Markus Jakobsson
Orcid: 0000-0002-3405-5742
According to our database1,
Markus Jakobsson
authored at least 135 papers
between 1994 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2020
2019
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities.
IEEE Trans. Vis. Comput. Graph., 2019
2018
2017
Comput. Secur., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
2016
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
Proceedings of the New Codebreakers, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
2014
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-4878-5, 2013
2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
IEEE Secur. Priv., 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007
2006
J. Digit. Forensic Pract., 2006
J. Digit. Forensic Pract., 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware.
IACR Cryptol. ePrint Arch., 2005
Specifying Patterns for Mobile Application Domain Using General Architectural Components.
Proceedings of the Product Focused Software Process Improvement, 2005
Proceedings of the Q2SWinet'05, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004
2003
CoRR, 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the Topics in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Financial Cryptography, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Efficient Oblivious Proofs of Correct Exponentiation.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Financial Cryptography, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the CCS '96, 1996
1995
1994
Proceedings of the Advances in Cryptology, 1994