Mobile

  • M. Jakobsson, “How to wear your password.” 2014.
    [Bibtex]
    @inproceedings{citeulike:13317655,
    abstract = {We describe a new authentication paradigm that seeks to achieve both a desirable user experience and a high level of security. We describe a potential implementation of an identity manager in the guise of a smart bracelet. This bracelet would be equipped with a low-power processor,
    a Bluetooth LE transmitter, an accelerometer, and a clasp that is constructed so that opening and closing it would break and close a circuit, thereby allowing an automatic detection of when the bracelet is put on and taken off. For reasons of cost, design and error avoidance, the bracelet
    could be designed to not have any user interface, nor any biometric sensors: All user interaction could be assisted by third-party devices, such as user phones and point of sale terminals. Our approach is based on the principle of physical and logical tethering of an identity manager to a user (e.g., by closing the clasp), where an identity manager represents its user's interests after an initial user authentication phase, and until the user causes a disassociation by untethering the device (e.g., by opening the clasp). The authentication phase can be based on any type of authentication, and - to allow for the greatest possible simplicity of design - can be aided by a third-party device, such as the user's cell phone. We describe the physical design, including aspects to protect against violent attacks on users. We also describe the lightweight security protocols needed for pairing, determination of user intent, and credential management, and give examples of usage scenarios { including automated login; simplifed online and point-of-sale purchases; assisted appliance personalization; and automated event logging. We then overview the protocols associated with the example usage scenarios, and discuss the security implications of our proposed design.}},
    author = {Jakobsson, Markus},
    citeulike-article-id = {13317655},
    journal = {BlackHat 2014},
    keywords = {authentication, mobile, passwords},
    posted-at = {2014-08-07 06:20:46},
    priority = {2},
    title = {How To Wear Your Password},
    year = {2014}
    }
  • “Practical and secure Software-Based attestation.” .
    [Bibtex]
    @inproceedings{lightsec,
    citeulike-article-id = {12477272},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:33:26},
    priority = {2},
    title = {Practical and Secure {Software-Based} Attestation},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/lightsecJakobssonJohansson.pdf}
    }
  • M. Jakobsson and G. Stewart, “Mobile malware: why the traditional AV paradigm is doomed, and how to use physics to detect undesirable routines,” in Blackhat, 2013.
    [Bibtex]
    @inproceedings{blackhat13,
    abstract = {The traditional {Anti-Virus} paradigm focuses on signature-based and behavioral detection. These require substantial processing, which hurts the limited power resources of handsets. Also, carriers are reluctant and slow to deliver Firmware Over The Air ({FOTA}) patches, due to the rigorous testing they need to subject updates to, and the costs of over-the-air updates. A move to cloud-based screening fails to recognize that not all threats will be propagated over the backbone, may obfuscate themselves in transit; or fight back (as rootkits do) to evade reporting or use of techniques such as the ``Google kill switch''. Hardware vendors are evaluating security solutions with hardware support, such as {TrustZone}, but while this reduces the vulnerabilities, it still exposes an attack surface.
    We describe a new approach that detects the presence of any undesirable routines -- including corruptions of the code used to perform this detection. The security assertions we make are not based on heuristics, but rather, rely on the physical characteristics of the target device. We detail the approach, which does not rely on hardware modifications, and explain how to analyze its security.},
    author = {Jakobsson, Markus and Stewart, Guy},
    booktitle = {BlackHat},
    citeulike-article-id = {12477269},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    keywords = {article, fraud, malware, mobile, most-downloaded, publication, publications},
    posted-at = {2013-07-13 07:26:29},
    priority = {2},
    title = {Mobile Malware: Why the Traditional {AV} Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/blackhat2013JakobssonStewart.pdf},
    year = {2013}
    }
  • M. Jakobsson and K. Johansson, “Practical and secure Software-Based attestation,” in Lightsec, 2011.
    [Bibtex]
    @inproceedings{citeulike:12348466,
    abstract = {Software-based attestation can be used for guaranteed detection of any active malware on a device. This promises a significant advance in the battle against malware, including mobile malware. However, most software based attestation methods are either heuristic or unsuitable for mobile computing – and often both. One recent software-based attestation method uses so-called memory-printing to produce a software-based attestation technique with provable properties. We describe a novel memory-printing algorithm that improves on that work by being more than an order of magnitude faster, while avoiding commonly used and questionable security assumptions. This results in a truly practical and arguable secure solution – taking less than 3 seconds on a 600 {MHz} processor with 256 {MB} {RAM}. Our work finds applications to malware defense and trusted computing in general, and mobile malware defense in particular.},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {LightSec},
    citeulike-article-id = {12348466},
    citeulike-linkout-0 = {http://www.markus-jakobsson.com/wp-content/uploads/lightsec-Jakobsson-Johansson-2011.pdf},
    keywords = {malware, mobile, publications},
    posted-at = {2013-05-16 13:47:21},
    priority = {5},
    title = {Practical and Secure {Software-Based} Attestation},
    url = {http://www.markus-jakobsson.com/wp-content/uploads/lightsec-Jakobsson-Johansson-2011.pdf},
    year = {2011}
    }
  • Y. Niu, E. Shi, R. Chow, P. Golle, and M. Jakobsson, “One experience collecting sensitive mobile data.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936790,
    author = {Niu, Yuan and Shi, Elaine and Chow, Richard and Golle, Philippe and Jakobsson, Markus},
    citeulike-article-id = {7936790},
    citeulike-linkout-0 = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    journal = {Usable Security Experiment Reports (USER) Workshop},
    keywords = {authentication, mobile, publications, user-experiments},
    posted-at = {2010-10-01 18:12:02},
    priority = {2},
    title = {One Experience Collecting Sensitive Mobile Data},
    url = {http://cups.cs.cmu.edu/soups/2010/user\_papers/Niu\_sensitive\_mobile\_data\_USER2010.pdf},
    year = {2010}
    }
  • R. Chow, M. Jakobsson, R. Masuoka, J. Molina, Y. Niu, E. Shi, and Z. Song, “Authentication in the clouds: a framework and its application to mobile users.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936778,
    author = {Chow, Richard and Jakobsson, Markus and Masuoka, Ryusuke and Molina, Jesus and Niu, Yuan and Shi, Elaine and Zhexuan Song},
    citeulike-article-id = {7936778},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    journal = {The ACM Cloud Computing Security Workshop (CCSW)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:09:21},
    priority = {2},
    title = {Authentication in the Clouds: A Framework and its Application to Mobile Users},
    url = {http://www.cs.umd.edu/\~{}elaine/docs/ccsw10.pdf},
    year = {2010}
    }
  • E. Shi, Y. Niu, M. Jakobsson, and R. Chow, “Implicit authentication through learning user behavior.” 2010.
    [Bibtex]
    @inproceedings{citeulike:7936771,
    author = {Shi, Elaine and Niu, Yuan and Jakobsson, Markus and Chow, Richard},
    citeulike-article-id = {7936771},
    citeulike-linkout-0 = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    journal = {Information Security Conference (ISC)},
    keywords = {authentication, mobile, publications},
    posted-at = {2010-10-01 18:05:22},
    priority = {2},
    title = {Implicit Authentication through Learning User Behavior},
    url = {http://www.cs.umd.edu/\~{}elaine/docs/isc.pdf},
    year = {2010}
    }
  • M. Jakobsson, D. Pointcheval, and A. Young, “Secure mobile gambling,” in Ct-rsa 2001: proceedings of the 2001 conference on topics in cryptology, London, UK, 2001, pp. 110-125.
    [Bibtex]
    @inproceedings{sec-mobile-gaming,
    address = {London, UK},
    author = {Jakobsson, Markus and Pointcheval, David and Young, Adam},
    booktitle = {CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology},
    citeulike-article-id = {7845898},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01-gamble.pdf},
    keywords = {mobile, publications},
    pages = {110--125},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Secure Mobile Gambling},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01-gamble.pdf},
    year = {2001}
    }
  • M. Jakobsson and D. Pointcheval, “Mutual authentication for Low-Power mobile devices,” in Fc ’01: proceedings of the 5th international conference on financial cryptography, London, UK, 2002, pp. 178-195.
    [Bibtex]
    @inproceedings{mutual-auth-low,
    address = {London, UK},
    author = {Jakobsson, Markus and Pointcheval, David},
    booktitle = {FC '01: Proceedings of the 5th International Conference on Financial Cryptography},
    citeulike-article-id = {7845897},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc01.pdf},
    keywords = {mobile, publications},
    pages = {178--195},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mutual Authentication for {Low-Power} Mobile Devices},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc01.pdf},
    year = {2002}
    }
  • M. Jakobsson and S. Wetzel, “Security weaknesses in bluetooth,” in Ct-rsa 2001: proceedings of the 2001 conference on topics in cryptology, London, UK, 2001, pp. 176-191.
    [Bibtex]
    @inproceedings{weakness-bluetooth,
    address = {London, UK},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {CT-RSA 2001: Proceedings of the 2001 Conference on Topics in Cryptology},
    citeulike-article-id = {7845896},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    keywords = {mobile, most-downloaded, publications},
    pages = {176--191},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Security Weaknesses in Bluetooth},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa01.pdf},
    year = {2001}
    }
  • M. Jakobsson, J. P. Hubaux, and L. Buttyan, “A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,” in Financial Crypto 2003, La Guadeloupe, 2003.
    [Bibtex]
    @inproceedings{JHB-FC03,
    address = {La Guadeloupe},
    author = {Jakobsson, Markus and Hubaux, J. P. and Buttyan, L.},
    booktitle = {Financial {C}rypto 2003},
    citeulike-article-id = {7845895},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ifca03.pdf},
    keywords = {mobile, publications},
    month = jan,
    organization = {IFCA},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {Springer Verlag},
    title = {A {M}icro-{P}ayment {S}cheme {E}ncouraging {C}ollaboration in {M}ulti-{H}op {C}ellular {N}etworks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ifca03.pdf},
    year = {2003}
    }
  • N. B. Salem, L. Buttyán, J. Hubaux, and M. Jakobsson, “A charging and rewarding scheme for packet forwarding in multi-hop cellular networks,” in Mobihoc ’03: proceedings of the 4th acm international symposium on mobile ad hoc networking & computing, New York, NY, USA, 2003, pp. 13-24.
    [Bibtex]
    @inproceedings{rewarding-scheme-03,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Butty\'{a}n, Levente and Hubaux, Jean-Pierre and Jakobsson, Markus},
    booktitle = {MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking \& computing},
    citeulike-article-id = {7845894},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-mobihoc03.pdf},
    keywords = {mobile, publications},
    location = {Annapolis, Maryland, USA},
    pages = {13--24},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {ACM},
    title = {A charging and rewarding scheme for packet forwarding in multi-hop cellular networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-mobihoc03.pdf},
    year = {2003}
    }
  • M. Jakobsson, S. Wetzel, and B. Yener, “Stealth attacks on Ad-Hoc wireless networks,” in Ieee vehicular technology conference, Orlando, Florida, 2003.
    [Bibtex]
    @inproceedings{JWY03,
    address = {Orlando, Florida},
    author = {Jakobsson, Markus and Wetzel, Susanne and Yener, Bulent},
    booktitle = {IEEE Vehicular Technology Conference},
    citeulike-article-id = {7845893},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ivts03.pdf},
    keywords = {mobile, publications},
    month = oct,
    organization = {IEEE},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {IEEE},
    title = {Stealth Attacks on {Ad-Hoc} Wireless Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ivts03.pdf},
    year = {2003}
    }
  • M. Jakobsson, X. Wang, and S. Wetzel, “Stealth attacks in vehicular technologies,” in Proceedings of ieee vehicular technology conference 2004 fall (vtc-fall 2004), Los Angeles, CA, 2004.
    [Bibtex]
    @inproceedings{JWW04,
    address = {Los Angeles, CA},
    author = {Jakobsson, M. and Wang, X. and Wetzel, S.},
    booktitle = {Proceedings of IEEE Vehicular Technology Conference 2004 Fall (VTC-Fall 2004)},
    citeulike-article-id = {7845892},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ivts04.pdf},
    keywords = {mobile, publications},
    month = sep,
    organization = {IEEE VTS},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {IEEE},
    title = {Stealth Attacks in Vehicular Technologies},
    url = {http://markus-jakobsson.com/papers/jakobsson-ivts04.pdf},
    year = {2004}
    }
  • N. B. Salem, J. Hubaux, and M. Jakobsson, “Reputation-based Wi-Fi deployment protocols and security analysis,” in Wmash ’04: proceedings of the 2nd acm international workshop on wireless mobile applications and services on wlan hotspots, New York, NY, USA, 2004, pp. 29-40.
    [Bibtex]
    @inproceedings{repu-wifi-analysis,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Hubaux, Jean-Pierre and Jakobsson, Markus},
    booktitle = {WMASH '04: Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots},
    citeulike-article-id = {7845891},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-wmash04.pdf},
    keywords = {mobile, publications},
    location = {Philadelphia, PA, USA},
    pages = {29--40},
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    publisher = {ACM},
    title = {Reputation-based {Wi-Fi} deployment protocols and security analysis},
    url = {http://markus-jakobsson.com/papers/jakobsson-wmash04.pdf},
    year = {2004}
    }
  • M. Jakobsson and L. Yang, “Quantifying security in hybrid cellular networks,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{JY-ACNS05,
    address = {New York, NY},
    author = {Jakobsson, Markus and Yang, Liu},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845890},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05quant.pdf},
    keywords = {mobile, publications},
    month = jun,
    posted-at = {2010-09-17 03:28:37},
    priority = {0},
    title = {Quantifying Security in Hybrid Cellular Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05quant.pdf},
    year = {2005}
    }
  • L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks,” in Second international conference on security and privacy in communication networks (securecomm), Baltimore, MD, 2006.
    [Bibtex]
    @inproceedings{Yang_discountanonymous,
    address = {Baltimore, MD},
    author = {Yang, Liu and Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {Second International Conference on Security and Privacy in Communication Networks (SECURECOMM)},
    citeulike-article-id = {7845889},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-securecomm06.pdf},
    keywords = {mobile, publications},
    month = jun,
    organization = {IEEE and CREATE-NET},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {IEEE},
    title = {Discount Anonymous On Demand Routing for Mobile Ad hoc Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-securecomm06.pdf},
    year = {2006}
    }
  • R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, “Controlling data in the cloud: outsourcing computation without outsourcing control,” in Ccsw ’09: proceedings of the 2009 acm workshop on cloud computing security, New York, NY, USA, 2009, pp. 85-90.
    [Bibtex]
    @inproceedings{ccsw09,
    address = {New York, NY, USA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Shi, Elaine and Staddon, Jessica and Masuoka, Ryusuke and Molina, Jesus},
    booktitle = {CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security},
    citeulike-article-id = {7845888},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf},
    keywords = {mobile, publications},
    location = {Chicago, Illinois, USA},
    pages = {85--90},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {ACM},
    title = {Controlling data in the cloud: outsourcing computation without outsourcing control},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccsw09.pdf},
    year = {2009}
    }
  • N. Ben Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, “Node cooperation in hybrid ad hoc networks,” Ieee transactions on mobile computing, vol. 5, iss. 4, pp. 365-376, 2006.
    [Bibtex]
    @article{node-cooperation-06,
    address = {Piscataway, NJ, USA},
    author = {Ben Salem, Naouel and Buttyan, Levente and Hubaux, Jean-Pierre and Jakobsson, Markus},
    citeulike-article-id = {7845887},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeemc06.pdf},
    journal = {IEEE Transactions on Mobile Computing},
    keywords = {mobile, publications},
    number = {4},
    pages = {365--376},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Node Cooperation in Hybrid Ad Hoc Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeemc06.pdf},
    volume = {5},
    year = {2006}
    }
  • N. B. Salem, J. Hubaux, and M. Jakobsson, “Reputation-based Wi-Fi deployment,” Sigmobile mob. comput. commun. rev., vol. 9, iss. 3, pp. 69-81, 2005.
    [Bibtex]
    @article{repu-wifi-05,
    address = {New York, NY, USA},
    author = {Salem, Naouel B. and Hubaux, Jean-Pierre and Jakobsson, Markus},
    citeulike-article-id = {7845886},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-sigmobile05.pdf},
    journal = {SIGMOBILE Mob. Comput. Commun. Rev.},
    keywords = {mobile, publications},
    number = {3},
    pages = {69--81},
    posted-at = {2010-09-17 03:28:36},
    priority = {0},
    publisher = {ACM},
    title = {Reputation-based {Wi-Fi} deployment},
    url = {http://markus-jakobsson.com/papers/jakobsson-sigmobile05.pdf},
    volume = {9},
    year = {2005}
    }
  • M. Jakobsson, A central nervous system for automatically detecting malware, 2009.
    [Bibtex]
    @misc{markus-blog,
    author = {Jakobsson, Markus},
    citeulike-article-id = {7845871},
    citeulike-linkout-0 = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    keywords = {fraud, malware, mobile, publications},
    month = sep,
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {A Central Nervous System for Automatically Detecting Malware},
    url = {http://blogs.parc.com/blog/2009/09/a-central-nervous-system-for-automatically-detecting-malware/},
    year = {2009}
    }
  • M. Jakobsson and K. Johansson, “Retroactive detection of malware with applications to mobile platforms,” in Hotsec 2010, Washington, DC, 2010.
    [Bibtex]
    @inproceedings{JJ10b,
    address = {Washington, DC},
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {HotSec 2010},
    citeulike-article-id = {7845869},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    keywords = {fraud, malware, mobile, most-downloaded, publications},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    publisher = {USENIX},
    title = {Retroactive Detection of Malware With Applications to Mobile Platforms},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec10.pdf},
    year = {2010}
    }
  • M. Jakobsson and K. Johansson, Assured detection of malware with applications to mobile platforms, 2010.
    [Bibtex]
    @misc{JJ10,
    author = {Jakobsson, Markus and Johansson, Karl-Anders},
    booktitle = {DIMACS Technical Report 2010-03},
    citeulike-article-id = {7845868},
    citeulike-linkout-0 = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-dimacstr10.pdf},
    howpublished = {\\\\urlhttp://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    keywords = {fraud, malware, mobile, publications},
    pages = {97--110},
    posted-at = {2010-09-17 03:24:24},
    priority = {0},
    title = {Assured Detection of Malware With Applications to Mobile Platforms},
    url = {http://dimacs.rutgers.edu/TechnicalReports/abstracts/2010/2010-03.html},
    year = {2010}
    }
  • D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 102-119.
    [Bibtex]
    @inproceedings{coppersmith-jakobsson,
    address = {Berlin, Heidelberg},
    author = {Coppersmith, Don and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7845797},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    keywords = {building-blocks, mobile, most-downloaded, privacy, publications},
    location = {Southampton, Bermuda},
    pages = {102--119},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Almost optimal hash sequence traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    year = {2003}
    }
  • M. Jakobsson, “Fractal hash sequence representation and traversal,” in Proceedings of the 2002 ieee international symposium on information theory (isit `02), Palais de Beaulieu, Lausanne, Switzerland, 2002, pp. 437-444.
    [Bibtex]
    @inproceedings{Jakobsson02,
    address = {Palais de Beaulieu, Lausanne, Switzerland},
    author = {Jakobsson, M.},
    booktitle = {Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT `02)},
    citeulike-article-id = {7845796},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    keywords = {building-blocks, mobile, publications},
    month = jun,
    organization = {IEEE},
    pages = {437--444},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    title = {Fractal Hash Sequence Representation and Traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-isit02.pdf},
    year = {2002}
    }
  • M. Jakobsson, T. Leighton, S. Micali, and M. Szydlo, “Fractal merkle tree representation and traversal,” in Ct-rsa’03: proceedings of the 2003 rsa conference on the cryptographers’ track, Berlin, Heidelberg, 2003, pp. 314-326.
    [Bibtex]
    @inproceedings{merkle-tree,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Leighton, Tom and Micali, Silvio and Szydlo, Michael},
    booktitle = {CT-RSA'03: Proceedings of the 2003 RSA conference on The cryptographers' track},
    citeulike-article-id = {7845794},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    keywords = {building-blocks, mobile, publications},
    location = {San Francisco, CA, USA},
    pages = {314--326},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Fractal Merkle tree representation and traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa03.pdf},
    year = {2003}
    }
  • R. Chow, P. Golle, M. Jakobsson, L. Wang, and X. Wang, “Making CAPTCHAs clickable,” in Hotmobile ’08: proceedings of the 9th workshop on mobile computing systems and applications, New York, NY, USA, 2008, pp. 91-94.
    [Bibtex]
    @inproceedings{click-captcha,
    address = {New York, NY, USA},
    author = {Chow, Richard and Golle, Philippe and Jakobsson, Markus and Wang, Lusha and Wang, XiaoFeng},
    booktitle = {HotMobile '08: Proceedings of the 9th workshop on Mobile computing systems and applications},
    citeulike-article-id = {7845789},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    keywords = {building-blocks, captcha, mobile, publications},
    location = {Napa Valley, California},
    pages = {91--94},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Making {CAPTCHAs} clickable},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotmobile08.pdf},
    year = {2008}
    }
  • M. Jakobsson and S. Wetzel, “Efficient attribute authentication with applications to ad hoc networks,” in Vanet ’04: proceedings of the 1st acm international workshop on vehicular ad hoc networks, New York, NY, USA, 2004, pp. 38-46.
    [Bibtex]
    @inproceedings{JW-VANET04,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Wetzel, Susanne},
    booktitle = {VANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks},
    citeulike-article-id = {7845764},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    keywords = {authentication, mobile, publications},
    location = {Philadelphia, PA, USA},
    pages = {38--46},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {ACM},
    title = {Efficient attribute authentication with applications to ad hoc networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-vanet04.pdf},
    year = {2004}
    }
  • M. Jakobsson, E. Shi, and R. Chow, “Implicit authentication for mobile devices,” in The 4th usenix workshop on hot topics in security (hotsec’09), Montreal, Canada, 2009.
    [Bibtex]
    @inproceedings{imp-auth-89,
    address = {Montreal, Canada},
    author = {Jakobsson, Markus and Shi, Elaine and Chow, Richard},
    booktitle = {The 4th USENIX Workshop on Hot Topics in Security (HotSec'09)},
    citeulike-article-id = {7845758},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    keywords = {authentication, mobile, publications, user-experiments},
    month = aug,
    organization = {USENIX},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {USENIX},
    title = {Implicit authentication for mobile devices},
    url = {http://markus-jakobsson.com/papers/jakobsson-hotsec09.pdf},
    year = {2009}
    }

Comments are closed.