Distributed Computing

  • R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users..” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936960,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Song, Zhexuan},
    citeulike-article-id = {7936960},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, distributed-computing, publications},
    posted-at = {2010-10-01 18:50:50},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users.},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/ccsw10.pdf},
    year = {2010}
    }
  • Towards trustworthy elections: new directions in electronic voting, D. Chaum, M. Jakobsson, R. Rivest, P. Ryan, J. Benaloh, M. Kutylowski, and B. Adida, Eds., Springer, 2010, vol. 6000.
    [Bibtex]
    @book{citeulike:7936907,
    citeulike-article-id = {7936907},
    editor = {Chaum, David and Jakobsson, Markus and Rivest, Ron and Ryan, Peter and Benaloh, Josh and Kutylowski, Miroslaw and Adida, Ben},
    journal = {Lecture Notes in Computer Science},
    keywords = {authentication, distributed-computing, encryption, privacy, publications},
    posted-at = {2010-10-01 18:36:16},
    priority = {2},
    publisher = {Springer},
    title = {Towards Trustworthy Elections: New Directions in Electronic Voting},
    volume = {6000},
    year = {2010}
    }
  • M. Jakobsson and F. Menczer, “Web forms and untraceable DDoS attacks,” in Network security, S. Huang, D. MacCallum, and D. Z. Du, Eds., Springer, 2010.
    [Bibtex]
    @inbook{citeulike:7936872,
    author = {Jakobsson, Markus and Menczer, Filippo},
    booktitle = {Network Security},
    citeulike-article-id = {7936872},
    citeulike-linkout-0 = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    editor = {Huang, Scott and MacCallum, David and Du, Ding Z.},
    keywords = {distributed-computing, fraud, publications},
    posted-at = {2010-10-01 18:30:40},
    priority = {2},
    publisher = {Springer},
    title = {Web Forms and Untraceable {DDoS} Attacks},
    url = {http://www.hack-ware.com/sites/default/files/pdf/Web\%20Forms\%20and\%20Untraceable\%20DDoS\%20Attacks.pdf},
    year = {2010}
    }
  • R. Chow, P. Golle, M. Jakobsson, R. Masuoka, J. Molina, E. Shi, and J. Staddon, “Controlling data in the cloud: outsourcing computation without outsourcing control,” Acm workshop on cloud computing security (ccsw), 2009.
    [Bibtex]
    @article{citeulike:7936815,
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Shi, Elaine and Staddon, Jessica},
    citeulike-article-id = {7936815},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/ControllingDataInTheCloud-CCSW-09.pdf},
    journal = {ACM workshop on Cloud computing security (CCSW)},
    keywords = {distributed-computing, publications},
    posted-at = {2010-10-01 18:14:43},
    priority = {2},
    title = {Controlling data in the cloud: outsourcing computation without outsourcing control},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/ControllingDataInTheCloud-CCSW-09.pdf},
    year = {2009}
    }
  • M. Jakobsson, “A practical mix,” in Advances in cryptology — eurocrypt ’98, London, UK, 1998, pp. 448-461.
    [Bibtex]
    @inproceedings{practical-mix,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {Advances in Cryptology -- EuroCrypt '98},
    citeulike-article-id = {7845826},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    comment = {LNCS 1403},
    keywords = {distributed-computing, encryption, publications},
    pages = {448--461},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {A Practical Mix},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    year = {1998}
    }
  • M. Jakobsson and D. M’Ra"{i}hi, “Mix-Based electronic payments,” in Sac ’98: proceedings of the selected areas in cryptography, London, UK, 1999, pp. 157-173.
    [Bibtex]
    @inproceedings{mix-based-epayment,
    address = {London, UK},
    author = {Jakobsson, Markus and M'Ra"{\i}hi, David},
    booktitle = {SAC '98: Proceedings of the Selected Areas in Cryptography},
    citeulike-article-id = {7845825},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {157--173},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Mix-Based} Electronic Payments},
    url = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    year = {1999}
    }
  • M. Jakobsson, “On quorum controlled asymmetric proxy re-encryption,” in Pkc ’99: proceedings of the second international workshop on practice and theory in public key cryptography, London, UK, 1999, pp. 112-121.
    [Bibtex]
    @inproceedings{asym-proxy-reencryption,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845824},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {112--121},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {On Quorum Controlled Asymmetric Proxy Re-encryption},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    year = {1999}
    }
  • M. Jakobsson, “Flash mixing,” in Podc ’99: proceedings of the eighteenth annual acm symposium on principles of distributed computing, New York, NY, USA, 1999, pp. 83-89.
    [Bibtex]
    @inproceedings{flash-mixing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus},
    booktitle = {PODC '99: Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845823},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Atlanta, Georgia, United States},
    pages = {83--89},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM},
    title = {Flash mixing},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    year = {1999}
    }
  • M. Jakobsson and A. Juels, “Mix and match: secure function evaluation via ciphertexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 162-177.
    [Bibtex]
    @inproceedings{mix-match,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845822},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {162--177},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mix and Match: Secure Function Evaluation via Ciphertexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “Addition of ElGamal plaintexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 346-358.
    [Bibtex]
    @inproceedings{add-elgamal,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845821},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {346--358},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Addition of {ElGamal} Plaintexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “An optimally robust hybrid mix network,” in Podc ’01: proceedings of the twentieth annual acm symposium on principles of distributed computing, New York, NY, USA, 2001, pp. 284-292.
    [Bibtex]
    @inproceedings{JJ01,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845820},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Newport, Rhode Island, United States},
    pages = {284--292},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM Press},
    title = {An optimally robust hybrid mix network},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    year = {2001}
    }
  • M. Jakobsson, A. Juels, and R. L. Rivest, “Making mix nets robust for electronic voting by randomized partial checking,” in Proceedings of the 11th usenix security symposium, Berkeley, CA, USA, 2002, pp. 339-353.
    [Bibtex]
    @inproceedings{mix-net-usenix-02,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Juels, Ari and Rivest, Ronald L.},
    booktitle = {Proceedings of the 11th USENIX Security Symposium},
    citeulike-article-id = {7845819},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {339--353},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {USENIX Association},
    title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking},
    url = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    year = {2002}
    }
  • P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels, “Optimistic mixing for Exit-Polls,” in Asiacrypt ’02: proceedings of the 8th international conference on the theory and application of cryptology and information security, London, UK, 2002, pp. 451-465.
    [Bibtex]
    @inproceedings{optimistic-mixing,
    address = {London, UK},
    author = {Golle, Philippe and Zhong, Sheng and Boneh, Dan and Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845818},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    keywords = {distributed-computing, privacy, publications},
    pages = {451--465},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Optimistic Mixing for {Exit-Polls}},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    year = {2002}
    }
  • P. Golle, X. Wang, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix networks,” in Ieee symposium on security and privacy, Oakland, California, 2006, pp. 121-131.
    [Bibtex]
    @inproceedings{deterring-mix-sp06,
    address = {Oakland, California},
    author = {Golle, Philippe and Wang, XiaoFeng and Jakobsson, Markus and Tsow, Alex},
    booktitle = {IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845817},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    month = may,
    organization = {IEEE},
    pages = {121--131},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {IEEE},
    title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    year = {2006}
    }
  • X. Wang, P. Golle, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix-networks,” Acm trans. inf. syst. secur., vol. 13, iss. 2, pp. 1-24, 2010.
    [Bibtex]
    @article{wang-golle-10,
    address = {New York, NY, USA},
    author = {Wang, Xiaofeng and Golle, Philippe and Jakobsson, Markus and Tsow, Alex},
    citeulike-article-id = {7845816},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    journal = {ACM Trans. Inf. Syst. Secur.},
    keywords = {distributed-computing, encryption, privacy, publications},
    number = {2},
    pages = {1--24},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {ACM},
    title = {Deterring voluntary trace disclosure in re-encryption mix-networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    volume = {13},
    year = {2010}
    }
  • P. Golle and M. Jakobsson, “Reusable anonymous return channels,” in Wpes ’03: proceedings of the 2003 acm workshop on privacy in the electronic society, New York, NY, USA, 2003, pp. 94-100.
    [Bibtex]
    @inproceedings{reusable-anonymous,
    address = {New York, NY, USA},
    author = {Golle, Philippe and Jakobsson, Markus},
    booktitle = {WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845793},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    location = {Washington, DC},
    pages = {94--100},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Reusable anonymous return channels},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    year = {2003}
    }
  • P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal re-encryption for mixnets,” in Topics in cryptology ct-rsa 2004, London, UK, 2004, pp. 163-178.
    [Bibtex]
    @inproceedings{GJJS04,
    address = {London, UK},
    author = {Golle, Philippe and Jakobsson, Markus and Juels, Ari and Syverson, Paul},
    booktitle = {Topics in Cryptology CT-RSA 2004},
    citeulike-article-id = {7845791},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    comment = {LNCS 2964},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    pages = {163--178},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Universal Re-encryption for Mixnets},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    year = {2004}
    }
  • A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive public key and signature systems,” in Ccs ’97: proceedings of the 4th acm conference on computer and communications security, New York, NY, USA, 1997, pp. 100-110.
    [Bibtex]
    @inproceedings{HJJKY97,
    address = {New York, NY, USA},
    author = {Herzberg, Amir and Jakobsson, Markus and Jarecki, Stanisl\&\#322;aw and Krawczyk, Hugo and Yung, Moti},
    booktitle = {CCS '97: Proceedings of the 4th ACM conference on Computer and communications security},
    citeulike-article-id = {7845773},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Zurich, Switzerland},
    pages = {100--110},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {ACM Press},
    title = {Proactive public key and signature systems},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccs97.pdf},
    year = {1997}
    }
  • M. Jakobsson and M. Yung, “Distributed "magic ink" signatures,” in Eurocrypt’97: proceedings of the 16th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1997, pp. 450-464.
    [Bibtex]
    @inproceedings{distr-majic-ink,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {EUROCRYPT'97: Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845772},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    keywords = {authentication, distributed-computing, publications},
    location = {Konstanz, Germany},
    pages = {450--464},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Distributed "magic ink" signatures},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt97-magicink.pdf},
    year = {1997}
    }
  • M. Jakobsson and J. Müller, “Improved magic ink signatures using hints,” in Fc ’99: proceedings of the third international conference on financial cryptography, London, UK, 1999, pp. 253-268.
    [Bibtex]
    @inproceedings{im-majic-ink,
    address = {London, UK},
    author = {Jakobsson, Markus and M\"{u}ller, Joy},
    booktitle = {FC '99: Proceedings of the Third International Conference on Financial Cryptography},
    citeulike-article-id = {7845770},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    keywords = {authentication, distributed-computing, publications},
    pages = {253--268},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Improved Magic Ink Signatures Using Hints},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc99.pdf},
    year = {1999}
    }
  • P. D. MacKenzie, T. Shrimpton, and M. Jakobsson, “Threshold Password-Authenticated key exchange,” in Crypto ’02: proceedings of the 22nd annual international cryptology conference on advances in cryptology, London, UK, 2002, pp. 385-400.
    [Bibtex]
    @inproceedings{MSJ02,
    address = {London, UK},
    author = {MacKenzie, Philip D. and Shrimpton, Thomas and Jakobsson, Markus},
    booktitle = {CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845765},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    comment = {LNCS 2442},
    keywords = {authentication, distributed-computing, publications},
    pages = {385--400},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Threshold {Password-Authenticated} Key Exchange},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto02.pdf},
    year = {2002}
    }

Comments are closed.