Encryption

  • Towards trustworthy elections: new directions in electronic voting, D. Chaum, M. Jakobsson, R. Rivest, P. Ryan, J. Benaloh, M. Kutylowski, and B. Adida, Eds., Springer, 2010, vol. 6000.
    [Bibtex]
    @book{citeulike:7936907,
    citeulike-article-id = {7936907},
    editor = {Chaum, David and Jakobsson, Markus and Rivest, Ron and Ryan, Peter and Benaloh, Josh and Kutylowski, Miroslaw and Adida, Ben},
    journal = {Lecture Notes in Computer Science},
    keywords = {authentication, distributed-computing, encryption, privacy, publications},
    posted-at = {2010-10-01 18:36:16},
    priority = {2},
    publisher = {Springer},
    title = {Towards Trustworthy Elections: New Directions in Electronic Voting},
    volume = {6000},
    year = {2010}
    }
  • M. Jakobsson, J. P. Stern, and M. Yung, “Scramble all, encrypt small,” in Fse ’99: proceedings of the 6th international workshop on fast software encryption, London, UK, 1999, pp. 95-111.
    [Bibtex]
    @inproceedings{scramble-all,
    address = {London, UK},
    author = {Jakobsson, Markus and Stern, Julien P. and Yung, Moti},
    booktitle = {FSE '99: Proceedings of the 6th International Workshop on Fast Software Encryption},
    citeulike-article-id = {7845836},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fse99.pdf},
    keywords = {encryption, publications},
    pages = {95--111},
    posted-at = {2010-09-17 03:22:33},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Scramble All, Encrypt Small},
    url = {http://markus-jakobsson.com/papers/jakobsson-fse99.pdf},
    year = {1999}
    }
  • A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Wpes ’05: proceedings of the 2005 acm workshop on privacy in the electronic society, New York, NY, USA, 2005, pp. 61-70.
    [Bibtex]
    @inproceedings{JCJ-wpes05,
    address = {New York, NY, USA},
    author = {Juels, Ari and Catalano, Dario and Jakobsson, Markus},
    booktitle = {WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845835},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    keywords = {encryption, privacy, publications},
    location = {Alexandria, VA, USA},
    pages = {61--70},
    posted-at = {2010-09-17 03:22:32},
    priority = {0},
    publisher = {ACM},
    title = {Coercion-resistant electronic elections},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    year = {2005}
    }
  • P. G. Jong Youl Choi and M. Jakobsson, “Auditable privacy: on Tamper-Evident mix networks,” in Proceeding of financial cryptography and data security, Anguilla, British West Indies, 2006, pp. 126-141.
    [Bibtex]
    @inproceedings{CGJ-2006,
    address = {Anguilla, British West Indies},
    author = {Jong Youl Choi, Philippe G. and Jakobsson, Markus},
    booktitle = {Proceeding of Financial Cryptography and Data Security},
    citeulike-article-id = {7845834},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    keywords = {encryption, malware, privacy, publications},
    month = feb,
    pages = {126--141},
    posted-at = {2010-09-17 03:22:31},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Auditable Privacy: On {Tamper-Evident} Mix Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    volume = {LNCS 4107},
    year = {2006}
    }
  • M. Jakobsson, “Cryptographic privacy protection techniques,” in The handbook of information security, H. Bidgoli, Ed., Hoboken, NJ: John Wiley & Sons, Inc., 2005.
    [Bibtex]
    @incollection{privacy-tech,
    address = {Hoboken, NJ},
    author = {Jakobsson, Markus},
    booktitle = {The Handbook of Information Security},
    citeulike-article-id = {7845833},
    editor = {Bidgoli, Hossein},
    keywords = {encryption, publications},
    posted-at = {2010-09-17 03:22:31},
    priority = {0},
    publisher = {John Wiley \& Sons, Inc.},
    title = {Cryptographic Privacy Protection Techniques},
    year = {2005}
    }
  • M. Jakobsson, “A practical mix,” in Advances in cryptology — eurocrypt ’98, London, UK, 1998, pp. 448-461.
    [Bibtex]
    @inproceedings{practical-mix,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {Advances in Cryptology -- EuroCrypt '98},
    citeulike-article-id = {7845826},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    comment = {LNCS 1403},
    keywords = {distributed-computing, encryption, publications},
    pages = {448--461},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {A Practical Mix},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt98.pdf},
    year = {1998}
    }
  • M. Jakobsson and D. M’Ra"{i}hi, “Mix-Based electronic payments,” in Sac ’98: proceedings of the selected areas in cryptography, London, UK, 1999, pp. 157-173.
    [Bibtex]
    @inproceedings{mix-based-epayment,
    address = {London, UK},
    author = {Jakobsson, Markus and M'Ra"{\i}hi, David},
    booktitle = {SAC '98: Proceedings of the Selected Areas in Cryptography},
    citeulike-article-id = {7845825},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {157--173},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Mix-Based} Electronic Payments},
    url = {http://markus-jakobsson.com/papers/jakobsson-sac98.pdf},
    year = {1999}
    }
  • M. Jakobsson, “On quorum controlled asymmetric proxy re-encryption,” in Pkc ’99: proceedings of the second international workshop on practice and theory in public key cryptography, London, UK, 1999, pp. 112-121.
    [Bibtex]
    @inproceedings{asym-proxy-reencryption,
    address = {London, UK},
    author = {Jakobsson, Markus},
    booktitle = {PKC '99: Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845824},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    keywords = {distributed-computing, encryption, publications},
    pages = {112--121},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {On Quorum Controlled Asymmetric Proxy Re-encryption},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc99.pdf},
    year = {1999}
    }
  • M. Jakobsson, “Flash mixing,” in Podc ’99: proceedings of the eighteenth annual acm symposium on principles of distributed computing, New York, NY, USA, 1999, pp. 83-89.
    [Bibtex]
    @inproceedings{flash-mixing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus},
    booktitle = {PODC '99: Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845823},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Atlanta, Georgia, United States},
    pages = {83--89},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM},
    title = {Flash mixing},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    year = {1999}
    }
  • M. Jakobsson and A. Juels, “Mix and match: secure function evaluation via ciphertexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 162-177.
    [Bibtex]
    @inproceedings{mix-match,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845822},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {162--177},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mix and Match: Secure Function Evaluation via Ciphertexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “Addition of ElGamal plaintexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 346-358.
    [Bibtex]
    @inproceedings{add-elgamal,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845821},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {346--358},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Addition of {ElGamal} Plaintexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “An optimally robust hybrid mix network,” in Podc ’01: proceedings of the twentieth annual acm symposium on principles of distributed computing, New York, NY, USA, 2001, pp. 284-292.
    [Bibtex]
    @inproceedings{JJ01,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845820},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Newport, Rhode Island, United States},
    pages = {284--292},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM Press},
    title = {An optimally robust hybrid mix network},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    year = {2001}
    }
  • M. Jakobsson, A. Juels, and R. L. Rivest, “Making mix nets robust for electronic voting by randomized partial checking,” in Proceedings of the 11th usenix security symposium, Berkeley, CA, USA, 2002, pp. 339-353.
    [Bibtex]
    @inproceedings{mix-net-usenix-02,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Juels, Ari and Rivest, Ronald L.},
    booktitle = {Proceedings of the 11th USENIX Security Symposium},
    citeulike-article-id = {7845819},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {339--353},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {USENIX Association},
    title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking},
    url = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    year = {2002}
    }
  • P. Golle, X. Wang, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix networks,” in Ieee symposium on security and privacy, Oakland, California, 2006, pp. 121-131.
    [Bibtex]
    @inproceedings{deterring-mix-sp06,
    address = {Oakland, California},
    author = {Golle, Philippe and Wang, XiaoFeng and Jakobsson, Markus and Tsow, Alex},
    booktitle = {IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845817},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    month = may,
    organization = {IEEE},
    pages = {121--131},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {IEEE},
    title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    year = {2006}
    }
  • X. Wang, P. Golle, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix-networks,” Acm trans. inf. syst. secur., vol. 13, iss. 2, pp. 1-24, 2010.
    [Bibtex]
    @article{wang-golle-10,
    address = {New York, NY, USA},
    author = {Wang, Xiaofeng and Golle, Philippe and Jakobsson, Markus and Tsow, Alex},
    citeulike-article-id = {7845816},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    journal = {ACM Trans. Inf. Syst. Secur.},
    keywords = {distributed-computing, encryption, privacy, publications},
    number = {2},
    pages = {1--24},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {ACM},
    title = {Deterring voluntary trace disclosure in re-encryption mix-networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    volume = {13},
    year = {2010}
    }
  • P. Golle and M. Jakobsson, “Reusable anonymous return channels,” in Wpes ’03: proceedings of the 2003 acm workshop on privacy in the electronic society, New York, NY, USA, 2003, pp. 94-100.
    [Bibtex]
    @inproceedings{reusable-anonymous,
    address = {New York, NY, USA},
    author = {Golle, Philippe and Jakobsson, Markus},
    booktitle = {WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845793},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    location = {Washington, DC},
    pages = {94--100},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Reusable anonymous return channels},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    year = {2003}
    }
  • Y. Hu, A. Perrig, and M. Jakobsson, “Efficient constructions for one-way hash chains.,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{HPJ-ACNS05,
    address = {New York, NY},
    author = {Hu, Yih-Chun and Perrig, Andiran and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845792},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    keywords = {building-blocks, encryption, publications},
    month = jun,
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Efficient Constructions for One-way Hash Chains.},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05.pdf},
    year = {2005}
    }
  • P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal re-encryption for mixnets,” in Topics in cryptology ct-rsa 2004, London, UK, 2004, pp. 163-178.
    [Bibtex]
    @inproceedings{GJJS04,
    address = {London, UK},
    author = {Golle, Philippe and Jakobsson, Markus and Juels, Ari and Syverson, Paul},
    booktitle = {Topics in Cryptology CT-RSA 2004},
    citeulike-article-id = {7845791},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    comment = {LNCS 2964},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    pages = {163--178},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Universal Re-encryption for Mixnets},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    year = {2004}
    }
  • J. A. Garay, M. Jakobsson, and P. D. MacKenzie, “Abuse-Free optimistic contract signing,” in Crypto ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology, London, UK, 1999, pp. 449-466.
    [Bibtex]
    @inproceedings{abuse-free-contract,
    address = {London, UK},
    author = {Garay, Juan A. and Jakobsson, Markus and MacKenzie, Philip D.},
    booktitle = {CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845769},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    keywords = {authentication, building-blocks, encryption, publications},
    pages = {449--466},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {{Abuse-Free} Optimistic Contract Signing},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto99.pdf},
    year = {1999}
    }
  • P. Bohannon, M. Jakobsson, and S. Srikwan, “Cryptographic approaches to provacy in forensic DNA databases,” in Pkc ’00: proceedings of the third international workshop on practice and theory in public key cryptography, London, UK, 2000, pp. 373-390.
    [Bibtex]
    @inproceedings{dna-database,
    address = {London, UK},
    author = {Bohannon, Philip and Jakobsson, Markus and Srikwan, Sukamol},
    booktitle = {PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845768},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    keywords = {authentication, encryption, privacy, publications},
    pages = {373--390},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    year = {2000}
    }

Comments are closed.