Follow
Markus Jakobsson
Markus Jakobsson
Founder/CTO, ZapFraud; Chief Scientist, Artema LABS
Verified email at zapfraud-inc.com - Homepage
Title
Cited by
Cited by
Year
Social phishing
TN Jagatic, NA Johnson, M Jakobsson, F Menczer
Communications of the ACM 50 (10), 94-100, 2007
17362007
Controlling data in the cloud: outsourcing computation without outsourcing control
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina
Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009
12422009
Designated verifier proofs and their applications
M Jakobsson, K Sako, R Impagliazzo
International Conference on the Theory and Applications of Cryptographic …, 1996
11961996
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 61-70, 2005
8342005
Proofs of work and bread pudding protocols
M Jakobsson, A Juels
Secure Information Networks: Communications and Multimedia Security IFIP TC6 …, 1999
7761999
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
6242004
Making mix nets robust for electronic voting by randomized partial checking
M Jakobsson, A Juels, RL Rivest
11th USENIX Security Symposium (USENIX Security 02), 2002
5642002
Identity authentication system and method
M Jakobsson, A Juels, BS Kaliski Jr
US Patent 7,502,933, 2009
5622009
Security weaknesses in Bluetooth
M Jakobsson, S Wetzel
Cryptographers’ Track at the RSA Conference, 176-191, 2001
4912001
Phishing and countermeasures: understanding the increasing problem of electronic identity theft
M Jakobsson, S Myers
John Wiley & Sons, 2006
4432006
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
M Jakobsson, JP Hubaux, L Buttyán
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
4042003
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3951997
Implicit authentication through learning user behavior
E Shi, Y Niu, M Jakobsson, R Chow
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
3882011
Mix and match: Secure function evaluation via ciphertexts
M Jakobsson, A Juels
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
3792000
Abuse-free optimistic contract signing
JA Garay, M Jakobsson, P MacKenzie
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
3591999
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
NB Salem, L Buttyan, JP Hubaux, M Jakobsson
Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003
3552003
Implicit authentication for mobile devices
M Jakobsson, E Shi, P Golle, R Chow
Proceedings of the 4th USENIX conference on Hot topics in security 1, 25-27, 2009
3452009
A practical mix
M Jakobsson
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
2611998
System and method providing disconnected authentication
A Nanopoulos, K Ackerman, P Bowness, W Duane, M Jakobsson, ...
US Patent 8,966,276, 2015
2522015
Almost optimal hash sequence traversal
D Coppersmith, M Jakobsson
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
2332003
The system can't perform the operation now. Try again later.
Articles 1–20