Authentication

  • M. Jakobsson, “How to wear your password.” 2014.
    [Bibtex]
    @inproceedings{citeulike:13317655,
    abstract = {We describe a new authentication paradigm that seeks to achieve both a desirable user experience and a high level of security. We describe a potential implementation of an identity manager in the guise of a smart bracelet. This bracelet would be equipped with a low-power processor,
    a Bluetooth LE transmitter, an accelerometer, and a clasp that is constructed so that opening and closing it would break and close a circuit, thereby allowing an automatic detection of when the bracelet is put on and taken off. For reasons of cost, design and error avoidance, the bracelet
    could be designed to not have any user interface, nor any biometric sensors: All user interaction could be assisted by third-party devices, such as user phones and point of sale terminals. Our approach is based on the principle of physical and logical tethering of an identity manager to a user (e.g., by closing the clasp), where an identity manager represents its user's interests after an initial user authentication phase, and until the user causes a disassociation by untethering the device (e.g., by opening the clasp). The authentication phase can be based on any type of authentication, and - to allow for the greatest possible simplicity of design - can be aided by a third-party device, such as the user's cell phone. We describe the physical design, including aspects to protect against violent attacks on users. We also describe the lightweight security protocols needed for pairing, determination of user intent, and credential management, and give examples of usage scenarios { including automated login; simplifed online and point-of-sale purchases; assisted appliance personalization; and automated event logging. We then overview the protocols associated with the example usage scenarios, and discuss the security implications of our proposed design.}},
    author = {Jakobsson, Markus},
    citeulike-article-id = {13317655},
    journal = {BlackHat 2014},
    keywords = {authentication, mobile, passwords},
    posted-at = {2014-08-07 06:20:46},
    priority = {2},
    title = {How To Wear Your Password},
    year = {2014}
    }
  • E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior,” Information security, pp. 99-113, 2011.
    [Bibtex]
    @article{shi2011implicit,
    author = {Shi, E. and Niu, Y. and Jakobsson, M. and Chow, R.},
    citeulike-article-id = {12072132},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/isc.pdf},
    journal = {Information Security},
    keywords = {authentication, publication},
    pages = {99--113},
    posted-at = {2013-02-25 03:55:28},
    priority = {2},
    publisher = {Springer},
    title = {Implicit authentication through learning user behavior},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/isc.pdf},
    year = {2011}
    }
  • M. Jakobsson and D. Liu, Bootstrapping mobile PINs using passwords, W2SP, 2011.
    [Bibtex]
    @book{jakobsson2011bootstrapping,
    author = {Jakobsson, M. and Liu, D.},
    citeulike-article-id = {12072131},
    citeulike-linkout-0 = {http://w2spconf.com/2011/papers/mobilePIN.pdf},
    keywords = {authentication, publication},
    posted-at = {2013-02-25 03:54:47},
    priority = {2},
    publisher = {W2SP},
    title = {Bootstrapping mobile {PINs} using passwords},
    url = {http://w2spconf.com/2011/papers/mobilePIN.pdf},
    year = {2011}
    }
  • M. Jakobsson, R. I. Chow, and J. Molina, “Authentication-Are we doing well Enough?[Guest editors’ introduction],” Security & privacy, ieee, vol. 10, iss. 1, pp. 19-21, 2012.
    [Bibtex]
    @article{jakobsson2012authentication,
    author = {Jakobsson, M. and Chow, R. I. and Molina, J.},
    citeulike-article-id = {12072129},
    citeulike-linkout-0 = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06142519},
    journal = {Security \& Privacy, IEEE},
    keywords = {article, authentication},
    number = {1},
    pages = {19--21},
    posted-at = {2013-02-25 03:53:53},
    priority = {2},
    publisher = {IEEE},
    title = {{Authentication-Are} We Doing Well {Enough?[Guest} Editors' Introduction]},
    url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06142519},
    volume = {10},
    year = {2012}
    }
  • D. Balfanz, R. Chow, O. Eisen, M. Jakobsson, S. Kirsch, S. Matsumoto, J. Molina, and P. van Oorschot, “The future of authentication,” Security & privacy, ieee, vol. 10, iss. 1, pp. 22-27, 2012.
    [Bibtex]
    @article{balfanz2012future,
    author = {Balfanz, D. and Chow, R. and Eisen, O. and Jakobsson, M. and Kirsch, S. and Matsumoto, S. and Molina, J. and van Oorschot, P.},
    citeulike-article-id = {12072128},
    journal = {Security \& Privacy, IEEE},
    keywords = {article, authentication},
    number = {1},
    pages = {22--27},
    posted-at = {2013-02-25 03:52:53},
    priority = {2},
    publisher = {IEEE},
    title = {The future of authentication},
    volume = {10},
    year = {2012}
    }
  • M. Jakobsson, “Mobile authentication,” , 2012.
    [Bibtex]
    @article{jakobsson2012mobile,
    author = {Jakobsson, M.},
    citeulike-article-id = {12072118},
    isbn = {978-1-4614-4878-5},
    keywords = {authentication, book},
    posted-at = {2013-02-25 03:47:17},
    priority = {2},
    publisher = {Springer},
    title = {Mobile authentication},
    year = {2012}
    }
  • M. Jakobsson and R. Akavipat, Rethinking passwords to adapt to constrained keyboards, 2011.
    [Bibtex]
    @misc{jakobsson2011rethinking,
    author = {Jakobsson, Markus and Akavipat, Ruj},
    citeulike-article-id = {12072112},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/fastwords.pdf},
    keywords = {authentication, passwords, publications},
    posted-at = {2013-02-25 03:43:31},
    priority = {2},
    title = {Rethinking passwords to adapt to constrained keyboards},
    url = {http://www.markus-jakobsson.com/fastwords.pdf},
    year = {2011}
    }
  • M. Jakobsson and M. Dhiman, “The benefits of understanding passwords,” in Proceedings of the 7th usenix conference on hot topics in security, Berkeley, CA, USA, 2012, p. 10.
    [Bibtex]
    @inproceedings{citeulike:12047721,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Dhiman, Mayank},
    booktitle = {Proceedings of the 7th USENIX conference on Hot Topics in Security},
    citeulike-article-id = {12047721},
    citeulike-linkout-0 = {https://www.usenix.org/system/files/conference/hotsec12/hotsec12-final13.pdf},
    keywords = {authentication, passwords, publications},
    location = {Bellevue, WA},
    pages = {10},
    posted-at = {2013-02-20 13:01:21},
    priority = {2},
    publisher = {USENIX Association},
    series = {HotSec'12},
    title = {The benefits of understanding passwords},
    url = {https://www.usenix.org/system/files/conference/hotsec12/hotsec12-final13.pdf},
    year = {2012}
    }
  • R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users..” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936960,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Song, Zhexuan},
    citeulike-article-id = {7936960},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, distributed-computing, publications},
    posted-at = {2010-10-01 18:50:50},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users.},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    year = {2010}
    }
  • Towards trustworthy elections: new directions in electronic voting, D. Chaum, M. Jakobsson, R. Rivest, P. Ryan, J. Benaloh, M. Kutylowski, and B. Adida, Eds., Springer, 2010, vol. 6000.
    [Bibtex]
    @book{citeulike:7936907,
    citeulike-article-id = {7936907},
    editor = {Chaum, David and Jakobsson, Markus and Rivest, Ron and Ryan, Peter and Benaloh, Josh and Kutylowski, Miroslaw and Adida, Ben},
    journal = {Lecture Notes in Computer Science},
    keywords = {authentication, distributed-computing, encryption, privacy, publications},
    posted-at = {2010-10-01 18:36:16},
    priority = {2},
    publisher = {Springer},
    title = {Towards Trustworthy Elections: New Directions in Electronic Voting},
    volume = {6000},
    year = {2010}
    }
  • Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson, “One experience collecting sensitive mobile data.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936790,
    author = {Niu, Yuan and Shi, Elaine and Chow, Richard and Golle, Philippe and Jakobsson, Markus},
    citeulike-article-id = {7936790},
    citeulike-linkout-0 = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    journal = {Usable Security Experiment Reports (USER) Workshop},
    keywords = {authentication, mobile, publications, user-experiments},
    posted-at = {2010-10-01 18:12:02},
    priority = {2},
    title = {One Experience Collecting Sensitive Mobile Data},
    url = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    year = {2010}
    }
  • R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936778,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Zhexuan Song},
    citeulike-article-id = {7936778},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:09:21},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users},
    url = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    year = {2010}
    }
  • E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936771,
    author = {Shi, Elaine and Niu, Yuan and Jakobsson, Markus and Chow, Richard},
    citeulike-article-id = {7936771},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    journal = {Information Security Conference (ISC)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:05:22},
    priority = {2},
    title = {Implicit Authentication through Learning User Behavior},
    url = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    year = {2010}
    }
  • M. Jakobsson, “Blackmailing using undeniable signatures,” in Advances in cryptology — eurocrypt ’94, Perugia, Italy, 1994, pp. 425-427.
    [Bibtex]
    @inproceedings{blackmailing,
    address = {Perugia, Italy},
    author = {Jakobsson, Markus},
    booktitle = {Advances in Cryptology -- EuroCrypt '94},
    citeulike-article-id = {7846080},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt94.pdf},
    comment = {LNCS 950},
    keywords = {authentication, publications},
    month = may,
    pages = {425--427},
    posted-at = {2010-09-17 03:38:29},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Blackmailing using Undeniable Signatures},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt94.pdf},
    year = {1994}
    }
  • M. Jakobsson, “Privacy vs. authenticity,” PhD Thesis, San Diego, CA, 1997.
    [Bibtex]
    @phdthesis{privacy-and-auth,
    address = {San Diego, CA},
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845778},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ucsd97.pdf},
    keywords = {authentication, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    school = {University of California at San Diego},
    title = {Privacy vs. Authenticity},
    url = {http://markus-jakobsson.com/papers/jakobsson-ucsd97.pdf},
    year = {1997}
    }
  • M. Jakobsson, “Social engineering 2.0: what’s next,” Mcafee security journal, 2008.
    [Bibtex]
    @article{social-engineering2,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845777},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    journal = {McAfee Security Journal},
    keywords = {authentication, fraud, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    title = {Social Engineering 2.0: What's Next},
    url = {http://markus-jakobsson.com/papers/jakobsson-mcafee08.pdf},
    year = {2008}
    }
  • M. Jakobsson, Reducing costs in identification protocols, 1992.
    [Bibtex]
    @misc{Jakobsson92,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845776},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto92.pdf},
    howpublished = {Rump Session, InCrypto '92},
    keywords = {authentication, publications},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    title = {Reducing costs in identification protocols},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto92.pdf},
    year = {1992}
    }
  • M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Eurocrypt’96: proceedings of the 15th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1996, pp. 143-154.
    [Bibtex]
    @inproceedings{verifier-proofs,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Sako, Kazue and Impagliazzo, Russell},
    booktitle = {EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845775},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    keywords = {authentication, building-blocks, most-downloaded, privacy, publications},
    location = {Saragossa, Spain},
    pages = {143--154},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Designated verifier proofs and their applications},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    year = {1996}
    }
  • M. Jakobsson and M. Yung, “Proving without knowing: on oblivious, agnostic and blindolded provers,” in Crypto ’96: proceedings of the 16th annual international cryptology conference on advances in cryptology, London, UK, 1996, pp. 186-200.
    [Bibtex]
    @inproceedings{proving-without-know,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845774},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    keywords = {authentication, building-blocks, privacy, publications},
    pages = {186--200},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    year = {1996}
    }
  • A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive public key and signature systems,” in Ccs ’97: proceedings of the 4th acm conference on computer and communications security, New York, NY, USA, 1997, pp. 100-110.
    [Bibtex]
    @inproceedings{HJJKY97,
    address = {New York, NY, USA},
    author = {Herzberg, Amir and Jakobsson, Markus and Jarecki, Stanisl\&\#322;aw and Krawczyk, Hugo and Yung, Moti},
    booktitle = {CCS '97: Proceedings of the 4th ACM conference on Computer and communications security},
    citeulike-article-id = {7845773},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Zurich, Switzerland},
    pages = {100--110},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {ACM Press},
    title = {Proactive public key and signature systems},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    year = {1997}
    }
  • M. Jakobsson and M. Yung, “Distributed "magic ink" signatures,” in Eurocrypt’97: proceedings of the 16th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1997, pp. 450-464.
    [Bibtex]
    @inproceedings{distr-majic-ink,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {EUROCRYPT'97: Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845772},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Konstanz, Germany},
    pages = {450--464},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Distributed "magic ink" signatures},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    year = {1997}
    }
  • E. Gabber, M. Jakobsson, Y. Matias, and A. J. Mayer, “Curbing junk E-Mail via secure classification,” in Fc ’98: proceedings of the second international conference on financial cryptography, London, UK, 1998, pp. 198-213.
    [Bibtex]
    @inproceedings{curb-junk-email,
    address = {London, UK},
    author = {Gabber, Eran and Jakobsson, Markus and Matias, Yossi and Mayer, Alain J.},
    booktitle = {FC '98: Proceedings of the Second International Conference on Financial Cryptography},
    citeulike-article-id = {7845771},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    keywords = {authentication, fraud, publications},
    pages = {198--213},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Curbing Junk {E-Mail} via Secure Classification},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc98.pdf},
    year = {1998}
    }
  • M. Jakobsson and J. Müller, “Improved magic ink signatures using hints,” in Fc ’99: proceedings of the third international conference on financial cryptography, London, UK, 1999, pp. 253-268.
    [Bibtex]
    @inproceedings{im-majic-ink,
    address = {London, UK},
    author = {Jakobsson, Markus and M\"{u}ller, Joy},
    booktitle = {FC '99: Proceedings of the Third International Conference on Financial Cryptography},
    citeulike-article-id = {7845770},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    keywords = {authentication, distributed-computing, publications},
    pages = {253--268},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Improved Magic Ink Signatures Using Hints},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    year = {1999}
    }
  • J. A. Garay, M. Jakobsson, and P. D. MacKenzie, “Abuse-Free optimistic contract signing,” in Crypto ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology, London, UK, 1999, pp. 449-466.
    [Bibtex]
    @inproceedings{abuse-free-contract,
    address = {London, UK},
    author = {Garay, Juan A. and Jakobsson, Markus and MacKenzie, Philip D.},
    booktitle = {CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845769},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    keywords = {authentication, building-blocks, encryption, publications},
    pages = {449--466},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Abuse-Free} Optimistic Contract Signing},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    year = {1999}
    }
  • P. Bohannon, M. Jakobsson, and S. Srikwan, “Cryptographic approaches to provacy in forensic DNA databases,” in Pkc ’00: proceedings of the third international workshop on practice and theory in public key cryptography, London, UK, 2000, pp. 373-390.
    [Bibtex]
    @inproceedings{dna-database,
    address = {London, UK},
    author = {Bohannon, Philip and Jakobsson, Markus and Srikwan, Sukamol},
    booktitle = {PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845768},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    keywords = {authentication, encryption, privacy, publications},
    pages = {373--390},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    year = {2000}
    }
  • C. Schnorr and M. Jakobsson, “Security of signed ElGamal encryption,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 73-89.
    [Bibtex]
    @inproceedings{signed-elgamal-enc,
    address = {London, UK},
    author = {Schnorr, Claus-Peter and Jakobsson, Markus},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845767},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00.pdf},
    keywords = {authentication, publications},
    pages = {73--89},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Security of Signed {ElGamal} Encryption},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00.pdf},
    year = {2000}
    }
  • M. Jakobsson and S. Wetzel, “Secure Server-Aided signature generation,” in Pkc ’01: proceedings of the 4th international workshop on practice and theory in public key cryptography, London, UK, 2001, pp. 383-401.
    [Bibtex]
    @inproceedings{server-key-gen,
    address = {London, UK},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {PKC '01: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845766},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc01.pdf},
    keywords = {authentication, publications},
    pages = {383--401},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Secure {Server-Aided} Signature Generation},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc01.pdf},
    year = {2001}
    }
  • P. D. MacKenzie, T. Shrimpton, and M. Jakobsson, “Threshold Password-Authenticated key exchange,” in Crypto ’02: proceedings of the 22nd annual international cryptology conference on advances in cryptology, London, UK, 2002, pp. 385-400.
    [Bibtex]
    @inproceedings{MSJ02,
    address = {London, UK},
    author = {MacKenzie, Philip D. and Shrimpton, Thomas and Jakobsson, Markus},
    booktitle = {CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845765},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    comment = {LNCS 2442},
    keywords = {authentication, distributed-computing, publications},
    pages = {385--400},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Threshold {Password-Authenticated} Key Exchange},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    year = {2002}
    }
  • M. Jakobsson and S. Wetzel, “Efficient attribute authentication with applications to ad hoc networks,” in Vanet ’04: proceedings of the 1st acm international workshop on vehicular ad hoc networks, New York, NY, USA, 2004, pp. 38-46.
    [Bibtex]
    @inproceedings{JW-VANET04,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {VANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks},
    citeulike-article-id = {7845764},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    keywords = {authentication, mobile, publications},
    location = {Philadelphia, PA, USA},
    pages = {38--46},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Efficient attribute authentication with applications to ad hoc networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    year = {2004}
    }
  • M. Jakobsson and J. Ratkiewicz, “Designing ethical phishing experiments: a study of (ROT13) rOnl query features,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 513-522.
    [Bibtex]
    @inproceedings{ethical-phishing-www06,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Ratkiewicz, Jacob},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845763},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    keywords = {authentication, fraud, most-downloaded, phishing, publications, user-experiments},
    location = {Edinburgh, Scotland},
    pages = {513--522},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Designing ethical phishing experiments: a study of ({ROT13}) {rOnl} query features},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    year = {2006}
    }
  • A. Juels, M. Jakobsson, and T. N. Jagatic, “Cache cookies for browser authentication (extended abstract),” in Sp ’06: proceedings of the 2006 ieee symposium on security and privacy, Washington, DC, USA, 2006, pp. 301-305.
    [Bibtex]
    @inproceedings{cache-cookie-sp06,
    address = {Washington, DC, USA},
    author = {Juels, Ari and Jakobsson, Markus and Jagatic, Tom N.},
    booktitle = {SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845762},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    keywords = {authentication, fraud, publications},
    pages = {301--305},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {IEEE Computer Society},
    title = {Cache Cookies for Browser Authentication (Extended Abstract)},
    url = {http://markus-jakobsson.com/papers/jakobsson-oakland06.pdf},
    year = {2006}
    }
  • A. Juels, S. Stamm, and M. Jakobsson, “Combatting click fraud via premium clicks,” in Ss’07: proceedings of 16th usenix security symposium on usenix security symposium, Berkeley, CA, USA, 2007, pp. 1-10.
    [Bibtex]
    @inproceedings{premium-clicks,
    address = {Berkeley, CA, USA},
    author = {Juels, Ari and Stamm, Sid and Jakobsson, Markus},
    booktitle = {SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium},
    citeulike-article-id = {7845761},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Boston, MA},
    pages = {1--10},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX Association},
    title = {Combatting click fraud via premium clicks},
    url = {http://markus-jakobsson.com/papers/jakobsson-usenix07.pdf},
    year = {2007}
    }
  • M. Jakobsson and S. Myers, “Delayed password disclosure,” in Dim ’07: proceedings of the 2007 acm workshop on digital identity management, New York, NY, USA, 2007, pp. 17-26.
    [Bibtex]
    @inproceedings{delayed-pwd-dim07,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Myers, Steven},
    booktitle = {DIM '07: Proceedings of the 2007 ACM workshop on Digital identity management},
    citeulike-article-id = {7845760},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    keywords = {authentication, fraud, publications},
    location = {Fairfax, Virginia, USA},
    pages = {17--26},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Delayed password disclosure},
    url = {http://markus-jakobsson.com/papers/jakobsson-dim07.pdf},
    year = {2007}
    }
  • M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang, “Love and authentication,” in Chi ’08: proceeding of the twenty-sixth annual sigchi conference on human factors in computing systems, New York, NY, USA, 2008, pp. 197-200.
    [Bibtex]
    @inproceedings{love-auth-chi08,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stolterman, Erik and Wetzel, Susanne and Yang, Liu},
    booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems},
    citeulike-article-id = {7845759},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    keywords = {authentication, most-downloaded, publications, user-experiments},
    location = {Florence, Italy},
    pages = {197--200},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Love and authentication},
    url = {http://markus-jakobsson.com/papers/jakobsson-chi08.pdf},
    year = {2008}
    }
  • M. Jakobsson, E. Shi, and R. Chow, “Implicit authentication for mobile devices,” in The 4th usenix workshop on hot topics in security (hotsec’09), Montreal, Canada, 2009.
    [Bibtex]
    @inproceedings{imp-auth-89,
    address = {Montreal, Canada},
    author = {Jakobsson, Markus and Shi, Elaine and Chow, Richard},
    booktitle = {The 4th USENIX Workshop on Hot Topics in Security (HotSec'09)},
    citeulike-article-id = {7845758},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    keywords = {authentication, mobile, publications, user-experiments},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX},
    title = {Implicit authentication for mobile devices},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    year = {2009}
    }
  • M. Jakobsson and S. Myers, “Delayed password disclosure,” Int. j. appl. cryptol., vol. 1, iss. 1, pp. 47-59, 2008.
    [Bibtex]
    @article{delayed-pwd,
    address = {Inderscience Publishers, Geneva, SWITZERLAND},
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845757},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    journal = {Int. J. Appl. Cryptol.},
    keywords = {authentication, fraud, phishing, publications},
    number = {1},
    pages = {47--59},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Inderscience Publishers},
    title = {Delayed password disclosure},
    url = {http://markus-jakobsson.com/papers/jakobsson-ijac08.pdf},
    volume = {1},
    year = {2008}
    }
  • M. Jakobsson and A. Tsow, “Identify theft,” in Computer and information security handbook, J. R. Vacca, Ed., Burlington, MA: Morgan Kaufmann, 2008, p. 519.
    [Bibtex]
    @incollection{cis-handbook,
    address = {Burlington, MA},
    author = {Jakobsson, Markus and Tsow, Alex},
    booktitle = {Computer And Information Security Handbook},
    chapter = {31},
    citeulike-article-id = {7845754},
    editor = {Vacca, John R.},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    pages = {519},
    posted-at = {2010-09-17 03:05:09},
    priority = {0},
    publisher = {Morgan Kaufmann},
    title = {Identify Theft},
    year = {2008}
    }
  • M. Jakobsson, C. Soghoian, and S. Stamm, “Phishing,” in Handbook of financial cryptography, B. Rosenberg, Ed., CRC Press, 2008.
    [Bibtex]
    @incollection{handbook-fc,
    author = {Jakobsson, Markus and Soghoian, Christopher and Stamm, Sid},
    booktitle = {Handbook of Financial Cryptography},
    citeulike-article-id = {7845752},
    editor = {Rosenberg, Burton},
    keywords = {authentication, fraud, phishing, publications},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {CRC Press},
    title = {Phishing},
    year = {2008}
    }
  • M. Jakobsson and S. Myers, Phishing and countermeasures: understanding the increasing problem of electronic identity theft, Wesley, 2006.
    [Bibtex]
    @book{phishing-book,
    author = {Jakobsson, Markus and Myers, Steven},
    citeulike-article-id = {7845751},
    keywords = {authentication, fraud, phishing, publications, user-experiments},
    posted-at = {2010-09-17 03:01:30},
    priority = {0},
    publisher = {Wesley},
    title = {Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft},
    year = {2006}
    }
  • M. Jakobsson and Z. Ramzan, Crimeware: understanding new attacks and defenses, Symantec Press / Addison Wesley, 2008.
    [Bibtex]
    @book{crimeware,
    author = {Jakobsson, Markus and Ramzan, Zulfikar},
    citeulike-article-id = {7845749},
    isbn = {978-0321501950},
    keywords = {authentication, fraud, malware, publications},
    posted-at = {2010-09-17 03:00:42},
    priority = {0},
    publisher = {Symantec Press / Addison Wesley},
    title = {Crimeware: Understanding New Attacks and Defenses},
    year = {2008}
    }

Comments are closed.