Cryptographers' World
 

Markus Jakobsson


Author's Web Page Link

44 papers in database with 2992 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 26

Conference Proceedings

 
1. Markus JakobssonMoti YungJianying Zhou, editors, Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings. Springer, 2004. ISBN 3-540-22217-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, Journal of Cryptology, Volume 19(1), pp. 27 - 66, Springer, 2006.

[Cited 56 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Markus Jakobsson,  Alex Tsow,  Ankur Shah,  Eli Blevis,  Youn-Kyung Lim,  What Instills Trust? A Qualitative Study of Phishing, pp. 356 - 361, FC 2007.

[Electronic Edition][Cited 22 times ]

2. Vivek Anandpara,  Andrew Dingman,  Markus Jakobsson,  Debin Liu,  Heather Roinestad,  Phishing IQ Tests Measure Fear, Not Ability, pp. 362 - 366, FC 2007.

[Electronic Edition][Cited 13 times ]

3. Jong Youl Choi,  Philippe Golle,  Markus Jakobsson,  Auditable Privacy: On Tamper-Evident Mix Networks, pp. 126 - 141, FC 2006.

[Electronic Edition][Cited 7 times ]

4. Virgil Griffith,  Markus Jakobsson,  Messin' with Texas Deriving Mother's Maiden Names Using Public Records, pp. 91 - 103, ACNS 2005.

[Electronic Edition][Cited 32 times ]

5. Yih-Chun Hu,  Markus Jakobsson,  Adrian Perrig,  Efficient Constructions for One-Way Hash Chains, pp. 423 - 441, ACNS 2005.

[Electronic Edition][Cited 38 times ]

6. Markus Jakobsson,  Liu Yang,  Quantifying Security in Hybrid Cellular Networks, pp. 350 - 363, ACNS 2005.

[Electronic Edition][Cited 1 times ]

7. Richard Clayton,  Drew Dean,  Markus Jakobsson,  Steven Myers,  Stuart G. Stubblebine,  Michael Szydlo,  A Chat at the Old Phishin' Hole, pp. 88 - 88, FC 2005.

[Electronic Edition][No citation]

8. Markus Jakobsson,  Modeling and Preventing Phishing Attacks, pp. 89 - 89, FC 2005.

[Electronic Edition][Cited 74 times Red Star]

9. Andris Ambainis,  Markus Jakobsson,  Helger Lipmaa,  Cryptographic Randomized Response Techniques, pp. 425 - 438, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

10. Philippe Golle,  Markus Jakobsson,  Ari Juels,  Paul F. Syverson,  Universal Re-encryption for Mixnets, pp. 163 - 178, CT-RSA 2004.

[Electronic Edition][Cited 267 times Red StarRed StarRed Star]

11. Markus Jakobsson,  Frank Thomson Leighton,  Silvio Micali,  Michael Szydlo,  Fractal Merkle Tree Representation and Traversal, pp. 314 - 326, CT-RSA 2003.

[Electronic Edition][Cited 54 times Red Star]

12. Markus Jakobsson,  Jean-Pierre Hubaux,  Levente Buttyán,  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks, pp. 15 - 33, FC 2003.

[Electronic Edition][Cited 216 times Red StarRed Star]

13. Philippe Golle,  Sheng Zhong,  Dan Boneh,  Markus Jakobsson,  Ari Juels,  Optimistic Mixing for Exit-Polls, pp. 451 - 465, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 86 times Red Star]

14. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, pp. 385 - 400, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

15. Markus Jakobsson,  Financial Instruments in Recommendation Mechanisms, pp. 31 - 43, FC 2002.

[Electronic Edition][Cited 1 times ]

16. Don Coppersmith,  Markus Jakobsson,  Almost Optimal Hash Sequence Traversal, pp. 102 - 119, FC 2002.

[Electronic Edition][Cited 132 times Red StarRed Star]

17. Juan A. Garay,  Markus Jakobsson,  Timed Release of Standard Digital Signatures, pp. 168 - 182, FC 2002.

[Electronic Edition][Cited 46 times ]

18. Markus Jakobsson,  Ari Juels,  Phong Q. Nguyen,  Proprietary Certificates, pp. 164 - 181, CT-RSA 2002.

[Electronic Edition][Cited 10 times ]

19. Markus Jakobsson,  David Pointcheval,  Adam Young,  Secure Mobile Gambling, pp. 110 - 125, CT-RSA 2001.

[Electronic Edition][Cited 6 times ]

20. Markus Jakobsson,  Susanne Wetzel,  Security Weaknesses in Bluetooth, pp. 176 - 191, CT-RSA 2001.

[Electronic Edition][Cited 256 times Red StarRed StarRed Star]

21. Markus Jakobsson,  Susanne Wetzel,  Secure Server-Aided Signature Generation, pp. 383 - 401, PKC 2001.

[Electronic Edition][Cited 12 times ]

22. Markus Jakobsson,  David Pointcheval,  Mutual Authentication for Low-Power Mobile Devices, pp. 169 - 186, FC 2001.

[Electronic Edition][Cited 72 times Red Star]

23. Markus Jakobsson,  Ari Juels,  Mix and Match: Secure Function Evaluation via Ciphertexts, pp. 162 - 177, ASIACRYPT 2000.

[Electronic Edition][Cited 137 times Red StarRed Star]

24. Claus-Peter Schnorr,  Markus Jakobsson,  Security of Signed ElGamal Encryption, pp. 73 - 89, ASIACRYPT 2000.

[Electronic Edition][Cited 98 times Red Star]

25. Markus Jakobsson,  Ari Juels,  Addition of ElGamal Plaintexts, pp. 346 - 358, ASIACRYPT 2000.

[Electronic Edition][Cited 2 times ]

26. Philip Bohannon,  Markus Jakobsson,  Sukamol Srikwan,  Cryptographic Approaches to Privacy in Forensic DNA Databases, pp. 373 - 390, PKC 2000.

[Electronic Edition][Cited 10 times ]

27. Juan A. Garay,  Markus Jakobsson,  Philip D. MacKenzie,  Abuse-Free Optimistic Contract Signing, pp. 449 - 466, CRYPTO 1999.

[Electronic Edition][Cited 182 times Red StarRed Star]

28. Markus Jakobsson,  Julien P. Stern,  Moti Yung,  Scramble All, Encrypt Small, pp. 95 - 111, FSE 1999.

[Electronic Edition][Cited 33 times ]

29. Markus Jakobsson,  Mini-Cash: A Minimalistic Approach to E-Commerce, pp. 122 - 135, PKC 1999.

[Electronic Edition][Cited 14 times ]

30. Markus Jakobsson,  On Quorum Controlled Asymmetric Proxy Re-encryption, pp. 112 - 121, PKC 1999.

[Electronic Edition][Cited 54 times Red Star]

31. Markus Jakobsson,  Joy Müller,  Improved Magic Ink Signatures Using Hints, pp. 253 - 268, FC 1999.

[Electronic Edition][Cited 16 times ]

32. Markus Jakobsson,  David M'Raïhi,  Mix-Based Electronic Payments, pp. 157 - 173, SAC 1998.

[Electronic Edition][Cited 49 times ]

33. Markus Jakobsson,  A Practical Mix, pp. 448 - 461, EUROCRYPT 1998.

[Electronic Edition][Cited 155 times Red StarRed Star]

34. Markus Jakobsson,  Ari Juels,  X-Cash: Executable Digital Cash, pp. 16 - 27, FC 1998.

[Electronic Edition][Cited 14 times ]

35. Markus Jakobsson,  Moti Yung,  On Assurance Structures for WWW Commerce, pp. 141 - 157, FC 1998.

[Electronic Edition][Cited 12 times ]

36. Eran Gabber,  Markus Jakobsson,  Yossi Matias,  Alain J. Mayer,  Curbing Junk E-Mail via Secure Classification, pp. 198 - 213, FC 1998.

[Electronic Edition][Cited 39 times ]

37. Markus Jakobsson,  Moti Yung,  Distributed "Magic Ink" Signatures, pp. 450 - 464, EUROCRYPT 1997.

[Electronic Edition][Cited 47 times ]

38. Mihir Bellare,  Markus Jakobsson,  Moti Yung,  Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function, pp. 280 - 305, EUROCRYPT 1997.

[Electronic Edition][Cited 39 times ]

39. Markus Jakobsson,  Moti Yung,  Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System, pp. 217 - 238, FC 1997.

[Electronic Edition][Cited 26 times ]

40. Markus Jakobsson,  Moti Yung,  Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers, pp. 186 - 200, CRYPTO 1996.

[Electronic Edition][Cited 30 times ]

41. Markus Jakobsson,  Kazue Sako,  Russell Impagliazzo,  Designated Verifier Proofs and Their Applications, pp. 143 - 154, EUROCRYPT 1996.

[Electronic Edition][Cited 481 times Red StarRed StarRed Star]

42. Markus Jakobsson,  Ripping Coins For a Fair Exchange, pp. 220 - 230, EUROCRYPT 1995.

[Electronic Edition][Cited 74 times Red Star]

43. Markus Jakobsson,  Blackmailing using Undeniable Signatures, pp. 425 - 427, EUROCRYPT 1994.

[Electronic Edition][Cited 39 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...