Privacy

  • Towards trustworthy elections: new directions in electronic voting, D. Chaum, M. Jakobsson, R. Rivest, P. Ryan, J. Benaloh, M. Kutylowski, and B. Adida, Eds., Springer, 2010, vol. 6000.
    [Bibtex]
    @book{citeulike:7936907,
    citeulike-article-id = {7936907},
    editor = {Chaum, David and Jakobsson, Markus and Rivest, Ron and Ryan, Peter and Benaloh, Josh and Kutylowski, Miroslaw and Adida, Ben},
    journal = {Lecture Notes in Computer Science},
    keywords = {authentication, distributed-computing, encryption, privacy, publications},
    posted-at = {2010-10-01 18:36:16},
    priority = {2},
    publisher = {Springer},
    title = {Towards Trustworthy Elections: New Directions in Electronic Voting},
    volume = {6000},
    year = {2010}
    }
  • M. Jakobsson and M. Yung, “Revokable and versatile electronic money (extended abstract),” in Ccs ’96: proceedings of the 3rd acm conference on computer and communications security, New York, NY, USA, 1996, pp. 76-87.
    [Bibtex]
    @inproceedings{revokable-emoney,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CCS '96: Proceedings of the 3rd ACM conference on Computer and communications security},
    citeulike-article-id = {7846046},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ccs96.pdf},
    keywords = {privacy, publications},
    location = {New Delhi, India},
    pages = {76--87},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {ACM},
    title = {Revokable and versatile electronic money (extended abstract)},
    url = {http://markus-jakobsson.com/papers/jakobsson-ccs96.pdf},
    year = {1996}
    }
  • R. M. Arlein, B. Jai, M. Jakobsson, F. Monrose, and M. K. Reiter, “Privacy-preserving global customization,” in Ec ’00: proceedings of the 2nd acm conference on electronic commerce, New York, NY, USA, 2000, pp. 176-184.
    [Bibtex]
    @inproceedings{privacy-pre-global,
    address = {New York, NY, USA},
    author = {Arlein, Robert M. and Jai, Ben and Jakobsson, Markus and Monrose, Fabian and Reiter, Michael K.},
    booktitle = {EC '00: Proceedings of the 2nd ACM conference on Electronic commerce},
    citeulike-article-id = {7846045},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ec00.pdf},
    keywords = {privacy, publications},
    location = {Minneapolis, Minnesota, United States},
    pages = {176--184},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {ACM},
    title = {Privacy-preserving global customization},
    url = {http://markus-jakobsson.com/papers/jakobsson-ec00.pdf},
    year = {2000}
    }
  • M. Jakobsson, A. Juels, and J. Ratkiewicz, “Privacy-Preserving history mining for web browsers,” in Web 2.0 security and privacy, Oakland, CA, 2008.
    [Bibtex]
    @inproceedings{pp-history-mining,
    address = {Oakland, CA},
    author = {Jakobsson, Markus and Juels, Ari and Ratkiewicz, Jacob},
    booktitle = {Web 2.0 Security and Privacy},
    citeulike-article-id = {7846044},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-web20sp08.pdf},
    keywords = {privacy, publications},
    month = may,
    organization = {IEEE},
    posted-at = {2010-09-17 03:32:41},
    priority = {0},
    publisher = {IEEE},
    title = {{Privacy-Preserving} History Mining for Web Browsers},
    url = {http://markus-jakobsson.com/papers/jakobsson-web20sp08.pdf},
    year = {2008}
    }
  • V. Griffith and M. Jakobsson, “Messin ‘ with texas: deriving mother’s maiden names using public records,” in Applied cryptography and network security, New York, NY, 2005.
    [Bibtex]
    @inproceedings{mmn,
    address = {New York, NY},
    author = {Griffith, Virgil and Jakobsson, Markus},
    booktitle = {Applied Cryptography and Network Security},
    citeulike-article-id = {7845863},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    keywords = {fraud, most-downloaded, privacy, publications},
    month = jun,
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    title = {Messin ' with Texas: Deriving Mother's Maiden Names Using Public Records},
    url = {http://markus-jakobsson.com/papers/jakobsson-acns05-texas.pdf},
    year = {2005}
    }
  • M. Jakobsson and S. Stamm, “Invasive browser sniffing and countermeasures,” in Www ’06: proceedings of the 15th international conference on world wide web, New York, NY, USA, 2006, pp. 523-532.
    [Bibtex]
    @inproceedings{invasive-sniffing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    booktitle = {WWW '06: Proceedings of the 15th international conference on World Wide Web},
    citeulike-article-id = {7845862},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    keywords = {fraud, privacy, publications},
    location = {Edinburgh, Scotland},
    pages = {523--532},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {ACM},
    title = {Invasive browser sniffing and countermeasures},
    url = {http://markus-jakobsson.com/papers/jakobsson-www06-sniff.pdf},
    year = {2006}
    }
  • M. Jakobsson and S. Stamm, “Web camouflage: protecting your clients from Browser-Sniffing attacks,” Ieee security and privacy, vol. 5, iss. 6, pp. 16-24, 2007.
    [Bibtex]
    @article{web-camoulfage,
    address = {Piscataway, NJ, USA},
    author = {Jakobsson, Markus and Stamm, Sid},
    citeulike-article-id = {7845849},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    journal = {IEEE Security and Privacy},
    keywords = {fraud, phishing, privacy, publications},
    number = {6},
    pages = {16--24},
    posted-at = {2010-09-17 03:24:23},
    priority = {0},
    publisher = {IEEE Educational Activities Department},
    title = {Web Camouflage: Protecting Your Clients from {Browser-Sniffing} Attacks},
    url = {http://markus-jakobsson.com/papers/jakobsson-ieeesp07.pdf},
    volume = {5},
    year = {2007}
    }
  • A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,” in Wpes ’05: proceedings of the 2005 acm workshop on privacy in the electronic society, New York, NY, USA, 2005, pp. 61-70.
    [Bibtex]
    @inproceedings{JCJ-wpes05,
    address = {New York, NY, USA},
    author = {Juels, Ari and Catalano, Dario and Jakobsson, Markus},
    booktitle = {WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845835},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    keywords = {encryption, privacy, publications},
    location = {Alexandria, VA, USA},
    pages = {61--70},
    posted-at = {2010-09-17 03:22:32},
    priority = {0},
    publisher = {ACM},
    title = {Coercion-resistant electronic elections},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes05.pdf},
    year = {2005}
    }
  • P. G. Jong Youl Choi and M. Jakobsson, “Auditable privacy: on Tamper-Evident mix networks,” in Proceeding of financial cryptography and data security, Anguilla, British West Indies, 2006, pp. 126-141.
    [Bibtex]
    @inproceedings{CGJ-2006,
    address = {Anguilla, British West Indies},
    author = {Jong Youl Choi, Philippe G. and Jakobsson, Markus},
    booktitle = {Proceeding of Financial Cryptography and Data Security},
    citeulike-article-id = {7845834},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    keywords = {encryption, malware, privacy, publications},
    month = feb,
    pages = {126--141},
    posted-at = {2010-09-17 03:22:31},
    priority = {0},
    publisher = {Springer Verlag},
    title = {Auditable Privacy: On {Tamper-Evident} Mix Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc06.pdf},
    volume = {LNCS 4107},
    year = {2006}
    }
  • M. Jakobsson, “Flash mixing,” in Podc ’99: proceedings of the eighteenth annual acm symposium on principles of distributed computing, New York, NY, USA, 1999, pp. 83-89.
    [Bibtex]
    @inproceedings{flash-mixing,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus},
    booktitle = {PODC '99: Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845823},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Atlanta, Georgia, United States},
    pages = {83--89},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM},
    title = {Flash mixing},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc99.pdf},
    year = {1999}
    }
  • M. Jakobsson and A. Juels, “Mix and match: secure function evaluation via ciphertexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 162-177.
    [Bibtex]
    @inproceedings{mix-match,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845822},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {162--177},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Mix and Match: Secure Function Evaluation via Ciphertexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-mixmatch.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “Addition of ElGamal plaintexts,” in Asiacrypt ’00: proceedings of the 6th international conference on the theory and application of cryptology and information security, London, UK, 2000, pp. 346-358.
    [Bibtex]
    @inproceedings{add-elgamal,
    address = {London, UK},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '00: Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845821},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {346--358},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Addition of {ElGamal} Plaintexts},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt00-addgamal.pdf},
    year = {2000}
    }
  • M. Jakobsson and A. Juels, “An optimally robust hybrid mix network,” in Podc ’01: proceedings of the twentieth annual acm symposium on principles of distributed computing, New York, NY, USA, 2001, pp. 284-292.
    [Bibtex]
    @inproceedings{JJ01,
    address = {New York, NY, USA},
    author = {Jakobsson, Markus and Juels, Ari},
    booktitle = {PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing},
    citeulike-article-id = {7845820},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    location = {Newport, Rhode Island, United States},
    pages = {284--292},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {ACM Press},
    title = {An optimally robust hybrid mix network},
    url = {http://markus-jakobsson.com/papers/jakobsson-podc01.pdf},
    year = {2001}
    }
  • M. Jakobsson, A. Juels, and R. L. Rivest, “Making mix nets robust for electronic voting by randomized partial checking,” in Proceedings of the 11th usenix security symposium, Berkeley, CA, USA, 2002, pp. 339-353.
    [Bibtex]
    @inproceedings{mix-net-usenix-02,
    address = {Berkeley, CA, USA},
    author = {Jakobsson, Markus and Juels, Ari and Rivest, Ronald L.},
    booktitle = {Proceedings of the 11th USENIX Security Symposium},
    citeulike-article-id = {7845819},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    pages = {339--353},
    posted-at = {2010-09-17 03:21:07},
    priority = {0},
    publisher = {USENIX Association},
    title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking},
    url = {http://markus-jakobsson.com/papers/jakobsson-usenix02.pdf},
    year = {2002}
    }
  • P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels, “Optimistic mixing for Exit-Polls,” in Asiacrypt ’02: proceedings of the 8th international conference on the theory and application of cryptology and information security, London, UK, 2002, pp. 451-465.
    [Bibtex]
    @inproceedings{optimistic-mixing,
    address = {London, UK},
    author = {Golle, Philippe and Zhong, Sheng and Boneh, Dan and Jakobsson, Markus and Juels, Ari},
    booktitle = {ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security},
    citeulike-article-id = {7845818},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    keywords = {distributed-computing, privacy, publications},
    pages = {451--465},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Optimistic Mixing for {Exit-Polls}},
    url = {http://markus-jakobsson.com/papers/jakobsson-asiacrypt02.pdf},
    year = {2002}
    }
  • P. Golle, X. Wang, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix networks,” in Ieee symposium on security and privacy, Oakland, California, 2006, pp. 121-131.
    [Bibtex]
    @inproceedings{deterring-mix-sp06,
    address = {Oakland, California},
    author = {Golle, Philippe and Wang, XiaoFeng and Jakobsson, Markus and Tsow, Alex},
    booktitle = {IEEE Symposium on Security and Privacy},
    citeulike-article-id = {7845817},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    keywords = {distributed-computing, encryption, privacy, publications},
    month = may,
    organization = {IEEE},
    pages = {121--131},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {IEEE},
    title = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-oakland06-mix.pdf},
    year = {2006}
    }
  • X. Wang, P. Golle, M. Jakobsson, and A. Tsow, “Deterring voluntary trace disclosure in re-encryption mix-networks,” Acm trans. inf. syst. secur., vol. 13, iss. 2, pp. 1-24, 2010.
    [Bibtex]
    @article{wang-golle-10,
    address = {New York, NY, USA},
    author = {Wang, Xiaofeng and Golle, Philippe and Jakobsson, Markus and Tsow, Alex},
    citeulike-article-id = {7845816},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-www06-rot13.pdf},
    journal = {ACM Trans. Inf. Syst. Secur.},
    keywords = {distributed-computing, encryption, privacy, publications},
    number = {2},
    pages = {1--24},
    posted-at = {2010-09-17 03:21:06},
    priority = {0},
    publisher = {ACM},
    title = {Deterring voluntary trace disclosure in re-encryption mix-networks},
    url = {http://markus-jakobsson.com/papers/jakobsson-tissec10.pdf},
    volume = {13},
    year = {2010}
    }
  • G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, “How to forget a secret,” in Stacs’99: proceedings of the 16th annual conference on theoretical aspects of computer science, Berlin, Heidelberg, 1999, pp. 500-509.
    [Bibtex]
    @inproceedings{forget-secret,
    address = {Berlin, Heidelberg},
    author = {Di Crescenzo, Giovanni and Ferguson, Niels and Impagliazzo, Russell and Jakobsson, Markus},
    booktitle = {STACS'99: Proceedings of the 16th annual conference on Theoretical aspects of computer science},
    citeulike-article-id = {7845798},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    keywords = {building-blocks, privacy, publications},
    location = {Trier, Germany},
    pages = {500--509},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {How to forget a secret},
    url = {http://markus-jakobsson.com/papers/jakobsson-stacs99.pdf},
    year = {1999}
    }
  • D. Coppersmith and M. Jakobsson, “Almost optimal hash sequence traversal,” in Fc’02: proceedings of the 6th international conference on financial cryptography, Berlin, Heidelberg, 2003, pp. 102-119.
    [Bibtex]
    @inproceedings{coppersmith-jakobsson,
    address = {Berlin, Heidelberg},
    author = {Coppersmith, Don and Jakobsson, Markus},
    booktitle = {FC'02: Proceedings of the 6th international conference on Financial cryptography},
    citeulike-article-id = {7845797},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    keywords = {building-blocks, mobile, most-downloaded, privacy, publications},
    location = {Southampton, Bermuda},
    pages = {102--119},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Almost optimal hash sequence traversal},
    url = {http://markus-jakobsson.com/papers/jakobsson-fc02-aohash.pdf},
    year = {2003}
    }
  • P. Golle and M. Jakobsson, “Reusable anonymous return channels,” in Wpes ’03: proceedings of the 2003 acm workshop on privacy in the electronic society, New York, NY, USA, 2003, pp. 94-100.
    [Bibtex]
    @inproceedings{reusable-anonymous,
    address = {New York, NY, USA},
    author = {Golle, Philippe and Jakobsson, Markus},
    booktitle = {WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society},
    citeulike-article-id = {7845793},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    citeulike-linkout-1 = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    location = {Washington, DC},
    pages = {94--100},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {ACM},
    title = {Reusable anonymous return channels},
    url = {http://markus-jakobsson.com/papers/jakobsson-wpes03.pdf},
    year = {2003}
    }
  • P. Golle, M. Jakobsson, A. Juels, and P. Syverson, “Universal re-encryption for mixnets,” in Topics in cryptology ct-rsa 2004, London, UK, 2004, pp. 163-178.
    [Bibtex]
    @inproceedings{GJJS04,
    address = {London, UK},
    author = {Golle, Philippe and Jakobsson, Markus and Juels, Ari and Syverson, Paul},
    booktitle = {Topics in Cryptology CT-RSA 2004},
    citeulike-article-id = {7845791},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    comment = {LNCS 2964},
    keywords = {building-blocks, distributed-computing, encryption, privacy, publications},
    pages = {163--178},
    posted-at = {2010-09-17 03:17:24},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Universal Re-encryption for Mixnets},
    url = {http://markus-jakobsson.com/papers/jakobsson-ctrsa04.pdf},
    year = {2004}
    }
  • M. Jakobsson, K. Sako, and R. Impagliazzo, “Designated verifier proofs and their applications,” in Eurocrypt’96: proceedings of the 15th annual international conference on theory and application of cryptographic techniques, Berlin, Heidelberg, 1996, pp. 143-154.
    [Bibtex]
    @inproceedings{verifier-proofs,
    address = {Berlin, Heidelberg},
    author = {Jakobsson, Markus and Sako, Kazue and Impagliazzo, Russell},
    booktitle = {EUROCRYPT'96: Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques},
    citeulike-article-id = {7845775},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    keywords = {authentication, building-blocks, most-downloaded, privacy, publications},
    location = {Saragossa, Spain},
    pages = {143--154},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Designated verifier proofs and their applications},
    url = {http://markus-jakobsson.com/papers/jakobsson-eurocrypt96.pdf},
    year = {1996}
    }
  • M. Jakobsson and M. Yung, “Proving without knowing: on oblivious, agnostic and blindolded provers,” in Crypto ’96: proceedings of the 16th annual international cryptology conference on advances in cryptology, London, UK, 1996, pp. 186-200.
    [Bibtex]
    @inproceedings{proving-without-know,
    address = {London, UK},
    author = {Jakobsson, Markus and Yung, Moti},
    booktitle = {CRYPTO '96: Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology},
    citeulike-article-id = {7845774},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    keywords = {authentication, building-blocks, privacy, publications},
    pages = {186--200},
    posted-at = {2010-09-17 03:11:48},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
    url = {http://markus-jakobsson.com/papers/jakobsson-crypto96.pdf},
    year = {1996}
    }
  • P. Bohannon, M. Jakobsson, and S. Srikwan, “Cryptographic approaches to provacy in forensic DNA databases,” in Pkc ’00: proceedings of the third international workshop on practice and theory in public key cryptography, London, UK, 2000, pp. 373-390.
    [Bibtex]
    @inproceedings{dna-database,
    address = {London, UK},
    author = {Bohannon, Philip and Jakobsson, Markus and Srikwan, Sukamol},
    booktitle = {PKC '00: Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography},
    citeulike-article-id = {7845768},
    citeulike-linkout-0 = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    keywords = {authentication, encryption, privacy, publications},
    pages = {373--390},
    posted-at = {2010-09-17 03:11:47},
    priority = {0},
    publisher = {Springer-Verlag},
    title = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
    url = {http://markus-jakobsson.com/papers/jakobsson-pkc00.pdf},
    year = {2000}
    }

Comments are closed.