Complete List of Publications

(Also see my Google Scholar page for citations.)

  • [PDF] “Practical and secure Software-Based attestation.” .
    [Bibtex]
    @inproceedings{lightsec,
    citeulike-article-id = {12477272},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:33:26},
    priority = {2},
    title = {Practical and Secure {Software-Based} Attestation},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf}
    }
  • [PDF] M. Jakobsson and G. Stewart, “Mobile malware: why the traditional AV paradigm is doomed, and how to use physics to detect undesirable routines,” in Blackhat, 2013.
    [Bibtex]
    @inproceedings{blackhat13,
    abstract = {The traditional {Anti-Virus} paradigm focuses on signature-based and behavioral detection. These require substantial processing, which hurts the limited power resources of handsets. Also, carriers are reluctant and slow to deliver Firmware Over The Air ({FOTA}) patches, due to the rigorous testing they need to subject updates to, and the costs of over-the-air updates. A move to cloud-based screening fails to recognize that not all threats will be propagated over the backbone, may obfuscate themselves in transit; or fight back (as rootkits do) to evade reporting or use of techniques such as the ``Google kill switch''. Hardware vendors are evaluating security solutions with hardware support, such as {TrustZone}, but while this reduces the vulnerabilities, it still exposes an attack surface.
    We describe a new approach that detects the presence of any undesirable routines -- including corruptions of the code used to perform this detection. The security assertions we make are not based on heuristics, but rather, rely on the physical characteristics of the target device. We detail the approach, which does not rely on hardware modifications, and explain how to analyze its security.},
    author = {Jakobsson, Markus and Stewart, Guy},
    booktitle = {BlackHat},
    citeulike-article-id = {12477269},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:26:29},
    priority = {2},
    title = {Mobile Malware: Why the Traditional {AV} Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    year = {2013}
    }
  • [PDF] M. Jakobsson and K. Johansson, “Practical and secure Software-Based attestation,” in Lightsec, 2011.
    [Bibtex]
    @inproceedings{citeulike:12348466,
    abstract = {Software-based attestation can be used for guaranteed detection of any active malware on a device. This promises a significant advance in the battle against malware, including mobile malware. However, most software based attestation methods are either heuristic or unsuitable for mobile computing – and often both. One recent software-based attestation method uses so-called memory-printing to produce a software-based attestation technique with provable properties. We describe a novel memory-printing algorithm that improves on that work by being more than an order of magnitude faster, while avoiding commonly used and questionable security assumptions. This results in a truly practical and arguable secure solution – taking less than 3 seconds on a 600 {MHz} processor with 256 {MB} {RAM}. Our work finds applications to malware defense and trusted computing in general, and mobile malware defense in particular.},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {LightSec},
    citeulike-article-id = {12348466},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsec-Jakobsson-Johansson-2011.pdf},
    keywords = {malware, mobile, publications},
    posted-at = {2013-05-16 13:47:21},
    priority = {5},
    title = {Practical and Secure {Software-Based} Attestation},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/lightsec-Jakobsson-Johansson-2011.pdf},
    year = {2011}
    }
  • [PDF] E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior,” Information security, pp. 99-113, 2011.
    [Bibtex]
    @article{shi2011implicit,
    author = {Shi, E. and Niu, Y. and Jakobsson, M. and Chow, R.},
    citeulike-article-id = {12072132},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/isc.pdf},
    journal = {Information Security},
    keywords = {authentication, publication},
    pages = {99--113},
    posted-at = {2013-02-25 03:55:28},
    priority = {2},
    publisher = {Springer},
    title = {Implicit authentication through learning user behavior},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/isc.pdf},
    year = {2011}
    }
  • [PDF] M. Jakobsson and D. Liu, Bootstrapping mobile PINs using passwords, W2SP, 2011.
    [Bibtex]
    @book{jakobsson2011bootstrapping,
    author = {Jakobsson, M. and Liu, D.},
    citeulike-article-id = {12072131},
    citeulike-linkout-0 = {http://w2spconf.com/2011/papers/mobilePIN.pdf},
    keywords = {authentication, publication},
    posted-at = {2013-02-25 03:54:47},
    priority = {2},
    publisher = {W2SP},
    title = {Bootstrapping mobile {PINs} using passwords},
    pdf = {http://w2spconf.com/2011/papers/mobilePIN.pdf},
    year = {2011}
    }
  • [PDF] M. Jakobsson, R. I. Chow, and J. Molina, “Authentication-Are we doing well Enough?[Guest editors’ introduction],” Security & privacy, ieee, vol. 10, iss. 1, pp. 19-21, 2012.
    [Bibtex]
    @article{jakobsson2012authentication,
    author = {Jakobsson, M. and Chow, R. I. and Molina, J.},
    citeulike-article-id = {12072129},
    citeulike-linkout-0 = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06142519},
    journal = {Security \& Privacy, IEEE},
    keywords = {article, authentication},
    number = {1},
    pages = {19--21},
    posted-at = {2013-02-25 03:53:53},
    priority = {2},
    publisher = {IEEE},
    title = {{Authentication-Are} We Doing Well {Enough?[Guest} Editors' Introduction]},
    pdf = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06142519},
    volume = {10},
    year = {2012}
    }
  • D. Balfanz, R. Chow, O. Eisen, M. Jakobsson, S. Kirsch, S. Matsumoto, J. Molina, and P. van Oorschot, “The future of authentication,” Security & privacy, ieee, vol. 10, iss. 1, pp. 22-27, 2012.
    [Bibtex]
    @article{balfanz2012future,
    author = {Balfanz, D. and Chow, R. and Eisen, O. and Jakobsson, M. and Kirsch, S. and Matsumoto, S. and Molina, J. and van Oorschot, P.},
    citeulike-article-id = {12072128},
    journal = {Security \& Privacy, IEEE},
    keywords = {article, authentication},
    number = {1},
    pages = {22--27},
    posted-at = {2013-02-25 03:52:53},
    priority = {2},
    publisher = {IEEE},
    title = {The future of authentication},
    volume = {10},
    year = {2012}
    }
  • [PDF] M. Jakobsson and S. Taveau, “The case for replacing passwords with biometrics,” Mobile security technologies, 2012.
    [Bibtex]
    @article{jakobsson2012case,
    author = {Jakobsson, M. and Taveau, S.},
    citeulike-article-id = {12072127},
    citeulike-linkout-0 = {http://mostconf.org/2012/papers/3.pdf},
    journal = {Mobile Security Technologies},
    keywords = {publications},
    posted-at = {2013-02-25 03:50:35},
    priority = {2},
    title = {The Case for Replacing Passwords with Biometrics},
    pdf = {http://mostconf.org/2012/papers/3.pdf},
    year = {2012}
    }
  • [PDF] M. Jakobsson and H. Siadati, “SpoofKiller: you can teach people how to pay, but not how to pay attention,” in Socio-technical aspects in security and trust (stast), 2012 workshop on, 2012, pp. 3-10.
    [Bibtex]
    @inproceedings{jakobsson2012spoofkiller,
    author = {Jakobsson, M. and Siadati, H.},
    booktitle = {Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on},
    citeulike-article-id = {12072124},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/SpoofKiller-Markus-Jakobsson-Hossein-Siadati.pdf},
    keywords = {publications},
    organization = {IEEE},
    pages = {3--10},
    posted-at = {2013-02-25 03:49:04},
    priority = {2},
    title = {{SpoofKiller}: You Can Teach People How to Pay, but Not How to Pay Attention},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/SpoofKiller-Markus-Jakobsson-Hossein-Siadati.pdf},
    year = {2012}
    }
  • M. Jakobsson, The death of the internet, Wiley-IEEE Computer Society Press, 2012.
    [Bibtex]
    @book{jakobsson2012death,
    author = {Jakobsson, M.},
    citeulike-article-id = {12072121},
    isbn = {978-1118062418},
    keywords = {book},
    posted-at = {2013-02-25 03:48:17},
    priority = {2},
    publisher = {Wiley-IEEE Computer Society Press},
    title = {The Death of the Internet},
    year = {2012}
    }
  • M. Jakobsson, “Mobile authentication,” , 2012.
    [Bibtex]
    @article{jakobsson2012mobile,
    author = {Jakobsson, M.},
    citeulike-article-id = {12072118},
    isbn = {978-1-4614-4878-5},
    keywords = {authentication, book},
    posted-at = {2013-02-25 03:47:17},
    priority = {2},
    publisher = {Springer},
    title = {Mobile authentication},
    year = {2012}
    }
  • [PDF] M. Jakobsson and R. Akavipat, Rethinking passwords to adapt to constrained keyboards, 2011.
    [Bibtex]
    @misc{jakobsson2011rethinking,
    author = {Jakobsson, Markus and Akavipat, Ruj},
    citeulike-article-id = {12072112},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/fastwords.pdf},
    keywords = {authentication, passwords, publications},
    posted-at = {2013-02-25 03:43:31},
    priority = {2},
    title = {Rethinking passwords to adapt to constrained keyboards},
    pdf = {http://www.markus-jakobsson.com/fastwords.pdf},
    year = {2011}
    }
  • [PDF] M. Jakobsson and M. Dhiman, “The benefits of understanding passwords,” in Proceedings of the 7th usenix conference on hot topics in security, Berkeley, CA, USA, 2012, p. 10.
    [Bibtex]
    @inproceedings{citeulike:12047721,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Dhiman, Mayank},
    booktitle = {Proceedings of the 7th USENIX conference on Hot Topics in Security},
    citeulike-article-id = {12047721},
    citeulike-linkout-0 = {https://www.usenix.org/system/files/conference/hotsec12/hotsec12-final13.pdf},
    keywords = {authentication, passwords, publications},
    location = {Bellevue, WA},
    pages = {10},
    posted-at = {2013-02-20 13:01:21},
    priority = {2},
    publisher = {USENIX Association},
    series = {HotSec'12},
    title = {The benefits of understanding passwords},
    pdf = {https://www.usenix.org/system/files/conference/hotsec12/hotsec12-final13.pdf},
    year = {2012}
    }
  • [PDF] R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users..” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936960,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Song, Zhexuan},
    citeulike-article-id = {7936960},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, distributed-computing, publications},
    posted-at = {2010-10-01 18:50:50},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users.},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    year = {2010}
    }
  • Towards trustworthy elections: new directions in electronic voting, D. Chaum, M. Jakobsson, R. Rivest, P. Ryan, J. Benaloh, M. Kutylowski, and B. Adida, Eds., Springer, 2010, vol. 6000.
    [Bibtex]
    @book{citeulike:7936907,
    citeulike-article-id = {7936907},
    editor = {Chaum, David and Jakobsson, Markus and Rivest, Ron and Ryan, Peter and Benaloh, Josh and Kutylowski, Miroslaw and Adida, Ben},
    journal = {Lecture Notes in Computer Science},
    keywords = {authentication, distributed-computing, encryption, privacy, publications},
    posted-at = {2010-10-01 18:36:16},
    priority = {2},
    publisher = {Springer},
    title = {Towards Trustworthy Elections: New Directions in Electronic Voting},
    volume = {6000},
    year = {2010}
    }
  • [PDF] M. Jakobsson and F. Menczer, “Web forms and untraceable DDoS attacks,” in Network security, S. Huang, D. MacCallum, and D. Z. Du, Eds., Springer, 2010.
    [Bibtex]
    @inbook{citeulike:7936872,
    author = {Jakobsson, Markus and Menczer, Filippo},
    booktitle = {Network Security},
    citeulike-article-id = {7936872},
    citeulike-linkout-0 = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    editor = {Huang, Scott and MacCallum, David and Du, Ding Z.},
    keywords = {distributed-computing, fraud, publications},
    posted-at = {2010-10-01 18:30:40},
    priority = {2},
    publisher = {Springer},
    title = {Web Forms and Untraceable {DDoS} Attacks},
    pdf = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    year = {2010}
    }
  • [PDF] R. Chow, P. Golle, M. Jakobsson, R. Masuoka, J. Molina, E. Shi, and J. Staddon, “Controlling data in the cloud: outsourcing computation without outsourcing control,” Acm workshop on cloud computing security (ccsw), 2009.
    [Bibtex]
    @article{citeulike:7936815,
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Shi, Elaine and Staddon, Jessica},
    citeulike-article-id = {7936815},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/ControllingDataInTheCloud-CCSW-09.pdf},
    journal = {ACM workshop on Cloud computing security (CCSW)},
    keywords = {distributed-computing, publications},
    posted-at = {2010-10-01 18:14:43},
    priority = {2},
    title = {Controlling data in the cloud: outsourcing computation without outsourcing control},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/ControllingDataInTheCloud-CCSW-09.pdf},
    year = {2009}
    }
  • [PDF] Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson, “One experience collecting sensitive mobile data.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936790,
    author = {Niu, Yuan and Shi, Elaine and Chow, Richard and Golle, Philippe and Jakobsson, Markus},
    citeulike-article-id = {7936790},
    citeulike-linkout-0 = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    journal = {Usable Security Experiment Reports (USER) Workshop},
    keywords = {authentication, mobile, publications, user-experiments},
    posted-at = {2010-10-01 18:12:02},
    priority = {2},
    title = {One Experience Collecting Sensitive Mobile Data},
    pdf = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    year = {2010}
    }
  • [PDF] R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936778,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Zhexuan Song},
    citeulike-article-id = {7936778},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:09:21},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users},
    pdf = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    year = {2010}
    }
  • [PDF] E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936771,
    author = {Shi, Elaine and Niu, Yuan and Jakobsson, Markus and Chow, Richard},
    citeulike-article-id = {7936771},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    journal = {Information Security Conference (ISC)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:05:22},
    priority = {2},
    title = {Implicit Authentication through Learning User Behavior},
    pdf = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    year = {2010}
    }
  • M. Jakobsson, “Machine-Generated music with themes,” in International conference on artificial neural networks, Brighton, UK, 1992, pp. 1645-1646.
    [Bibtex]
    @inproceedings{music-gen,
    address = {Brighton, UK},
    author = {Jakobsson, Markus},
    booktitle = {International Conference on Artificial Neural Networks},
    citeulike-article-id = {7846081},
    keywords = {publications},
    pages = {1645--1646},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    title = {{Machine-Generated} Music with Themes},
    year = {1992}
    }
  • [PDF] M. Jakobsson, “Blackmailing using undeniable signatures,” in Advances in cryptology — eurocrypt ’94, Perugia, Italy, 1994, pp. 425-427.
    [Bibtex]
    @inproceedings{blackmailing,
    address = {Perugia, Italy},
    author = {Jakobsson, Markus},
    booktitle = {Advances in Cryptology -- EuroCrypt '94},
    citeulike-article-id = {7846080},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt94.pdf},
    comment = {LNCS 950},
    keywords = {authentication, publications},
    month = may,
    pages = {425--427},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Blackmailing using Undeniable Signatures},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt94.pdf},
    year = {1994}
    }
  • [PDF] M. Jakobsson, “Ripping coins for a fair exchange,” in Eurocrypt’95: proceedings of the 14th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1995, pp. 220-230.
    [Bibtex]
    @inproceedings{ripping-coins,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus},
    booktitle = {EUROCRYPT'95: Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7846079},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt95.pdf},
    keywords = {publications},
    location = {Saint-Malo, France},
    pages = {220--230},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Ripping coins for a fair exchange},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt95.pdf},
    year = {1995}
    }
  • [PDF] M. Bellare, M. Jakobsson, and M. Yung, “Round-optimal zero-knowledge arguments based on any one-way function,” in Eurocrypt’97: proceedings of the 16th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1997, pp. 280-305.
    [Bibtex]
    @inproceedings{round-opt-zero-knowledge,
    address = {Berlin, Heidelberg},
    author = {Bellare, Mihir and Jakobsson, Markus and Yung, Moti},
    booktitle = {EUROCRYPT'97: Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7846078},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-zk.pdf},
    keywords = {publications},
    location = {Konstanz, Germany},
    pages = {280--305},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Round-optimal zero-knowledge arguments based on any one-way function},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-zk.pdf},
    year = {1997}
    }
  • M. Jakobsson and M. Yung, “Applying Anti-Trust policies to increase trust in a versatile E-Money system,” in Fc ’97: proceedings of the first international conference on financial cryptography, London, UK, 1997, pp. 217-238.
    [Bibtex]
    @inproceedings{anti-trust-emoney,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {FC '97: Proceedings of the First International Conference on Financial Cryptography},
    citeulike-article-id = {7846077},
    keywords = {publications},
    pages = {217--238},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Applying {Anti-Trust} Policies to Increase Trust in a Versatile {E-Money} System},
    year = {1997}
    }
  • M. Jakobsson and M. Yung, “On assurance structures for WWW commerce,” in Fc ’98: proceedings of the second international conference on financial cryptography, London, UK, 1998, pp. 141-157.
    [Bibtex]
    @inproceedings{assurance-www-comm,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {FC '98: Proceedings of the Second International Conference on Financial Cryptography},
    citeulike-article-id = {7846076},
    keywords = {publications},
    pages = {141--157},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {On Assurance Structures for {WWW} Commerce},
    year = {1998}
    }
  • M. Jakobsson and A. Juels, “X-Cash: executable digital cash,” in Fc ’98: proceedings of the second international conference on financial cryptography, London, UK, 1998, pp. 16-27.
    [Bibtex]
    @inproceedings{x-cash,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {FC '98: Proceedings of the Second International Conference on Financial Cryptography},
    citeulike-article-id = {7846075},
    keywords = {publications},
    pages = {16--27},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{X-Cash}: Executable Digital Cash},
    year = {1998}
    }
  • M. Jakobsson, “Mini-Cash: a minimalistic approach to E-Commerce,” in Pkc ’99: proceedings of the second international workshop on practice and theory in public key cryptography, London, UK, 1999, pp. 122-135.
    [Bibtex]
    @inproceedings{mini-cash,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7846074},
    comment = {LNCS 1560},
    keywords = {publications},
    pages = {122--135},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Mini-Cash}: A Minimalistic Approach to {E-Commerce}},
    year = {1999}
    }
  • M. Jakobsson and C. Schnorr, “Efficient oblivious proofs of correct exponentiation,” in Cms ’99: proceedings of the ifip tc6/tc11 joint working conference on secure information networks, Deventer, The Netherlands, The Netherlands, 1999, pp. 71-86.
    [Bibtex]
    @inproceedings{correct-exponentiation,
    address = {Deventer, The Netherlands, The Netherlands},
    author = {Jakobsson, Markus and Schnorr, Claus-Peter},
    booktitle = {CMS '99: Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks},
    citeulike-article-id = {7846073},
    keywords = {publications},
    pages = {71--86},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Kluwer, B.V.},
    title = {Efficient Oblivious Proofs of Correct Exponentiation},
    year = {1999}
    }
  • M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Cms ’99: proceedings of the ifip tc6/tc11 joint working conference on secure information networks, Deventer, The Netherlands, The Netherlands, 1999, pp. 258-272.
    [Bibtex]
    @inproceedings{bread-pudding,
    address = {Deventer, The Netherlands, The Netherlands},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {CMS '99: Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks},
    citeulike-article-id = {7846072},
    keywords = {publications},
    pages = {258--272},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Kluwer, B.V.},
    title = {Proofs of Work and Bread Pudding Protocols},
    year = {1999}
    }
  • C. P. Schnorr and M. Jakobsson, “Security of discrete log cryptosystems in the random oracle + generic model,” in Conference on the mathematics of public-key cryptography, Toronto, Canada, 1999.
    [Bibtex]
    @inproceedings{Schnorr99securityof,
    address = {Toronto, Canada},
    author = {Schnorr, C. P. and Jakobsson, M.},
    booktitle = {Conference on The Mathematics of Public-Key Cryptography},
    citeulike-article-id = {7846071},
    keywords = {publications},
    month = jun,
    organization = {The Fields Institute},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    title = {Security Of Discrete Log Cryptosystems in the Random Oracle + Generic Model},
    year = {1999}
    }
  • M. Jakobsson, D. M’Ra"{i}hi, Y. Tsiounis, and M. Yung, “Electronic payments: where do we go from here?,” in Proceedings of the international exhibition and congress on secure networking – cqre (secure) ’99, London, UK, 1999, pp. 43-63.
    [Bibtex]
    @inproceedings{e-payments-core,
    address = {London, UK},
    author = {Jakobsson, Markus and M'Ra"{\i}hi, David and Tsiounis, Yiannis and Yung, Moti},
    booktitle = {Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99},
    citeulike-article-id = {7846070},
    keywords = {publications},
    pages = {43--63},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Electronic Payments: Where Do We Go from Here?},
    year = {1999}
    }
  • A. Boldyreva and M. Jakobsson, “Theft-Protected proprietary certificates,” in Digital rights management ’02: acm ccs-9 workshop, London, UK, 2002, pp. 208-220.
    [Bibtex]
    @inproceedings{propietary-cert,
    address = {London, UK},
    author = {Boldyreva, Alexandra and Jakobsson, Markus},
    booktitle = {Digital Rights Management '02: ACM CCS-9 Workshop},
    citeulike-article-id = {7846069},
    comment = {LNCS 2696},
    keywords = {publications},
    pages = {208--220},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Theft-Protected} Proprietary Certificates},
    year = {2002}
    }
  • F. Menczer, N. W. Street, N. Vishwakarma, A. E. Monge, and M. Jakobsson, “IntelliShopper: a proactive, personal, private shopping assistant,” in Aamas ’02: proceedings of the first international joint conference on autonomous agents and multiagent systems, New York, NY, USA, 2002, pp. 1001-1008.
    [Bibtex]
    @inproceedings{IntelliShopper,
    address = {New York, NY, USA},
    author = {Menczer, Filippo and Street, W. Nick and Vishwakarma, Narayan and Monge, Alvaro E. and Jakobsson, Markus},
    booktitle = {AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems},
    citeulike-article-id = {7846068},
    keywords = {publications},
    location = {Bologna, Italy},
    pages = {1001--1008},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {ACM},
    title = {{IntelliShopper}: a proactive, personal, private shopping assistant},
    year = {2002}
    }
  • [PDF] J. A. Garay and M. Jakobsson, “Timed release of standard digital signatures,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 168-182.
    [Bibtex]
    @inproceedings{timed-release,
    address = {Berlin, Heidelberg},
    author = {Garay, Juan A. and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7846067},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/timed-release.pdf},
    keywords = {publications},
    location = {Southampton, Bermuda},
    pages = {168--182},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Timed release of standard digital signatures},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/timed-release.pdf},
    year = {2003}
    }
  • [PDF] M. Jakobsson, “Financial instruments in recommendation mechanisms,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 31-43.
    [Bibtex]
    @inproceedings{financial-instr,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7846066},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/financial-instruments.pdf},
    keywords = {publications},
    location = {Southampton, Bermuda},
    pages = {31--43},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Financial instruments in recommendation mechanisms},
    pdf = {http://www.markus-jakobsson.com/wp-content/uploads/financial-instruments.pdf},
    year = {2003}
    }
  • S. Srikwan, M. Jakobsson, A. Albrecht, and M. Dalkilic, “Trust establishment in data sharing: an incentive model for biodiversity information systems,” in Workshop on trusted collaboration, Atlanta, GA, 2006.
    [Bibtex]
    @inproceedings{Srikwan_trustestablishment,
    address = {Atlanta, GA},
    author = {Srikwan, Sukamol and Jakobsson, Markus and Albrecht, Andrew and Dalkilic, Mehmet},
    booktitle = {Workshop on Trusted Collaboration},
    citeulike-article-id = {7846064},
    keywords = {publications},
    month = nov,
    organization = {IEEE},
    posted-at = {2010-09-17 03:38:28},
    priority = {0},
    publisher = {IEEE},
    title = {Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems},
    year = {2006}
    }
  • M. Jakobsson, “Cryptographic protocols,” in The handbook of information security, H. Bidgoli, Ed., Hoboken, NJ: John Wiley & Sons, Inc., 2005.
    [Bibtex]
    @incollection{crypto-prot,
    address = {Hoboken, NJ},
    author = {Jakobsson, Markus},
    booktitle = {The Handbook of Information Security},
    citeulike-article-id = {7846063},
    editor = {Bidgoli, Hossein},
    keywords = {publications},
    posted-at = {2010-09-17 03:38:28},
    priority = {0},
    publisher = {John Wiley \& Sons, Inc.},
    title = {Cryptographic Protocols},
    year = {2005}
    }
  • M. Jakobsson, P. D. MacKenzie, and J. P. Stern, “Secure and lightweight advertising on the web,” Comput. netw., vol. 31, iss. 11-16, pp. 1101-1109, 1999.
    [Bibtex]
    @article{sec-adv-99,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and MacKenzie, Philip D. and Stern, Julien P.},
    citeulike-article-id = {7846062},
    journal = {Comput. Netw.},
    keywords = {publications},
    number = {11-16},
    pages = {1101--1109},
    posted-at = {2010-09-17 03:38:28},
    priority = {0},
    publisher = {Elsevier North-Holland, Inc.},
    title = {Secure and lightweight advertising on the Web},
    volume = {31},
    year = {1999}
    }
  • [PDF] M. Jakobsson and M. Yung, “Revokable and versatile electronic money (extended abstract),” in Ccs ’96: proceedings of the 3rd acm conference on computer and communications security, New York, NY, USA, 1996, pp. 76-87.
    [Bibtex]
    @inproceedings{revokable-emoney,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security},
    citeulike-article-id = {7846046},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs96.pdf},
    keywords = {privacy, publications},
    location = {New Delhi, India},
    pages = {76--87},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {ACM},
    title = {Revokable and versatile electronic money (extended abstract)},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ccs96.pdf},
    year = {1996}
    }
  • [PDF] R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose, and M. K. Reiter, “Privacy-preserving global customization,” in Ec ’00: proceedings of the 2nd acm conference on electronic commerce, New York, NY, USA, 2000, pp. 176-184.
    [Bibtex]
    @inproceedings{privacy-pre-global,
    address = {New York, NY, USA},
    author = {Arlein, Robert M. and Jai, Ben and Jakobsson, Markus and Monrose, Fabian and Reiter, Michael K.},
    booktitle = {EC '00: Proceedings of the 2nd ACM conference on Electronic commerce},
    citeulike-article-id = {7846045},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ec00.pdf},
    keywords = {privacy, publications},
    location = {Minneapolis, Minnesota, United States},
    pages = {176--184},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {ACM},
    title = {Privacy-preserving global customization},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ec00.pdf},
    year = {2000}
    }
  • [PDF] M. Jakobsson, A. Juels, and J. Ratkiewicz, “Privacy-Preserving history mining for web browsers,” in Web 2.0 security and privacy, Oakland, CA, 2008.
    [Bibtex]
    @inproceedings{pp-history-mining,
    address = {Oakland, CA},
    author = {Jakobsson, Markus and Juels, Ari and Ratkiewicz, Jacob},
    booktitle = {Web 2.0 Security and Privacy},
    citeulike-article-id = {7846044},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-web20sp08.pdf},
    keywords = {privacy, publications},
    month = may,
    organization = {IEEE},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {IEEE},
    title = {{Privacy-Preserving} History Mining for Web Browsers},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-web20sp08.pdf},
    year = {2008}
    }
  • [PDF] M. Jakobsson, D. Pointcheval, and A. Young, “Secure mobile gambling,” in Ct-rsa 2001: proceedings of the 2001 conference on topics in cryptology, London, UK, 2001, pp. 110-125.
    [Bibtex]
    @inproceedings{sec-mobile-gaming,
    address = {London, UK},
    author = {Jakobsson, Markus and Pointcheval, David and Young, Adam},
    booktitle = {CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology},
    citeulike-article-id = {7845898},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01-gamble.pdf},
    keywords = {mobile, publications},
    pages = {110--125},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Secure Mobile Gambling},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01-gamble.pdf},
    year = {2001}
    }
  • [PDF] M. Jakobsson and D. Pointcheval, “Mutual authentication for Low-Power mobile devices,” in Fc ’01: proceedings of the 5th international conference on financial cryptography, London, UK, 2002, pp. 178-195.
    [Bibtex]
    @inproceedings{mutual-auth-low,
    address = {London, UK},
    author = {Jakobsson, Markus and Pointcheval, David},
    booktitle = {FC '01: Proceedings of the 5th International Conference on Financial Cryptography},
    citeulike-article-id = {7845897},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc01.pdf},
    keywords = {mobile, publications},
    pages = {178--195},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mutual Authentication for {Low-Power} Mobile Devices},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc01.pdf},
    year = {2002}
    }
  • [PDF] M. Jakobsson and S. Wetzel, “Security weaknesses in bluetooth,” in Ct-rsa 2001: proceedings of the 2001 conference on topics in cryptology, London, UK, 2001, pp. 176-191.
    [Bibtex]
    @inproceedings{weakness-bluetooth,
    address = {London, UK},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology},
    citeulike-article-id = {7845896},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    keywords = {mobile, most-downloaded, publications},
    pages = {176--191},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Security Weaknesses in Bluetooth},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    year = {2001}
    }
  • [PDF] M. Jakobsson, J. P. Hubaux, and L. Buttyan, “A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,” in Financial Crypto 2003, La Guadeloupe, 2003.
    [Bibtex]
    @inproceedings{JHB-FC03,
    address = {La Guadeloupe},
    author = {Jakobsson, Markus and Hubaux, J. P. and Buttyan, L.},
    booktitle = {Financial {C}rypto 2003},
    citeulike-article-id = {7845895},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ifca03.pdf},
    keywords = {mobile, publications},
    month = jan,
    organization = {IFCA},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer Verlag},
    title = {A {M}icro-{P}ayment {S}cheme {E}ncouraging {C}ollaboration in {M}ulti-{H}op {C}ellular {N}etworks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ifca03.pdf},
    year = {2003}
    }
  • [PDF] N. B. Salem, L. Buttyán, J. Hubaux, and M. Jakobsson, “A charging and rewarding scheme for packet forwarding in multi-hop cellular networks,” in Mobihoc ’03: proceedings of the 4th acm international symposium on mobile ad hoc networking & computing, New York, NY, USA, 2003, pp. 13-24.
    [Bibtex]
    @inproceedings{rewarding-scheme-03,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Butty\'{a}n, Levente and Hubaux, Jean-Pierre and Jakobsson, Markus},
    booktitle = {MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking \& computing},
    citeulike-article-id = {7845894},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-mobihoc03.pdf},
    keywords = {mobile, publications},
    location = {Annapolis, Maryland, USA},
    pages = {13--24},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {ACM},
    title = {A charging and rewarding scheme for packet forwarding in multi-hop cellular networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-mobihoc03.pdf},
    year = {2003}
    }
  • [PDF] M. Jakobsson, S. Wetzel, and B. Yener, “Stealth attacks on Ad-Hoc wireless networks,” in Ieee vehicular technology conference, Orlando, Florida, 2003.
    [Bibtex]
    @inproceedings{JWY03,
    address = {Orlando, Florida},
    author = {Jakobsson, Markus and Wetzel, Susanne and Yener, Bulent},
    booktitle = {IEEE Vehicular Technology Conference},
    citeulike-article-id = {7845893},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ivts03.pdf},
    keywords = {mobile, publications},
    month = oct,
    organization = {IEEE},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {IEEE},
    title = {Stealth Attacks on {Ad-Hoc} Wireless Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ivts03.pdf},
    year = {2003}
    }
  • [PDF] M. Jakobsson, X. Wang, and S. Wetzel, “Stealth attacks in vehicular technologies,” in Proceedings of ieee vehicular technology conference 2004 fall (vtc-fall 2004), Los Angeles, CA, 2004.
    [Bibtex]
    @inproceedings{JWW04,
    address = {Los Angeles, CA},
    author = {Jakobsson, M. and Wang, X. and Wetzel, S.},
    booktitle = {Proceedings of IEEE Vehicular Technology Conference 2004 Fall (VTC-Fall 2004)},
    citeulike-article-id = {7845892},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ivts04.pdf},
    keywords = {mobile, publications},
    month = sep,
    organization = {IEEE VTS},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {IEEE},
    title = {Stealth Attacks in Vehicular Technologies},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ivts04.pdf},
    year = {2004}
    }
  • [PDF] N. B. Salem, J. Hubaux, and M. Jakobsson, “Reputation-based Wi-Fi deployment protocols and security analysis,” in Wmash ’04: proceedings of the 2nd acm international workshop on wireless mobile applications and services on wlan hotspots, New York, NY, USA, 2004, pp. 29-40.
    [Bibtex]
    @inproceedings{repu-wifi-analysis,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Hubaux, Jean-Pierre and Jakobsson, Markus},
    booktitle = {WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots},
    citeulike-article-id = {7845891},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-wmash04.pdf},
    keywords = {mobile, publications},
    location = {Philadelphia, PA, USA},
    pages = {29--40},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {ACM},
    title = {Reputation-based {Wi-Fi} deployment protocols and security analysis},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-wmash04.pdf},
    year = {2004}
    }
  • [PDF] M. Jakobsson and L. Yang, “Quantifying security in hybrid cellular networks,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{JY-ACNS05,
    address = {New York, NY},
    author = {Jakobsson, Markus and Yang, Liu},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845890},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05quant.pdf},
    keywords = {mobile, publications},
    month = jun,
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    title = {Quantifying Security in Hybrid Cellular Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-acns05quant.pdf},
    year = {2005}
    }
  • [PDF] L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks,” in Second international conference on security and privacy in communication networks (securecomm), Baltimore, MD, 2006.
    [Bibtex]
    @inproceedings{Yang_discountanonymous,
    address = {Baltimore, MD},
    author = {Yang, Liu and Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {Second International Conference on Security and Privacy in Communication Networks (SECURECOMM)},
    citeulike-article-id = {7845889},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-securecomm06.pdf},
    keywords = {mobile, publications},
    month = jun,
    organization = {IEEE and CREATE-NET},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {IEEE},
    title = {Discount Anonymous On Demand Routing for Mobile Ad hoc Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-securecomm06.pdf},
    year = {2006}
    }
  • [PDF] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Ccsw ’09: proceedings of the 2009 acm workshop on cloud computing security, New York, NY, USA, 2009, pp. 85-90.
    [Bibtex]
    @inproceedings{ccsw09,
    address = {New York, NY, USA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Shi, Elaine and Staddon, Jessica and Masuoka, Ryusuke and Molina, Jesus},
    booktitle = {CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security},
    citeulike-article-id = {7845888},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf},
    keywords = {mobile, publications},
    location = {Chicago, Illinois, USA},
    pages = {85--90},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {ACM},
    title = {Controlling data in the cloud: outsourcing computation without outsourcing control},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf},
    year = {2009}
    }
  • [PDF] N. Ben Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, “Node cooperation in hybrid ad hoc networks,” Ieee transactions on mobile computing, vol. 5, iss. 4, pp. 365-376, 2006.
    [Bibtex]
    @article{node-cooperation-06,
    address = {Piscataway, NJ, USA},
    author = {Ben Salem, Naouel and Buttyan, Levente and Hubaux, Jean-Pierre and Jakobsson, Markus},
    citeulike-article-id = {7845887},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeemc06.pdf},
    journal = {IEEE Transactions on Mobile Computing},
    keywords = {mobile, publications},
    number = {4},
    pages = {365--376},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Node Cooperation in Hybrid Ad Hoc Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ieeemc06.pdf},
    volume = {5},
    year = {2006}
    }
  • [PDF] N. B. Salem, J. Hubaux, and M. Jakobsson, “Reputation-based Wi-Fi deployment,” Sigmobile mob. comput. commun. rev., vol. 9, iss. 3, pp. 69-81, 2005.
    [Bibtex]
    @article{repu-wifi-05,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Hubaux, Jean-Pierre and Jakobsson, Markus},
    citeulike-article-id = {7845886},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-sigmobile05.pdf},
    journal = {SIGMOBILE Mob. Comput. Commun. Rev.},
    keywords = {mobile, publications},
    number = {3},
    pages = {69--81},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {ACM},
    title = {Reputation-based {Wi-Fi} deployment},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-sigmobile05.pdf},
    volume = {9},
    year = {2005}
    }
  • [PDF] M. Jakobsson, A. Juels, and J. Ratkiewicz, Remote-Harm detection.
    [Bibtex]
    @misc{remote-harm-detection,
    author = {Jakobsson, Markus and Juels, Ari and Ratkiewicz, Jacob},
    citeulike-article-id = {7845883},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-rhd.pdf},
    howpublished = {http://rhd.ravenwhitedevelopment.com},
    keywords = {malware, publications},
    posted-at = {2010-09-17 03:26:39},
    priority = {0},
    title = {{Remote-Harm} Detection},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-rhd.pdf}
    }
  • [PDF] M. Jakobsson, A central nervous system for automatically detecting malware, 2009.
    [Bibtex]
    @misc{markus-blog,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845871},
    citeulike-linkout-0 = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    keywords = {fraud, malware, mobile, publications},
    month = sep,
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {A Central Nervous System for Automatically Detecting Malware},
    pdf = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    year = {2009}
    }
  • [PDF] M. Jakobsson and A. Juels, “Server-Side detection of malware infection,” in New security paradigms workshop (nspw), Oxford, UK, 2009.
    [Bibtex]
    @inproceedings{jj09,
    address = {Oxford, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {New Security Paradigms Workshop (NSPW)},
    citeulike-article-id = {7845870},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-nspw09.pdf},
    keywords = {fraud, malware, publications},
    month = sep,
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {ACM},
    title = {{Server-Side} Detection of Malware Infection},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-nspw09.pdf},
    year = {2009}
    }
  • [PDF] M. Jakobsson and K. Johansson, “Retroactive detection of malware with applications to mobile platforms,” in Hotsec 2010, Washington, DC, 2010.
    [Bibtex]
    @inproceedings{JJ10b,
    address = {Washington, DC},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {HotSec 2010},
    citeulike-article-id = {7845869},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    keywords = {fraud, malware, mobile, most-downloaded, publications},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {USENIX},
    title = {Retroactive Detection of Malware With Applications to Mobile Platforms},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    year = {2010}
    }
  • [PDF] M. Jakobsson and K. Johansson, Assured detection of malware with applications to mobile platforms, 2010.
    [Bibtex]
    @misc{JJ10,
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {DIMACS Technical Report 2010-03},
    citeulike-article-id = {7845868},
    citeulike-linkout-0 = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-dimacstr10.pdf},
    howpublished = {\\\\urlhttp://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    keywords = {fraud, malware, mobile, publications},
    pages = {97--110},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {Assured Detection of Malware With Applications to Mobile Platforms},
    pdf = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    year = {2010}
    }
  • [PDF] S. Stamm and M. Jakobsson, Social malware.
    [Bibtex]
    @misc{social-malware,
    author = {Stamm, Sid and Jakobsson, Markus},
    citeulike-article-id = {7845867},
    citeulike-linkout-0 = {http://www.indiana.edu/\~{}phishing/verybigad/},
    howpublished = {\\url{www.indiana.edu/\~{}phishing/verybigad/}},
    keywords = {fraud, malware, publications},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {Social Malware},
    pdf = {http://www.indiana.edu/\~{}phishing/verybigad/}
    }
  • [PDF] V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” Cryptobytes, vol. 8, iss. 1, pp. 18-27, 2007.
    [Bibtex]
    @article{mmn-cb,
    author = {Griffith, Virgil and Jakobsson, Markus},
    citeulike-article-id = {7845866},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    journal = {CryptoBytes},
    keywords = {fraud, publications},
    number = {1},
    pages = {18--27},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {RSA},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    volume = {8},
    year = {2007}
    }
  • [PDF] M. Jakobsson and M. K. Reiter, “Discouraging software piracy using software aging,” in Drm ’01: revised papers from the acm ccs-8 workshop on security and privacy in digital rights management, London, UK, 2002, pp. 1-12.
    [Bibtex]
    @inproceedings{jakobsson-reiter,
    address = {London, UK},
    author = {Jakobsson, Markus and Reiter, Michael K.},
    booktitle = {DRM '01: Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management},
    citeulike-article-id = {7845865},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-drm01.pdf},
    keywords = {fraud, publications},
    pages = {1--12},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Discouraging Software Piracy Using Software Aging},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-drm01.pdf},
    year = {2002}
    }
  • [PDF] M. Jakobsson, “Modeling and preventing phishing attacks,” in Financial cryptography, Roseau, The Commonwealth Of Dominica, 2005.
    [Bibtex]
    @inproceedings{modeling-phishing,
    address = {Roseau, The Commonwealth Of Dominica},
    author = {Jakobsson, Markus},
    booktitle = {Financial Cryptography},
    citeulike-article-id = {7845864},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    keywords = {fraud, phishing, publications},
    month = feb,
    organization = {IFCA},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Modeling and Preventing Phishing Attacks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc05.pdf},
    year = {2005}
    }
  • [PDF] V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{mmn,
    address = {New York, NY},
    author = {Griffith, Virgil and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845863},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    keywords = {fraud, most-downloaded, privacy, publications},
    month = jun,
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    year = {2005}
    }
  • [PDF] M. Jakobsson and S. Stamm, “Invasive browser sniffing and countermeasures,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 523-532.
    [Bibtex]
    @inproceedings{invasive-sniffing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845862},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    keywords = {fraud, privacy, publications},
    location = {Edinburgh, Scotland},
    pages = {523--532},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Invasive browser sniffing and countermeasures},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    year = {2006}
    }
  • [PDF] J. Y. Choi, P. Golle, and M. Jakobsson, “Tamper-Evident digital signature protecting certification authorities against malware,” in Dasc ’06: proceedings of the 2nd ieee international symposium on dependable, autonomic and secure computing, Washington, DC, USA, 2006, pp. 37-44.
    [Bibtex]
    @inproceedings{choi-tamper-evident,
    address = {Washington, DC, USA},
    author = {Choi, Jong Y. and Golle, Philippe and Jakobsson, Markus},
    booktitle = {DASC '06: Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing},
    citeulike-article-id = {7845861},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-dasc06.pdf},
    keywords = {fraud, malware, publications},
    pages = {37--44},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Computer Society},
    title = {{Tamper-Evident} Digital Signature Protecting Certification Authorities Against Malware},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-dasc06.pdf},
    year = {2006}
    }
  • [PDF] M. Jakobsson, “The human factor in phishing,” in Privacy and security of consumer information ’07, 2007.
    [Bibtex]
    @inproceedings{thehuman-factor,
    author = {Jakobsson, Markus},
    booktitle = {Privacy and Security of Consumer Information '07},
    citeulike-article-id = {7845860},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Human Factor in Phishing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-psci07.pdf},
    year = {2007}
    }
  • [PDF] V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad, “Phishing IQ tests measure fear, not ability,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 362-366.
    [Bibtex]
    @inproceedings{measure-fear,
    address = {Berlin, Heidelberg},
    author = {Anandpara, Vivek and Dingman, Andrew and Jakobsson, Markus and Liu, Debin and Roinestad, Heather},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845859},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {362--366},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Phishing {IQ} tests measure fear, not ability},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-usec07-fear.pdf},
    year = {2007}
    }
  • [PDF] M. Jakobsson, A. Tsow, A. Shah, E. Blevis, and Y. Lim, “What instills trust? a qualitative study of phishing,” in Fc’07/usec’07: proceedings of the 11th international conference on financial cryptography and 1st international conference on usable security, Berlin, Heidelberg, 2007, pp. 356-361.
    [Bibtex]
    @inproceedings{instills-trust,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Tsow, Alex and Shah, Ankur and Blevis, Eli and Lim, Youn-Kyung},
    booktitle = {FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security},
    citeulike-article-id = {7845858},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    keywords = {fraud, phishing, publications, user-experiments},
    location = {Scarborough, Trinidad and Tobago},
    pages = {356--361},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {What instills trust? a qualitative study of phishing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-usec07-trust.pdf},
    year = {2007}
    }
  • [PDF] S. Stamm, Z. Ramzan, and M. Jakobsson, “Drive-by pharming,” in Icics’07: proceedings of the 9th international conference on information and communications security, Berlin, Heidelberg, 2007, pp. 495-506.
    [Bibtex]
    @inproceedings{drive-by-pharming,
    address = {Berlin, Heidelberg},
    author = {Stamm, Sid and Ramzan, Zulfikar and Jakobsson, Markus},
    booktitle = {ICICS'07: Proceedings of the 9th international conference on Information and communications security},
    citeulike-article-id = {7845857},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-icics07.pdf},
    keywords = {fraud, malware, publications},
    location = {Zhengzhou, China},
    pages = {495--506},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Drive-by pharming},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-icics07.pdf},
    year = {2007}
    }
  • R. Chow, P. Golle, M. Jakobsson, and X. Wang, “Clickable CAPTCHAs,” in Adfraud ’07 workshop, Stanford, CA, 2007.
    [Bibtex]
    @inproceedings{clickable-capcha-stanford,
    address = {Stanford, CA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Wang, Xiaofeng},
    booktitle = {AdFraud '07 Workshop},
    citeulike-article-id = {7845856},
    keywords = {fraud, publications},
    month = sep,
    organization = {Stanford University},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Clickable {CAPTCHAs}},
    year = {2007}
    }
  • [PDF] M. Jakobsson, Z. Ramzan, and S. Stamm, “JavaScript breaks free,” in Web 2.0 security and privacy, Oakland, CA, 2007.
    [Bibtex]
    @inproceedings{Jakobsson_web2.0,
    address = {Oakland, CA},
    author = {Jakobsson, Markus and Ramzan, Zulfikar and Stamm, Sid},
    booktitle = {Web 2.0 Security and Privacy},
    citeulike-article-id = {7845855},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-web20sp07.pdf},
    keywords = {fraud, malware, publications},
    month = may,
    organization = {IEEE},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {{JavaScript} Breaks Free},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-web20sp07.pdf},
    year = {2007}
    }
  • [PDF] C. Soghoian, O. Friedrichs, and M. Jakobsson, “The threat of political phishing,” in International symposium on human aspects of information security & assurance (haisa 2008), Port Elizabeth, South Africa, 2008.
    [Bibtex]
    @inproceedings{political-phishing,
    address = {Port Elizabeth, South Africa},
    author = {Soghoian, Christopher and Friedrichs, Oliver and Jakobsson, Markus},
    booktitle = {International Symposium on Human Aspects of Information Security \& Assurance (HAISA 2008)},
    citeulike-article-id = {7845854},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    keywords = {fraud, phishing, publications},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {The Threat of Political Phishing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-haisa08.pdf},
    year = {2008}
    }
  • [PDF] M. Gandhi, M. Jakobsson, and J. Ratkiewicz, “Badvertisements: stealthy click-fraud with unwitting accessories,” Journal of digital forensics practice, vol. 1, iss. 2, 2006.
    [Bibtex]
    @article{badvertisements,
    author = {Gandhi, Mona and Jakobsson, Markus and Ratkiewicz, Jacob},
    citeulike-article-id = {7845853},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    journal = {Journal of Digital Forensics Practice},
    keywords = {fraud, malware, most-downloaded, publications},
    number = {2},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Taylor \& Francis},
    title = {Badvertisements: Stealthy click-fraud with unwitting accessories},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-jdfp06.pdf},
    volume = {1},
    year = {2006}
    }
  • [PDF] A. Tsow, M. Jakobsson, L. Yang, and S. Wetzel, “Warkitting: the drive-by subversion of wireless home routers,” Journal of digital forensics practice, vol. 1, iss. 3, pp. 179-192, 2006.
    [Bibtex]
    @article{warkitting,
    author = {Tsow, Alex and Jakobsson, Markus and Yang, Liu and Wetzel, Susanne},
    citeulike-article-id = {7845852},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-jdfp06-warkit.pdf},
    journal = {Journal of Digital Forensics Practice},
    keywords = {fraud, malware, publications},
    number = {3},
    pages = {179--192},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {Taylor \& Francis},
    title = {Warkitting: the Drive-by Subversion of Wireless Home Routers},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-jdfp06-warkit.pdf},
    volume = {1},
    year = {2006}
    }
  • [PDF] T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, “Social phishing,” Commun. acm, vol. 50, iss. 10, pp. 94-100, 2007.
    [Bibtex]
    @article{social-phishing,
    address = {New York, NY, USA},
    author = {Jagatic, Tom N. and Johnson, Nathaniel A. and Jakobsson, Markus and Menczer, Filippo},
    citeulike-article-id = {7845851},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    journal = {Commun. ACM},
    keywords = {facebook, fraud, most-downloaded, phishing, publications, user-experiments},
    number = {10},
    pages = {94--100},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Social phishing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-commacm07.pdf},
    volume = {50},
    year = {2007}
    }
  • [PDF] P. Finn and M. Jakobsson, “Designing and conducting phishing experiments,” in In ieee technology and society magazine, special issue on usability and security, 2007.
    [Bibtex]
    @inproceedings{Finn07designingand,
    author = {Finn, Peter and Jakobsson, Markus},
    booktitle = {In IEEE Technology and Society Magazine, Special Issue on Usability and Security},
    citeulike-article-id = {7845850},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    keywords = {fraud, most-downloaded, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE},
    title = {Designing and Conducting Phishing Experiments},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ieeets07.pdf},
    year = {2007}
    }
  • [PDF] M. Jakobsson and S. Stamm, “Web camouflage: protecting your clients from Browser-Sniffing attacks,” Ieee security and privacy, vol. 5, iss. 6, pp. 16-24, 2007.
    [Bibtex]
    @article{web-camoulfage,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    citeulike-article-id = {7845849},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, privacy, publications},
    number = {6},
    pages = {16--24},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Web Camouflage: Protecting Your Clients from {Browser-Sniffing} Attacks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    volume = {5},
    year = {2007}
    }
  • [PDF] M. Jakobsson, N. Johnson, and P. Finn, “Why and how to perform fraud experiments,” Ieee security and privacy, vol. 6, iss. 2, pp. 66-68, 2008.
    [Bibtex]
    @article{fraud-exp,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Johnson, Nathaniel and Finn, Peter},
    citeulike-article-id = {7845848},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, publications, user-experiments},
    number = {2},
    pages = {66--68},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Why and How to Perform Fraud Experiments},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ieeesp08.pdf},
    volume = {6},
    year = {2008}
    }
  • [PDF] M. Jakobsson, J. P. Stern, and M. Yung, “Scramble all, encrypt small,” in Fse ’99: proceedings of the 6th international workshop on fast software encryption, London, UK, 1999, pp. 95-111.
    [Bibtex]
    @inproceedings{scramble-all,
    address = {London, UK},
    author = {Jakobsson, Markus and Stern, Julien P. and Yung, Moti},
    booktitle = {FSE '99: Proceedings of the 6th International Workshop on Fast Software Encryption},
    citeulike-article-id = {7845836},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fse99.pdf},
    keywords = {encryption, publications},
    pages = {95--111},
    posted-at = {2010-09-17 03:22:33},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Scramble All, Encrypt Small},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fse99.pdf},
    year = {1999}
    }
  • [PDF] A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Wpes ’05: proceedings of the 2005 acm workshop on privacy in the electronic society, New York, NY, USA, 2005, pp. 61-70.
    [Bibtex]
    @inproceedings{JCJ-wpes05,
    address = {New York, NY, USA},
    author = {Juels, Ari and Catalano, Dario and Jakobsson, Markus},
    booktitle = {WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845835},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    keywords = {encryption, privacy, publications},
    location = {Alexandria, VA, USA},
    pages = {61--70},
    posted-at = {2010-09-17 03:22:32},
    priority = {0},
    publisher = {ACM},
    title = {Coercion-resistant electronic elections},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    year = {2005}
    }
  • [PDF] P. G. Jong Youl Choi and M. Jakobsson, “Auditable privacy: on Tamper-Evident mix networks,” in Proceeding of financial cryptography and data security, Anguilla, British West Indies, 2006, pp. 126-141.
    [Bibtex]
    @inproceedings{CGJ-2006,
    address = {Anguilla, British West Indies},
    author = {Jong Youl Choi, Philippe G. and Jakobsson, Markus},
    booktitle = {Proceeding of Financial Cryptography and Data Security},
    citeulike-article-id = {7845834},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    keywords = {encryption, malware, privacy, publications},
    month = feb,
    pages = {126--141},
    posted-at = {2010-09-17 03:22:31},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Auditable Privacy: On {Tamper-Evident} Mix Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    volume = {LNCS 4107},
    year = {2006}
    }
  • M. Jakobsson, “Cryptographic privacy protection techniques,” in The handbook of information security, H. Bidgoli, Ed., Hoboken, NJ: John Wiley & Sons, Inc., 2005.
    [Bibtex]
    @incollection{privacy-tech,
    address = {Hoboken, NJ},
    author = {Jakobsson, Markus},
    booktitle = {The Handbook of Information Security},
    citeulike-article-id = {7845833},
    editor = {Bidgoli, Hossein},
    keywords = {encryption, publications},
    posted-at = {2010-09-17 03:22:31},
    priority = {0},
    publisher = {John Wiley \& Sons, Inc.},
    title = {Cryptographic Privacy Protection Techniques},
    year = {2005}
    }
  • [PDF] S. Srikwan and M. Jakobsson, “Using cartoons to teach internet security,” Cryptologia, vol. 32, iss. 2, pp. 137-154, 2008.
    [Bibtex]
    @article{sec-cartoon,
    address = {Bristol, PA, USA},
    author = {Srikwan, Sukamol and Jakobsson, Markus},
    citeulike-article-id = {7845827},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    journal = {Cryptologia},
    keywords = {education, fraud, malware, phishing, publications},
    number = {2},
    pages = {137--154},
    posted-at = {2010-09-17 03:21:32},
    priority = {0},
    publisher = {Taylor \& Francis, Inc.},
    title = {Using Cartoons to Teach Internet Security},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-cryptologia08.pdf},
    volume = {32},
    year = {2008}
    }
  • [PDF] M. Jakobsson, “A practical mix,” in Advances in cryptology — eurocrypt ’98, London, UK, 1998, pp. 448-461.
    [Bibtex]
    @inproceedings{practical-mix,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {Advances in Cryptology -- EuroCrypt '98},
    citeulike-article-id = {7845826},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    comment = {LNCS 1403},
    keywords = {distributed-computing, encryption, publications},
    pages = {448--461},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {A Practical Mix},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    year = {1998}
    }
  • [PDF] M. Jakobsson and D. M’Ra"{i}hi, “Mix-Based electronic payments,” in Sac ’98: proceedings of the selected areas in cryptography, London, UK, 1999, pp. 157-173.
    [Bibtex]
    @inproceedings{mix-based-epayment,
    address = {London, UK},
    author = {Jakobsson, Markus and M'Ra"{\i}hi, David},
    booktitle = {SAC '98: Proceedings of the Selected Areas in Cryptography},
    citeulike-article-id = {7845825},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {157--173},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Mix-Based} Electronic Payments},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    year = {1999}
    }
  • [PDF] M. Jakobsson, “On quorum controlled asymmetric proxy re-encryption,” in Pkc ’99: proceedings of the second international workshop on practice and theory in public key cryptography, London, UK, 1999, pp. 112-121.
    [Bibtex]
    @inproceedings{asym-proxy-reencryption,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845824},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {112--121},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {On Quorum Controlled Asymmetric Proxy Re-encryption},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    year = {1999}
    }
  • [PDF] M. Jakobsson, “Flash mixing,” in Podc ’99: proceedings of the eighteenth annual acm symposium on principles of distributed computing, New York, NY, USA, 1999, pp. 83-89.
    [Bibtex]
    @inproceedings{flash-mixing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus},
    booktitle = {PODC '99: Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845823},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Atlanta, Georgia, United States},
    pages = {83--89},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM},
    title = {Flash mixing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    year = {1999}
    }
  • [PDF] M. Jakobsson and A. Juels, “Mix and match: secure function evaluation via ciphertexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 162-177.
    [Bibtex]
    @inproceedings{mix-match,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845822},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {162--177},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mix and Match: Secure Function Evaluation via Ciphertexts},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    year = {2000}
    }
  • [PDF] M. Jakobsson and A. Juels, “Addition of ElGamal plaintexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 346-358.
    [Bibtex]
    @inproceedings{add-elgamal,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845821},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {346--358},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Addition of {ElGamal} Plaintexts},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    year = {2000}
    }
  • [PDF] M. Jakobsson and A. Juels, “An optimally robust hybrid mix network,” in Podc ’01: proceedings of the twentieth annual acm symposium on principles of distributed computing, New York, NY, USA, 2001, pp. 284-292.
    [Bibtex]
    @inproceedings{JJ01,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845820},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Newport, Rhode Island, United States},
    pages = {284--292},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM Press},
    title = {An optimally robust hybrid mix network},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    year = {2001}
    }
  • [PDF] M. Jakobsson, A. Juels, and R. L. Rivest, “Making mix nets robust for electronic voting by randomized partial checking,” in Proceedings of the 11th usenix security symposium, Berkeley, CA, USA, 2002, pp. 339-353.
    [Bibtex]
    @inproceedings{mix-net-usenix-02,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Juels, Ari and Rivest, Ronald L.},
    booktitle = {Proceedings of the 11th USENIX Security Symposium},
    citeulike-article-id = {7845819},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {339--353},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {USENIX Association},
    title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    year = {2002}
    }
  • [PDF] P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels, “Optimistic mixing for Exit-Polls,” in Asiacrypt ’02: proceedings of the 8th international conference on the theory and application of cryptology and information security, London, UK, 2002, pp. 451-465.
    [Bibtex]
    @inproceedings{optimistic-mixing,
    address = {London, UK},
    author = {Golle, Philippe and Zhong, Sheng and Boneh, Dan and Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845818},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    keywords = {distributed-computing, privacy, publications},
    pages = {451--465},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Optimistic Mixing for {Exit-Polls}},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    year = {2002}
    }
  • [PDF] P. Golle, X. Wang, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix networks,” in Ieee symposium on security and privacy, Oakland, California, 2006, pp. 121-131.
    [Bibtex]
    @inproceedings{deterring-mix-sp06,
    address = {Oakland, California},
    author = {Golle, Philippe and Wang, XiaoFeng and Jakobsson, Markus and Tsow, Alex},
    booktitle = {IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845817},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    month = may,
    organization = {IEEE},
    pages = {121--131},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {IEEE},
    title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    year = {2006}
    }
  • [PDF] X. Wang, P. Golle, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix-networks,” Acm trans. inf. syst. secur., vol. 13, iss. 2, pp. 1-24, 2010.
    [Bibtex]
    @article{wang-golle-10,
    address = {New York, NY, USA},
    author = {Wang, Xiaofeng and Golle, Philippe and Jakobsson, Markus and Tsow, Alex},
    citeulike-article-id = {7845816},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    journal = {ACM Trans. Inf. Syst. Secur.},
    keywords = {distributed-computing, encryption, privacy, publications},
    number = {2},
    pages = {1--24},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {ACM},
    title = {Deterring voluntary trace disclosure in re-encryption mix-networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    volume = {13},
    year = {2010}
    }
  • [PDF] M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, “A practical secure physical random bit generator,” in Ccs ’98: proceedings of the 5th acm conference on computer and communications security, New York, NY, USA, 1998, pp. 103-111.
    [Bibtex]
    @inproceedings{random-bit-gen,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Shriver, Elizabeth and Hillyer, Bruce K. and Juels, Ari},
    booktitle = {CCS '98: Proceedings of the 5th ACM conference on Computer and communications security},
    citeulike-article-id = {7845799},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    keywords = {building-blocks, most-downloaded, publications},
    location = {San Francisco, California, United States},
    pages = {103--111},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {A practical secure physical random bit generator},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ccs98.pdf},
    year = {1998}
    }
  • [PDF] G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, “How to forget a secret,” in Stacs’99: proceedings of the 16th annual conference on theoretical aspects of computer science, Berlin, Heidelberg, 1999, pp. 500-509.
    [Bibtex]
    @inproceedings{forget-secret,
    address = {Berlin, Heidelberg},
    author = {Di Crescenzo, Giovanni and Ferguson, Niels and Impagliazzo, Russell and Jakobsson, Markus},
    booktitle = {STACS'99: Proceedings of the 16th annual conference on Theoretical aspects of computer science},
    citeulike-article-id = {7845798},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    keywords = {building-blocks, privacy, publications},
    location = {Trier, Germany},
    pages = {500--509},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {How to forget a secret},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    year = {1999}
    }
  • [PDF] D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 102-119.
    [Bibtex]
    @inproceedings{coppersmith-jakobsson,
    address = {Berlin, Heidelberg},
    author = {Coppersmith, Don and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7845797},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    keywords = {building-blocks, mobile, most-downloaded, privacy, publications},
    location = {Southampton, Bermuda},
    pages = {102--119},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Almost optimal hash sequence traversal},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    year = {2003}
    }
  • [PDF] M. Jakobsson, “Fractal hash sequence representation and traversal,” in Proceedings of the 2002 ieee international symposium on information theory (isit `02), Palais de Beaulieu, Lausanne, Switzerland, 2002, pp. 437-444.
    [Bibtex]
    @inproceedings{Jakobsson02,
    address = {Palais de Beaulieu, Lausanne, Switzerland},
    author = {Jakobsson, M.},
    booktitle = {Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT `02)},
    citeulike-article-id = {7845796},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    keywords = {building-blocks, mobile, publications},
    month = jun,
    organization = {IEEE},
    pages = {437--444},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Fractal Hash Sequence Representation and Traversal},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    year = {2002}
    }
  • [PDF] A. Boldyreva and M. Jakobsson, “Theft-Protected proprietary certificates,” in Digital rights management ’02: acm ccs-9 workshop, London, UK, 2002, pp. 208-220.
    [Bibtex]
    @inproceedings{JW01,
    address = {London, UK},
    author = {Boldyreva, Alexandra and Jakobsson, Markus},
    booktitle = {Digital Rights Management '02: ACM CCS-9 Workshop},
    citeulike-article-id = {7845795},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-drm02.pdf},
    comment = {LNCS 2696},
    keywords = {building-blocks, publications},
    pages = {208--220},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Theft-Protected} Proprietary Certificates},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-drm02.pdf},
    year = {2002}
    }
  • [PDF] M. Jakobsson, T. Leighton, S. Micali, and M. Szydlo, “Fractal merkle tree representation and traversal,” in Ct-rsa’03: proceedings of the 2003 rsa conference on the cryptographers’ track, Berlin, Heidelberg, 2003, pp. 314-326.
    [Bibtex]
    @inproceedings{merkle-tree,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Leighton, Tom and Micali, Silvio and Szydlo, Michael},
    booktitle = {CT-RSA'03: Proceedings of the 2003 RSA conference on The cryptographers' track},
    citeulike-article-id = {7845794},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    keywords = {building-blocks, mobile, publications},
    location = {San Francisco, CA, USA},
    pages = {314--326},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Fractal Merkle tree representation and traversal},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    year = {2003}
    }
  • [PDF] P. Golle and M. Jakobsson, “Reusable anonymous return channels,” in Wpes ’03: proceedings of the 2003 acm workshop on privacy in the electronic society, New York, NY, USA, 2003, pp. 94-100.
    [Bibtex]
    @inproceedings{reusable-anonymous,
    address = {New York, NY, USA},
    author = {Golle, Philippe and Jakobsson, Markus},
    booktitle = {WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845793},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    location = {Washington, DC},
    pages = {94--100},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Reusable anonymous return channels},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    year = {2003}
    }
  • [PDF] Y. Hu, A. Perrig, and M. Jakobsson, “Efficient constructions for one-way hash chains.,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{HPJ-ACNS05,
    address = {New York, NY},
    author = {Hu, Yih-Chun and Perrig, Andiran and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845792},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    keywords = {building-blocks, encryption, publications},
    month = jun,
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Efficient Constructions for One-way Hash Chains.},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    year = {2005}
    }
  • [PDF] P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal re-encryption for mixnets,” in Topics in cryptology ct-rsa 2004, London, UK, 2004, pp. 163-178.
    [Bibtex]
    @inproceedings{GJJS04,
    address = {London, UK},
    author = {Golle, Philippe and Jakobsson, Markus and Juels, Ari and Syverson, Paul},
    booktitle = {Topics in Cryptology CT-RSA 2004},
    citeulike-article-id = {7845791},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    comment = {LNCS 2964},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    pages = {163--178},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Universal Re-encryption for Mixnets},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    year = {2004}
    }
  • [PDF] A. Ambainis, M. Jakobsson, and H. Lipmaa, “Cryptographic randomized response techniques,” in Public key cryptography: 7th international workshop on theory and practice in public key cryptography, London, UK, 2004, pp. 425-438.
    [Bibtex]
    @inproceedings{JY98,
    address = {London, UK},
    author = {Ambainis, Andris and Jakobsson, Markus and Lipmaa, Helger},
    booktitle = {Public Key Cryptography: 7th International Workshop on Theory and Practice in Public Key Cryptography},
    citeulike-article-id = {7845790},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc04.pdf},
    comment = {LNCS 2947},
    keywords = {building-blocks, publications},
    pages = {425--438},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Randomized Response Techniques},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-pkc04.pdf},
    year = {2004}
    }
  • [PDF] R. Chow, P. Golle, M. Jakobsson, L. Wang, and X. Wang, “Making CAPTCHAs clickable,” in Hotmobile ’08: proceedings of the 9th workshop on mobile computing systems and applications, New York, NY, USA, 2008, pp. 91-94.
    [Bibtex]
    @inproceedings{click-captcha,
    address = {New York, NY, USA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Wang, Lusha and Wang, XiaoFeng},
    booktitle = {HotMobile '08: Proceedings of the 9th workshop on Mobile computing systems and applications},
    citeulike-article-id = {7845789},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    keywords = {building-blocks, captcha, mobile, publications},
    location = {Napa Valley, California},
    pages = {91--94},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Making {CAPTCHAs} clickable},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    year = {2008}
    }
  • [PDF] A. Juels, M. Jakobsson, E. Shriver, and B. Hillyer, “How to turn loaded dice into fair coins,” Ieeetit: ieee transactions on information theory, vol. 46, iss. 3, pp. 911-921, 2000.
    [Bibtex]
    @article{JJSH00,
    author = {Juels, A. and Jakobsson, M. and Shriver, E. and Hillyer, B.},
    citeulike-article-id = {7845788},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf},
    journal = {IEEETIT: IEEE Transactions on Information Theory},
    keywords = {building-blocks, publications},
    number = {3},
    pages = {911--921},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {How to Turn Loaded Dice into Fair Coins},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ieeeit00.pdf},
    volume = {46},
    year = {2000}
    }
  • [PDF] M. Jakobsson, “Privacy vs. authenticity,” PhD Thesis, San Diego, CA, 1997.
    [Bibtex]
    @phdthesis{privacy-and-auth,
    address = {San Diego, CA},
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845778},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ucsd97.pdf},
    keywords = {authentication, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    school = {University of California at San Diego},
    title = {Privacy vs. Authenticity},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ucsd97.pdf},
    year = {1997}
    }
  • [PDF] M. Jakobsson, “Social engineering 2.0: what’s next,” Mcafee security journal, 2008.
    [Bibtex]
    @article{social-engineering2,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845777},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    journal = {McAfee Security Journal},
    keywords = {authentication, fraud, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    title = {Social Engineering 2.0: What's Next},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    year = {2008}
    }
  • [PDF] M. Jakobsson, Reducing costs in identification protocols, 1992.
    [Bibtex]
    @misc{Jakobsson92,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845776},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto92.pdf},
    howpublished = {Rump Session, InCrypto '92},
    keywords = {authentication, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    title = {Reducing costs in identification protocols},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-crypto92.pdf},
    year = {1992}
    }
  • [PDF] M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Eurocrypt’96: proceedings of the 15th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1996, pp. 143-154.
    [Bibtex]
    @inproceedings{verifier-proofs,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Sako, Kazue and Impagliazzo, Russell},
    booktitle = {EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845775},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    keywords = {authentication, building-blocks, most-downloaded, privacy, publications},
    location = {Saragossa, Spain},
    pages = {143--154},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Designated verifier proofs and their applications},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    year = {1996}
    }
  • [PDF] M. Jakobsson and M. Yung, “Proving without knowing: on oblivious, agnostic and blindolded provers,” in Crypto ’96: proceedings of the 16th annual international cryptology conference on advances in cryptology, London, UK, 1996, pp. 186-200.
    [Bibtex]
    @inproceedings{proving-without-know,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845774},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    keywords = {authentication, building-blocks, privacy, publications},
    pages = {186--200},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    year = {1996}
    }
  • [PDF] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive public key and signature systems,” in Ccs ’97: proceedings of the 4th acm conference on computer and communications security, New York, NY, USA, 1997, pp. 100-110.
    [Bibtex]
    @inproceedings{HJJKY97,
    address = {New York, NY, USA},
    author = {Herzberg, Amir and Jakobsson, Markus and Jarecki, Stanisl\&\#322;aw and Krawczyk, Hugo and Yung, Moti},
    booktitle = {CCS '97: Proceedings of the 4th ACM conference on Computer and communications security},
    citeulike-article-id = {7845773},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Zurich, Switzerland},
    pages = {100--110},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {ACM Press},
    title = {Proactive public key and signature systems},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    year = {1997}
    }
  • [PDF] M. Jakobsson and M. Yung, “Distributed "magic ink" signatures,” in Eurocrypt’97: proceedings of the 16th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1997, pp. 450-464.
    [Bibtex]
    @inproceedings{distr-majic-ink,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {EUROCRYPT'97: Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845772},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Konstanz, Germany},
    pages = {450--464},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Distributed "magic ink" signatures},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    year = {1997}
    }
  • [PDF] E. Gabber, M. Jakobsson, Y. Matias, and A. J. Mayer, “Curbing junk E-Mail via secure classification,” in Fc ’98: proceedings of the second international conference on financial cryptography, London, UK, 1998, pp. 198-213.
    [Bibtex]
    @inproceedings{curb-junk-email,
    address = {London, UK},
    author = {Gabber, Eran and Jakobsson, Markus and Matias, Yossi and Mayer, Alain J.},
    booktitle = {FC '98: Proceedings of the Second International Conference on Financial Cryptography},
    citeulike-article-id = {7845771},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    keywords = {authentication, fraud, publications},
    pages = {198--213},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Curbing Junk {E-Mail} via Secure Classification},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    year = {1998}
    }
  • [PDF] M. Jakobsson and J. Müller, “Improved magic ink signatures using hints,” in Fc ’99: proceedings of the third international conference on financial cryptography, London, UK, 1999, pp. 253-268.
    [Bibtex]
    @inproceedings{im-majic-ink,
    address = {London, UK},
    author = {Jakobsson, Markus and M\"{u}ller, Joy},
    booktitle = {FC '99: Proceedings of the Third International Conference on Financial Cryptography},
    citeulike-article-id = {7845770},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    keywords = {authentication, distributed-computing, publications},
    pages = {253--268},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Improved Magic Ink Signatures Using Hints},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    year = {1999}
    }
  • [PDF] J. A. Garay, M. Jakobsson, and P. D. MacKenzie, “Abuse-Free optimistic contract signing,” in Crypto ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology, London, UK, 1999, pp. 449-466.
    [Bibtex]
    @inproceedings{abuse-free-contract,
    address = {London, UK},
    author = {Garay, Juan A. and Jakobsson, Markus and MacKenzie, Philip D.},
    booktitle = {CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845769},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    keywords = {authentication, building-blocks, encryption, publications},
    pages = {449--466},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Abuse-Free} Optimistic Contract Signing},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    year = {1999}
    }
  • [PDF] P. Bohannon, M. Jakobsson, and S. Srikwan, “Cryptographic approaches to provacy in forensic DNA databases,” in Pkc ’00: proceedings of the third international workshop on practice and theory in public key cryptography, London, UK, 2000, pp. 373-390.
    [Bibtex]
    @inproceedings{dna-database,
    address = {London, UK},
    author = {Bohannon, Philip and Jakobsson, Markus and Srikwan, Sukamol},
    booktitle = {PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845768},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    keywords = {authentication, encryption, privacy, publications},
    pages = {373--390},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    year = {2000}
    }
  • [PDF] C. Schnorr and M. Jakobsson, “Security of signed ElGamal encryption,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 73-89.
    [Bibtex]
    @inproceedings{signed-elgamal-enc,
    address = {London, UK},
    author = {Schnorr, Claus-Peter and Jakobsson, Markus},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845767},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00.pdf},
    keywords = {authentication, publications},
    pages = {73--89},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Security of Signed {ElGamal} Encryption},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00.pdf},
    year = {2000}
    }
  • [PDF] M. Jakobsson and S. Wetzel, “Secure Server-Aided signature generation,” in Pkc ’01: proceedings of the 4th international workshop on practice and theory in public key cryptography, London, UK, 2001, pp. 383-401.
    [Bibtex]
    @inproceedings{server-key-gen,
    address = {London, UK},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845766},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc01.pdf},
    keywords = {authentication, publications},
    pages = {383--401},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Secure {Server-Aided} Signature Generation},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-pkc01.pdf},
    year = {2001}
    }
  • [PDF] P. D. MacKenzie, T. Shrimpton, and M. Jakobsson, “Threshold Password-Authenticated key exchange,” in Crypto ’02: proceedings of the 22nd annual international cryptology conference on advances in cryptology, London, UK, 2002, pp. 385-400.
    [Bibtex]
    @inproceedings{MSJ02,
    address = {London, UK},
    author = {MacKenzie, Philip D. and Shrimpton, Thomas and Jakobsson, Markus},
    booktitle = {CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845765},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    comment = {LNCS 2442},
    keywords = {authentication, distributed-computing, publications},
    pages = {385--400},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Threshold {Password-Authenticated} Key Exchange},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    year = {2002}
    }
  • [PDF] M. Jakobsson and S. Wetzel, “Efficient attribute authentication with applications to ad hoc networks,” in Vanet ’04: proceedings of the 1st acm international workshop on vehicular ad hoc networks, New York, NY, USA, 2004, pp. 38-46.
    [Bibtex]
    @inproceedings{JW-VANET04,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {VANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks},
    citeulike-article-id = {7845764},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    keywords = {authentication, mobile, publications},
    location = {Philadelphia, PA, USA},
    pages = {38--46},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Efficient attribute authentication with applications to ad hoc networks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    year = {2004}
    }
  • [PDF] M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • [PDF] A. Juels, M. Jakobsson, and T. N. Jagatic, “Cache cookies for browser authentication (extended abstract),” in Sp ’06: proceedings of the 2006 ieee symposium on security and privacy, Washington, DC, USA, 2006, pp. 301-305.
    [Bibtex]
    @inproceedings{cache-cookie-sp06,
    address = {Washington, DC, USA},
    author = {Juels, Ari and Jakobsson, Markus and Jagatic, Tom N.},
    booktitle = {SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845762},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    keywords = {authentication, fraud, publications},
    pages = {301--305},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {IEEE Computer Society},
    title = {Cache Cookies for Browser Authentication (Extended Abstract)},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    year = {2006}
    }
  • [PDF] A. Juels, S. Stamm, and M. Jakobsson, “Combatting click fraud via premium clicks,” in Ss’07: proceedings of 16th usenix security symposium on usenix security symposium, Berkeley, CA, USA, 2007, pp. 1-10.
    [Bibtex]
    @inproceedings{premium-clicks,
    address = {Berkeley, CA, USA},
    author = {Juels, Ari and Stamm, Sid and Jakobsson, Markus},
    booktitle = {SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium},
    citeulike-article-id = {7845761},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Boston, MA},
    pages = {1--10},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX Association},
    title = {Combatting click fraud via premium clicks},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    year = {2007}
    }
  • [PDF] M. Jakobsson and S. Myers, “Delayed password disclosure,” in Dim ’07: proceedings of the 2007 acm workshop on digital identity management, New York, NY, USA, 2007, pp. 17-26.
    [Bibtex]
    @inproceedings{delayed-pwd-dim07,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Myers, Steven},
    booktitle = {DIM '07: Proceedings of the 2007 ACM workshop on Digital identity management},
    citeulike-article-id = {7845760},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Fairfax, Virginia, USA},
    pages = {17--26},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Delayed password disclosure},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    year = {2007}
    }
  • [PDF] M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang, “Love and authentication,” in Chi ’08: proceeding of the twenty-sixth annual sigchi conference on human factors in computing systems, New York, NY, USA, 2008, pp. 197-200.
    [Bibtex]
    @inproceedings{love-auth-chi08,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stolterman, Erik and Wetzel, Susanne and Yang, Liu},
    booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems},
    citeulike-article-id = {7845759},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    keywords = {authentication, most-downloaded, publications, user-experiments},
    location = {Florence, Italy},
    pages = {197--200},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Love and authentication},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    year = {2008}
    }
  • [PDF] M. Jakobsson, E. Shi, and R. Chow, “Implicit authentication for mobile devices,” in The 4th usenix workshop on hot topics in security (hotsec’09), Montreal, Canada, 2009.
    [Bibtex]
    @inproceedings{imp-auth-89,
    address = {Montreal, Canada},
    author = {Jakobsson, Markus and Shi, Elaine and Chow, Richard},
    booktitle = {The 4th USENIX Workshop on Hot Topics in Security (HotSec'09)},
    citeulike-article-id = {7845758},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    keywords = {authentication, mobile, publications, user-experiments},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX},
    title = {Implicit authentication for mobile devices},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    year = {2009}
    }
  • [PDF] M. Jakobsson and S. Myers, “Delayed password disclosure,” Int. j. appl. cryptol., vol. 1, iss. 1, pp. 47-59, 2008.
    [Bibtex]
    @article{delayed-pwd,
    address = {Inderscience Publishers, Geneva, SWITZERLAND},
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845757},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    journal = {Int. J. Appl. Cryptol.},
    keywords = {authentication, fraud, phishing, publications},
    number = {1},
    pages = {47--59},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Inderscience Publishers},
    title = {Delayed password disclosure},
    pdf = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    volume = {1},
    year = {2008}
    }
  • M. Jakobsson and A. Tsow, “Identify theft,” in Computer and information security handbook, J. R. Vacca, Ed., Burlington, MA: Morgan Kaufmann, 2008, p. 519.
    [Bibtex]
    @incollection{cis-handbook,
    address = {Burlington, MA},
    author = {Jakobsson, Markus and Tsow, Alex},
    booktitle = {Computer And Information Security Handbook},
    chapter = {31},
    citeulike-article-id = {7845754},
    editor = {Vacca, John R.},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    pages = {519},
    posted-at = {2010-09-17 03:05:09},
    priority = {0},
    publisher = {Morgan Kaufmann},
    title = {Identify Theft},
    year = {2008}
    }
  • M. Jakobsson, C. Soghoian, and S. Stamm, “Phishing,” in Handbook of financial cryptography, B. Rosenberg, Ed., CRC Press, 2008.
    [Bibtex]
    @incollection{handbook-fc,
    author = {Jakobsson, Markus and Soghoian, Christopher and Stamm, Sid},
    booktitle = {Handbook of Financial Cryptography},
    citeulike-article-id = {7845752},
    editor = {Rosenberg, Burton},
    keywords = {authentication, fraud, phishing, publications},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {CRC Press},
    title = {Phishing},
    year = {2008}
    }
  • M. Jakobsson and S. Myers, Phishing and countermeasures: understanding the increasing problem of electronic identity theft, Wesley, 2006.
    [Bibtex]
    @book{phishing-book,
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845751},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {Wesley},
    title = {Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
    year = {2006}
    }
  • M. Jakobsson and Z. Ramzan, Crimeware: understanding new attacks and defenses, Symantec Press / Addison Wesley, 2008.
    [Bibtex]
    @book{crimeware,
    author = {Jakobsson, Markus and Ramzan, Zulfikar},
    citeulike-article-id = {7845749},
    isbn = {978-0321501950},
    keywords = {authentication, fraud, malware, publications},
    posted-at = {2010-09-17 03:00:42},
    priority = {0},
    publisher = {Symantec Press / Addison Wesley},
    title = {Crimeware: Understanding New Attacks and Defenses},
    year = {2008}
    }

(Complete bibtex.)

Comments are closed.