Social phishing TN Jagatic, NA Johnson, M Jakobsson, F Menczer Communications of the ACM 50 (10), 94-100, 2007 | 1816 | 2007 |
Controlling data in the cloud: outsourcing computation without outsourcing control R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina Proceedings of the 2009 ACM workshop on Cloud computing security, 85-90, 2009 | 1267 | 2009 |
Designated verifier proofs and their applications M Jakobsson, K Sako, R Impagliazzo International Conference on the Theory and Applications of Cryptographic …, 1996 | 1224 | 1996 |
Coercion-resistant electronic elections A Juels, D Catalano, M Jakobsson Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 61-70, 2005 | 904 | 2005 |
Proofs of work and bread pudding protocols M Jakobsson, A Juels Secure Information Networks: Communications and Multimedia Security IFIP TC6 …, 1999 | 861 | 1999 |
Universal re-encryption for mixnets P Golle, M Jakobsson, A Juels, P Syverson Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004 | 638 | 2004 |
Identity authentication system and method M Jakobsson, A Juels, BS Kaliski Jr US Patent 7,502,933, 2009 | 585 | 2009 |
Making mix nets robust for electronic voting by randomized partial checking M Jakobsson, A Juels, RL Rivest 11th USENIX Security Symposium (USENIX Security 02), 2002 | 577 | 2002 |
Security weaknesses in Bluetooth M Jakobsson, S Wetzel Cryptographers’ Track at the RSA Conference, 176-191, 2001 | 494 | 2001 |
Phishing and countermeasures: understanding the increasing problem of electronic identity theft M Jakobsson, S Myers John Wiley & Sons, 2007 | 490 | 2007 |
A micro-payment scheme encouraging collaboration in multi-hop cellular networks M Jakobsson, JP Hubaux, L Buttyán Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003 | 404 | 2003 |
Proactive public key and signature systems A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 403 | 1997 |
Implicit authentication through learning user behavior E Shi, Y Niu, M Jakobsson, R Chow International conference on information security, 99-113, 2010 | 401 | 2010 |
Mix and match: Secure function evaluation via ciphertexts M Jakobsson, A Juels Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000 | 388 | 2000 |
Abuse-free optimistic contract signing JA Garay, M Jakobsson, P MacKenzie Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 360 | 1999 |
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks NB Salem, L Buttyan, JP Hubaux, M Jakobsson Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003 | 355 | 2003 |
Implicit authentication for mobile devices M Jakobsson, E Shi, P Golle, R Chow Proceedings of the 4th USENIX conference on Hot topics in security 1, 25-27, 2009 | 351 | 2009 |
System and method providing disconnected authentication A Nanopoulos, K Ackerman, P Bowness, W Duane, M Jakobsson, ... US Patent 8,966,276, 2015 | 267 | 2015 |
A practical mix M Jakobsson Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 264 | 1998 |
Almost optimal hash sequence traversal D Coppersmith, M Jakobsson Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003 | 234 | 2003 |