old Phishin' Hole.
Richard Clayton
Drew Dean
Markus Jakobsson
Steven A. Myers
Stuart G. Stubblebine
Michael Szydlo
2005
conf/fc
Modeling and Preventing Phishing Attacks.
Markus Jakobsson
2005
conf/acns
Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
Virgil Griffith
Markus Jakobsson
2005
conf/acns
Efficient Constructions for One-Way Hash Chains.
Yih-Chun Hu
Markus Jakobsson
Adrian Perrig
2005
conf/acns
Quantifying Security in Hybrid Cellular Networks.
Markus Jakobsson
Liu Yang
2004
conf/pkc
Cryptographic Randomized Response Techniques.
Andris Ambainis
Markus Jakobsson
Helger Lipmaa
2004
conf/ctrsa
Universal Re-encryption for Mixnets.
Philippe Golle
Markus Jakobsson
Ari Juels
Paul F. Syverson
2003
conf/fc
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Markus Jakobsson
Jean-Pierre Hubaux
Levente Buttyán
2003
conf/ctrsa
Fractal Merkle Tree Representation and Traversal.
Markus Jakobsson
Frank Thomson Leighton
Silvio Micali
Michael Szydlo
2002
conf/ccs
Theft-Protected Proprietary Certificates.
Alexandra Boldyreva
Markus Jakobsson
2002
conf/uss
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
Markus Jakobsson
Ari Juels
Ronald L. Rivest
2002
conf/crypto
Threshold Password-Authenticated Key Exchange.
Philip D. MacKenzie
Thomas Shrimpton
Markus Jakobsson
2002
conf/fc
Timed Release of Standard Digital Signatures.
Juan A. Garay
Markus Jakobsson
2002
conf/fc
Almost Optimal Hash Sequence Traversal.
Don Coppersmith
Markus Jakobsson
2002
conf/fc
Financial Instruments in Recommendation Mechanisms.
Markus Jakobsson
2002
conf/ctrsa
Proprietary Certificates.
Markus Jakobsson
Ari Juels
Phong Q. Nguyen
2002
conf/asiacrypt
Optimistic Mixing for Exit-Polls.
Philippe Golle
Sheng Zhong
Dan Boneh
Markus Jakobsson
Ari Juels
2001
conf/ccs
Discouraging Software Piracy Using Software Aging.
Markus Jakobsson
Michael K. Reiter
2001
conf/fc
Mutual Authentication for Low-Power Mobile Devices.
Markus Jakobsson
David Pointcheval
2001
conf/pkc
Secure Server-Aided Signature Generation.
Markus Jakobsson
Susanne Wetzel
2001
conf/ctrsa
Security Weaknesses in Bluetooth.
Markus Jakobsson
Susanne Wetzel
2001
conf/ctrsa
Secure Mobile Gambling.
Markus Jakobsson
David Pointcheval
Adam L. Young
2000
conf/pkc
Cryptographic Approaches to Provacy in Forensic DNA Databases.
Philip Bohannon
Markus Jakobsson
Sukamol Srikwan
2000
conf/asiacrypt
Mix and Match: Secure Function Evaluation via Ciphertexts.
Markus Jakobsson
Ari Juels
2000
conf/asiacrypt
Addition of ElGamal Plaintexts.
Markus Jakobsson
Ari Juels
2000
conf/asiacrypt
Security of Signed ElGamal Encryption.
Claus-Peter Schnorr
Markus Jakobsson
1999
conf/fse
Scramble All, Encrypt Small.
Markus Jakobsson
Julien P. Stern
Moti Yung
1999
conf/crypto
Abuse-Free Optimistic Contract Signing.
Juan A. Garay
Markus Jakobsson
Philip D. MacKenzie
1999
conf/fc
Improved Magic Ink Signatures Using Hints.
Markus Jakobsson
Joy Müller
1999
conf/pkc
On Quorum Controlled Asymmetric Proxy Re-encryption.
Markus Jakobsson
1999
conf/pkc
Mini-Cash: A Minimalistic Approach to E-Commerce.
Markus Jakobsson
1998
conf/ccs
A Practical Secure Physical Random Bit Generator.
Markus Jakobsson
Elizabeth A. M. Shriver
Bruce Hillyer
Ari Juels
1998
conf/fc
On Assurance Structures for WWW Commerce.
Markus Jakobsson
Moti Yung
1998
conf/fc
Curbing Junk E-Mail via Secure Classification.
Eran Gabber
Markus Jakobsson
Yossi Matias
Alain J. Mayer
1998
conf/fc
X-Cash: Executable Digital Cash.
Markus Jakobsson
Ari Juels
1998
conf/eurocrypt
A Practical Mix.
Markus Jakobsson
1998
conf/sacrypt
Mix-Based Electronic Payments.
Markus Jakobsson
David M'Raïhi
1997
conf/ccs
Proactive Public Key and Signature Systems.
Amir Herzberg
Markus Jakobsson
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1997
conf/fc
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Markus Jakobsson
Moti Yung
1997
conf/eurocrypt
Distributed "Magic Ink" Signatures.
Markus Jakobsson
Moti Yung
1997
conf/eurocrypt
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
Mihir Bellare
Markus Jakobsson
Moti Yung
1996
conf/ccs
Revokable and Versatile Electronic Money (extended abstract).
Markus Jakobsson
Moti Yung
1996
conf/crypto
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Markus Jakobsson
Moti Yung
1996
conf/eurocrypt
Designated Verifier Proofs and Their Applications.
Markus Jakobsson
Kazue Sako
Russell Impagliazzo
1995
conf/eurocrypt
Ripping Coins For a Fair Exchange.
Markus Jakobsson
1994
conf/eurocrypt
Blackmailing using Undeniable Signatures.
Markus Jakobsson
Coauthors
Adam L. Young
(1)
Adrian Perrig
(1)
Alain J. Mayer
(1)
Alex Tsow
(2)
Alexandra Boldyreva
(1)
Amir Herzberg
(1)
Andrew Dingman
(1)
Andris Ambainis
(1)
Ankur Shah
(1)
Ari Juels
(11)
Bruce Hillyer
(1)
Claus-Peter Schnorr
(1)
Damon McCoy
(1)
Dan Boneh
(1)
David M'Raïhi
(1)
David Pointcheval
(2)
Debin Liu
(1)
Don Coppersmith
(1)
Drew Dean
(1)
Elaine Shi
(3)
Eli Blevis
(1)
Elizabeth A. M. Shriver
(1)
Eran Gabber
(1)
Frank Thomson Leighton
(1)
Heather Roinestad
(1)
Helger Lipmaa
(1)
Hossein Siadati
(1)
Hugo Krawczyk
(1)
Jackie Jones
(1)
Jean-Pierre Hubaux
(1)
Jessica Staddon
(1)
Jesus Molina
(2)
Jong Youl Choi
(1)
Joy Müller
(1)
Juan A. Garay
(2)
Julien P. Stern
(1)
Karl-Anders Johansson
(1)
Kazue Sako
(1)
Levente Buttyán
(1)
Liu Yang
(1)
Markus Jakobsson
(63)
Mayank Dhiman
(1)
Michael K. Reiter
(1)
Michael Szydlo
(2)
Mihir Bellare
(1)
Moti Yung
(8)
Nasir D. Memon
(1)
Paul F. Syverson
(1)
Payas Gupta
(1)
Philip Bohannon
(1)
Philip D. MacKenzie
(3)
Philippe Golle
(5)
Phong Q. Nguyen
(1)
Richard Chow
(2)
Richard Clayton
(1)
Ronald L. Rivest
(1)
Russell Impagliazzo
(1)
Ryusuke Masuoka
(2)
Sheng Zhong
(1)
Sid Stamm
(2)
Silvio Micali
(1)
Stanislaw Jarecki
(1)
Steven A. Myers
(1)
Stuart G. Stubblebine
(1)
Sukamol Srikwan
(1)
Susanne Wetzel
(2)
Thomas Shrimpton
(2)
Toan Nguyen
(1)
Tom N. Jagatic
(1)
Virgil Griffith
(1)
Vivek Anandpara
(1)
XiaoFeng Wang
(1)
Yih-Chun Hu
(1)
Yossi Matias
(1)
Youn-Kyung Lim
(1)
Youngsam Park
(1)
Yuan Niu
(1)
Zhexuan Song
(1)
Zulfikar Ramzan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to