Markus Jakobsson

According to our database1, Markus Jakobsson authored at least 135 papers between 1994 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Permissions and Privacy.
IEEE Secur. Priv., 2020

Social Engineering Resistant 2FA.
CoRR, 2020

2019
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities.
IEEE Trans. Vis. Comput. Graph., 2019

The Rising Threat of Launchpad Attacks.
IEEE Secur. Priv., 2019

2018
Secure Remote Attestation.
IACR Cryptol. ePrint Arch., 2018

2017
Mind your SMSes: Mitigating social engineering in second factor authentication.
Comput. Secur., 2017

Short Paper: Addressing Sophisticated Email Attacks.
Proceedings of the Financial Cryptography and Data Security, 2017

Breaking and fixing content-based filtering.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
User trust assessment: a new approach to combat deception.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Case Study: Romance Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Predicting Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Traditional Countermeasures to Unwanted Email.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Case Study: Rental Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Case Study: Sales Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Identifying Scams and Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Conclusion and Next Steps.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Case Study: Business Email Compromise.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Semantic Analysis of Messages.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Scams and Targeting.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Persuasion in Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Obfuscation in Spam and Scam.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2014
Helping You Protect You.
IEEE Secur. Priv., 2014

Hand authentication on multi-touch tablets.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Mobile Authentication - Problems and Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-4878-5, 2013

2012
The Future of Authentication.
IEEE Secur. Priv., 2012

The Benefits of Understanding Passwords.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Improved Visual Preference Authentication.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

2010
Phishing.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Deterring voluntary trace disclosure in re-encryption mix-networks.
ACM Trans. Inf. Syst. Secur., 2010

Retroactive Detection of Malware with Applications to Mobile Platforms.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Implicit Authentication through Learning User Behavior.
Proceedings of the Information Security - 13th International Conference, 2010

Authentication in the clouds: a framework and its application to mobile users.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Server-side detection of malware infection.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

Captcha-free throttling.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Delayed password disclosure.
Int. J. Appl. Cryptogr., 2008

Why and How to Perform Fraud Experiments.
IEEE Secur. Priv., 2008

Using Cartoons to Teach Internet Security.
Cryptologia, 2008

Making CAPTCHAs clickable.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008

The Threat of Political Phishing.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

Quantifying the security of preference-based authentication.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Love and authentication.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Designing ethical phishing experiments.
IEEE Technol. Soc. Mag., 2007

Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks.
IEEE Secur. Priv., 2007

Social phishing.
Commun. ACM, 2007

Combating Click Fraud via Premium Clicks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Drive-By Pharming.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

What Instills Trust? A Qualitative Study of Phishing.
Proceedings of the Financial Cryptography and Data Security, 2007

Phishing IQ Tests Measure Fear, Not Ability.
Proceedings of the Financial Cryptography and Data Security, 2007

Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007

2006
Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Threshold Password-Authenticated Key Exchange.
J. Cryptol., 2006

Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digit. Forensic Pract., 2006

Badvertisements: Stealthy Click-Fraud with Unwitting Accessories.
J. Digit. Forensic Pract., 2006

Invasive browser sniffing and countermeasures.
Proceedings of the 15th international conference on World Wide Web, 2006

Designing ethical phishing experiments: a study of (ROT13) rOnl query features.
Proceedings of the 15th international conference on World Wide Web, 2006

Cache Cookies for Browser Authentication (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Discount Anonymous On Demand Routing for Mobile Ad hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.
Proceedings of IEEE International Conference on Communications, 2006

Auditable Privacy: On Tamper-Evident Mix Networks.
Proceedings of the Financial Cryptography and Data Security, 2006

Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Reputation-based Wi-Fi deployment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Privacy-Preserving Polling using Playing Cards.
IACR Cryptol. ePrint Arch., 2005

Distributed Phishing Attacks.
IACR Cryptol. ePrint Arch., 2005

Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware.
IACR Cryptol. ePrint Arch., 2005

Specifying Patterns for Mobile Application Domain Using General Architectural Components.
Proceedings of the Product Focused Software Process Improvement, 2005

Balancing auditability and privacy in vehicular networks.
Proceedings of the Q2SWinet'05, 2005

Modeling and Preventing Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

Quantifying Security in Hybrid Cellular Networks.
Proceedings of the Applied Cryptography and Network Security, 2005

Efficient Constructions for One-Way Hash Chains.
Proceedings of the Applied Cryptography and Network Security, 2005

Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Reputation-based Wi-Fi deployment protocols and security analysis.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004

Stealth attacks in vehicular technologies.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

Efficient attribute authentication with applications to ad hoc networks.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004

2003
Untraceable Email Cluster Bombs.
login Usenix Mag., 2003

How to Protect Against a Militant Spammer.
IACR Cryptol. ePrint Arch., 2003

Cryptographic Randomized Response Techniques.
IACR Cryptol. ePrint Arch., 2003

Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service
CoRR, 2003

Reusable anonymous return channels.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Proceedings of the Financial Cryptography, 2003

Fractal Merkle Tree Representation and Traversal.
Proceedings of the Topics in Cryptology, 2003

2002
Coercion-Resistant Electronic Elections.
IACR Cryptol. ePrint Arch., 2002

Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking.
IACR Cryptol. ePrint Arch., 2002

Fractal Hash Sequence Representation and Traversal.
IACR Cryptol. ePrint Arch., 2002

Almost Optimal Hash Sequence Traversal.
IACR Cryptol. ePrint Arch., 2002

Financial Instruments in Recommendation Mechanisms.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Timed Release of Standard Digital Signatures.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Proprietary Certificates.
Proceedings of the Topics in Cryptology, 2002

Theft-Protected Proprietary Certificates.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

IntelliShopper: a proactive, personal, private shopping assistant.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002

2001
An optimally robust hybrid mix network.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Secure Server-Aided Signature Generation.
Proceedings of the Public Key Cryptography, 2001

Mutual Authentication for Low-Power Mobile Devices.
Proceedings of the Financial Cryptography, 2001

Security Weaknesses in Bluetooth.
Proceedings of the Topics in Cryptology, 2001

Secure Mobile Gambling.
Proceedings of the Topics in Cryptology, 2001

Discouraging Software Piracy Using Software Aging.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
How to turn loaded dice into fair coins.
IEEE Trans. Inf. Theory, 2000

Privacy-preserving global customization.
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000

Cryptographic Approaches to Provacy in Forensic DNA Databases.
Proceedings of the Public Key Cryptography, 2000

Security of Signed ElGamal Encryption.
Proceedings of the Advances in Cryptology, 2000

Addition of ElGamal Plaintexts.
Proceedings of the Advances in Cryptology, 2000

Mix and Match: Secure Function Evaluation via Ciphertexts.
Proceedings of the Advances in Cryptology, 2000

1999
Secure and Lightweight Advertising on the Web.
Comput. Networks, 1999

How to Forget a Secret.
Proceedings of the STACS 99, 1999

Flash Mixing.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

Mini-Cash: A Minimalistic Approach to E-Commerce.
Proceedings of the Public Key Cryptography, 1999

On Quorum Controlled Asymmetric Proxy Re-encryption.
Proceedings of the Public Key Cryptography, 1999

Scramble All, Encrypt Small.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Improved Magic Ink Signatures Using Hints.
Proceedings of the Financial Cryptography, 1999

Abuse-Free Optimistic Contract Signing.
Proceedings of the Advances in Cryptology, 1999

Electronic Payments: Where Do We Go from Here?.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

Efficient Oblivious Proofs of Correct Exponentiation.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999

1998
Mix-Based Electronic Payments.
Proceedings of the Selected Areas in Cryptography '98, 1998

On Assurance Structures for WWW Commerce.
Proceedings of the Financial Cryptography, 1998

X-Cash: Executable Digital Cash.
Proceedings of the Financial Cryptography, 1998

Curbing Junk E-Mail via Secure Classification.
Proceedings of the Financial Cryptography, 1998

A Practical Mix.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

A Practical Secure Physical Random Bit Generator.
Proceedings of the CCS '98, 1998

1997
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
IACR Cryptol. ePrint Arch., 1997

Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Proceedings of the Financial Cryptography, 1997

Distributed "Magic Ink" Signatures.
Proceedings of the Advances in Cryptology, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
Designated Verifier Proofs and Their Applications.
Proceedings of the Advances in Cryptology, 1996

Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Proceedings of the Advances in Cryptology, 1996

Revokable and Versatile Electronic Money (extended abstract).
Proceedings of the CCS '96, 1996

1995
Ripping Coins For a Fair Exchange.
Proceedings of the Advances in Cryptology, 1995

1994
Blackmailing using Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1994


  Loading...