Markus Jakobsson
Markus Jakobsson
Founder/CTO, ZapFraud; Chief of Security and Data Analytics, Amber Solutions
Bestätigte E-Mail-Adresse bei zapfraud-inc.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Social phishing
TN Jagatic, NA Johnson, M Jakobsson, F Menczer
Communications of the ACM 50 (10), 94-100, 2007
14022007
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
10192009
Designated verifier proofs and their applications
M Jakobsson, K Sako, R Impagliazzo
International Conference on the Theory and Applications of Cryptographic …, 1996
10021996
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
6452010
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Cryptographers’ Track at the RSA Conference, 163-178, 2004
5272004
Making mix nets robust for electronic voting by randomized partial checking.
M Jakobsson, A Juels, RL Rivest
USENIX security symposium, 339-353, 2002
5122002
Identity authentication system and method
M Jakobsson, A Juels, BS Kaliski Jr
US Patent 7,502,933, 2009
4662009
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
4232001
Proofs of work and bread pudding protocols
M Jakobsson, A Juels
Secure information networks, 258-272, 1999
3941999
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
M Jakobsson, JP Hubaux, L Buttyán
International Conference on Financial Cryptography, 15-33, 2003
3792003
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM conference on Computer and communications …, 1997
3631997
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
NB Salem, L Buttyán, JP Hubaux, M Jakobsson
Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003
3382003
Mix and match: Secure function evaluation via ciphertexts
M Jakobsson, A Juels
International Conference on the Theory and Application of Cryptology and …, 2000
3292000
Phishing and countermeasures: understanding the increasing problem of electronic identity theft
M Jakobsson, S Myers
John Wiley & Sons, 2006
3272006
Implicit authentication through learning user behavior
E Shi, Y Niu, M Jakobsson, R Chow
International Conference on Information Security, 99-113, 2010
3122010
Abuse-free optimistic contract signing
JA Garay, M Jakobsson, P MacKenzie
Annual International Cryptology Conference, 449-466, 1999
3101999
Implicit authentication for mobile devices
M Jakobsson, E Shi, P Golle, R Chow
Proceedings of the 4th USENIX conference on Hot topics in security 1, 25-27, 2009
2872009
A practical mix
M Jakobsson
International Conference on the Theory and Applications of Cryptographic …, 1998
2441998
Almost optimal hash sequence traversal
D Coppersmith, M Jakobsson
International Conference on Financial Cryptography, 102-119, 2002
2132002
Authentication in the clouds: a framework and its application to mobile users
R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010
1942010
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20