BibTeX records: Markus Jakobsson

download as .bib file

@article{DBLP:journals/tvcg/KovenFSJB19,
  author    = {Jay Koven and
               Cristian Felix and
               Hossein Siadati and
               Markus Jakobsson and
               Enrico Bertini},
  title     = {Lessons Learned Developing a Visual Analytics Solution for Investigative
               Analysis of Scamming Activities},
  journal   = {{IEEE} Trans. Vis. Comput. Graph.},
  volume    = {25},
  number    = {1},
  pages     = {225--234},
  year      = {2019},
  url       = {https://doi.org/10.1109/TVCG.2018.2865023},
  doi       = {10.1109/TVCG.2018.2865023},
  timestamp = {Tue, 05 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tvcg/KovenFSJB19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson18,
  author    = {Markus Jakobsson},
  title     = {Secure Remote Attestation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {31},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/031},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Jakobsson18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SiadatiNGJM17,
  author    = {Hossein Siadati and
               To{\`{a}}n Nguy{\^{e}}n and
               Payas Gupta and
               Markus Jakobsson and
               Nasir D. Memon},
  title     = {Mind your SMSes: Mitigating social engineering in second factor authentication},
  journal   = {Computers {\&} Security},
  volume    = {65},
  pages     = {14--28},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.cose.2016.09.009},
  doi       = {10.1016/j.cose.2016.09.009},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/SiadatiNGJM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/DhimanJY17,
  author    = {Mayank Dhiman and
               Markus Jakobsson and
               Ting{-}Fang Yen},
  title     = {Breaking and fixing content-based filtering},
  booktitle = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
               AZ, USA, April 25-27, 2017},
  pages     = {52--56},
  year      = {2017},
  crossref  = {DBLP:conf/ecrime/2017},
  url       = {https://doi.org/10.1109/ECRIME.2017.7945054},
  doi       = {10.1109/ECRIME.2017.7945054},
  timestamp = {Wed, 21 Jun 2017 10:07:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecrime/DhimanJY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson17,
  author    = {Markus Jakobsson},
  title     = {Short Paper: Addressing Sophisticated Email Attacks},
  booktitle = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  pages     = {310--317},
  year      = {2017},
  crossref  = {DBLP:conf/fc/2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7\_17},
  doi       = {10.1007/978-3-319-70972-7\_17},
  timestamp = {Tue, 02 Jan 2018 13:47:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/Jakobsson17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017w,
  editor    = {Michael Brenner and
               Kurt Rohloff and
               Joseph Bonneau and
               Andrew Miller and
               Peter Y. A. Ryan and
               Vanessa Teague and
               Andrea Bracciali and
               Massimiliano Sala and
               Federico Pintore and
               Markus Jakobsson},
  title     = {Financial Cryptography and Data Security - {FC} 2017 International
               Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
               7, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10323},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70278-0},
  doi       = {10.1007/978-3-319-70278-0},
  isbn      = {978-3-319-70277-3},
  timestamp = {Wed, 30 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/JakobssonS16,
  author    = {Markus Jakobsson and
               Hossein Siadati},
  title     = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention},
  booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  pages     = {177--194},
  year      = {2016},
  crossref  = {DBLP:conf/birthday/2016kahn},
  url       = {https://doi.org/10.1007/978-3-662-49301-4\_13},
  doi       = {10.1007/978-3-662-49301-4\_13},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/birthday/JakobssonS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16,
  author    = {Markus Jakobsson},
  title     = {Scams and Targeting},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {1--3},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_1},
  doi       = {10.1007/978-1-4939-6457-4\_1},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/Jakobsson16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16,
  author    = {Damon McCoy and
               Youngsam Park and
               Elaine Shi and
               Markus Jakobsson},
  title     = {Identifying Scams and Trends},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {7--19},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_2},
  doi       = {10.1007/978-1-4939-6457-4\_2},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/McCoyPSJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/YenJ16,
  author    = {Ting{-}Fang Yen and
               Markus Jakobsson},
  title     = {Predicting Trends},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {21--25},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_3},
  doi       = {10.1007/978-1-4939-6457-4\_3},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/YenJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/FerreiraJ16,
  author    = {Ana Ferreira and
               Markus Jakobsson},
  title     = {Persuasion in Scams},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {29--47},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_4},
  doi       = {10.1007/978-1-4939-6457-4\_4},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/FerreiraJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/SiadatiJJ16,
  author    = {Hossein Siadati and
               Sima Jafarikhah and
               Markus Jakobsson},
  title     = {Traditional Countermeasures to Unwanted Email},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {51--62},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_5},
  doi       = {10.1007/978-1-4939-6457-4\_5},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/SiadatiJJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/DhimanYJ16,
  author    = {Mayank Dhiman and
               Ting{-}Fang Yen and
               Markus Jakobsson},
  title     = {Obfuscation in Spam and Scam},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {63--68},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_6},
  doi       = {10.1007/978-1-4939-6457-4\_6},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/DhimanYJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16a,
  author    = {Markus Jakobsson},
  title     = {Semantic Analysis of Messages},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {69--74},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_7},
  doi       = {10.1007/978-1-4939-6457-4\_7},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/Jakobsson16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16a,
  author    = {Damon McCoy and
               Youngsam Park and
               Elaine Shi and
               Markus Jakobsson},
  title     = {Case Study: Sales Scams},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {77--87},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_8},
  doi       = {10.1007/978-1-4939-6457-4\_8},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/McCoyPSJ16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/McCoyPSJ16b,
  author    = {Damon McCoy and
               Youngsam Park and
               Elaine Shi and
               Markus Jakobsson},
  title     = {Case Study: Rental Scams},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {89--102},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_9},
  doi       = {10.1007/978-1-4939-6457-4\_9},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/McCoyPSJ16b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/YenJ16a,
  author    = {Ting{-}Fang Yen and
               Markus Jakobsson},
  title     = {Case Study: Romance Scams},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {103--113},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_10},
  doi       = {10.1007/978-1-4939-6457-4\_10},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/YenJ16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16b,
  author    = {Markus Jakobsson},
  title     = {Case Study: Business Email Compromise},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {115--122},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_11},
  doi       = {10.1007/978-1-4939-6457-4\_11},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/Jakobsson16b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Jakobsson16c,
  author    = {Markus Jakobsson},
  title     = {Conclusion and Next Steps},
  booktitle = {Understanding Social Engineering Based Scams},
  pages     = {125--127},
  year      = {2016},
  crossref  = {DBLP:books/sp/J2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4\_12},
  doi       = {10.1007/978-1-4939-6457-4\_12},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/16/Jakobsson16c},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/J2016,
  editor    = {Markus Jakobsson},
  title     = {Understanding Social Engineering Based Scams},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4},
  doi       = {10.1007/978-1-4939-6457-4},
  isbn      = {978-1-4939-6455-0},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/J2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SassePJCWC14,
  author    = {Martina Angela Sasse and
               Charles C. Palmer and
               Markus Jakobsson and
               Sunny Consolvo and
               Rick Wash and
               L. Jean Camp},
  title     = {Helping You Protect You},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {12},
  number    = {1},
  pages     = {39--42},
  year      = {2014},
  url       = {https://doi.org/10.1109/MSP.2014.4},
  doi       = {10.1109/MSP.2014.4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/SassePJCWC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ParkJMSJ14,
  author    = {Youngsam Park and
               Jackie Jones and
               Damon McCoy and
               Elaine Shi and
               Markus Jakobsson},
  title     = {Scambaiter: Understanding Targeted Nigerian Scams on Craigslist},
  booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  year      = {2014},
  crossref  = {DBLP:conf/ndss/2014},
  url       = {https://www.ndss-symposium.org/ndss2014/scambaiter-understanding-targeted-nigerian-scams-craigslist},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/ParkJMSJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/Sae-BaeJ14,
  author    = {Napa Sae{-}Bae and
               Markus Jakobsson},
  title     = {Hand authentication on multi-touch tablets},
  booktitle = {15th Workshop on Mobile Computing Systems and Applications, HotMobile
               '14, Santa Barbara, CA, USA, February 26-27, 2014},
  pages     = {8:1--8:6},
  year      = {2014},
  crossref  = {DBLP:conf/wmcsa/2014},
  url       = {https://doi.org/10.1145/2565585.2565586},
  doi       = {10.1145/2565585.2565586},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/Sae-BaeJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/Jakobsson13,
  author    = {Markus Jakobsson},
  title     = {Mobile Authentication - Problems and Solutions},
  series    = {Springer Briefs in Computer Science},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-1-4614-4878-5},
  doi       = {10.1007/978-1-4614-4878-5},
  isbn      = {978-1-4614-4877-8},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/sbcs/Jakobsson13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BalfanzCEJKMMO12,
  author    = {Dirk Balfanz and
               Richard Chow and
               Ori Eisen and
               Markus Jakobsson and
               Steve Kirsch and
               Scott Matsumoto and
               Jesus Molina and
               Paul C. van Oorschot},
  title     = {The Future of Authentication},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {10},
  number    = {1},
  pages     = {22--27},
  year      = {2012},
  url       = {https://doi.org/10.1109/MSP.2012.24},
  doi       = {10.1109/MSP.2012.24},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/BalfanzCEJKMMO12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/JakobssonS12,
  author    = {Markus Jakobsson and
               Hossein Siadati},
  title     = {SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention},
  booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
               2012, Cambridge, MA, USA, June 25, 2012},
  pages     = {3--10},
  year      = {2012},
  crossref  = {DBLP:conf/stast/2012},
  url       = {https://doi.org/10.1109/STAST.2012.12},
  doi       = {10.1109/STAST.2012.12},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stast/JakobssonS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/JakobssonS12a,
  author    = {Markus Jakobsson and
               Hossein Siadati},
  title     = {Improved Visual Preference Authentication},
  booktitle = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
               2012, Cambridge, MA, USA, June 25, 2012},
  pages     = {27--34},
  year      = {2012},
  crossref  = {DBLP:conf/stast/2012},
  url       = {https://doi.org/10.1109/STAST.2012.13},
  doi       = {10.1109/STAST.2012.13},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stast/JakobssonS12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonD12,
  author    = {Markus Jakobsson and
               Mayank Dhiman},
  title     = {The Benefits of Understanding Passwords},
  booktitle = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
               WA, USA, August 7, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/uss/2012hotsec},
  url       = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/jakobsson},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/JakobssonD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangGJT10,
  author    = {XiaoFeng Wang and
               Philippe Golle and
               Markus Jakobsson and
               Alex Tsow},
  title     = {Deterring voluntary trace disclosure in re-encryption mix-networks},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {13},
  number    = {2},
  pages     = {18:1--18:24},
  year      = {2010},
  url       = {https://doi.org/10.1145/1698750.1698758},
  doi       = {10.1145/1698750.1698758},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/WangGJT10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowJMMNSS10,
  author    = {Richard Chow and
               Markus Jakobsson and
               Ryusuke Masuoka and
               Jesus Molina and
               Yuan Niu and
               Elaine Shi and
               Zhexuan Song},
  title     = {Authentication in the clouds: a framework and its application to mobile
               users},
  booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
               2010, Chicago, IL, USA, October 8, 2010},
  pages     = {1--6},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010ccsw},
  url       = {https://doi.org/10.1145/1866835.1866837},
  doi       = {10.1145/1866835.1866837},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChowJMMNSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShiNJC10,
  author    = {Elaine Shi and
               Yuan Niu and
               Markus Jakobsson and
               Richard Chow},
  title     = {Implicit Authentication through Learning User Behavior},
  booktitle = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  pages     = {99--113},
  year      = {2010},
  crossref  = {DBLP:conf/isw/2010},
  url       = {https://doi.org/10.1007/978-3-642-18178-8\_9},
  doi       = {10.1007/978-3-642-18178-8\_9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/ShiNJC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonJ10,
  author    = {Markus Jakobsson and
               Karl{-}Anders Johansson},
  title     = {Retroactive Detection of Malware with Applications to Mobile Platforms},
  booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
               D.C., USA, August 10, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010hotsec},
  url       = {https://www.usenix.org/conference/hotsec10/retroactive-detection-malware-applications-mobile-platforms},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/JakobssonJ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/JuelsCJ10,
  author    = {Ari Juels and
               Dario Catalano and
               Markus Jakobsson},
  title     = {Coercion-Resistant Electronic Elections},
  booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  pages     = {37--63},
  year      = {2010},
  crossref  = {DBLP:conf/wote/2010lncs},
  url       = {https://doi.org/10.1007/978-3-642-12980-3\_2},
  doi       = {10.1007/978-3-642-12980-3\_2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wote/JuelsCJ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor    = {David Chaum and
               Markus Jakobsson and
               Ronald L. Rivest and
               Peter Y. A. Ryan and
               Josh Benaloh and
               Miroslaw Kutylowski and
               Ben Adida},
  title     = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series    = {Lecture Notes in Computer Science},
  volume    = {6000},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12980-3},
  doi       = {10.1007/978-3-642-12980-3},
  isbn      = {978-3-642-12979-7},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wote/2010lncs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/JakobssonSS10,
  author    = {Markus Jakobsson and
               Sid Stamm and
               Christopher Soghoian},
  title     = {Phishing},
  booktitle = {Handbook of Financial Cryptography and Security.},
  pages     = {301--339},
  year      = {2010},
  crossref  = {DBLP:reference/crc/2010fcs},
  url       = {https://doi.org/10.1201/9781420059823-c12},
  doi       = {10.1201/9781420059823-c12},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crc/JakobssonSS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jakobsson09,
  author    = {Markus Jakobsson},
  title     = {Captcha-free throttling},
  booktitle = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
               AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  pages     = {15--22},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009aisec},
  url       = {https://doi.org/10.1145/1654988.1654994},
  doi       = {10.1145/1654988.1654994},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Jakobsson09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowGJSSMM09,
  author    = {Richard Chow and
               Philippe Golle and
               Markus Jakobsson and
               Elaine Shi and
               Jessica Staddon and
               Ryusuke Masuoka and
               Jesus Molina},
  title     = {Controlling data in the cloud: outsourcing computation without outsourcing
               control},
  booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
               {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages     = {85--90},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009ccsw},
  url       = {https://doi.org/10.1145/1655008.1655020},
  doi       = {10.1145/1655008.1655020},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChowGJSSMM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JakobssonJ09,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {Server-side detection of malware infection},
  booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
               United Kingdom, September 8-11, 2009},
  pages     = {11--22},
  year      = {2009},
  crossref  = {DBLP:conf/nspw/2009},
  url       = {https://doi.org/10.1145/1719030.1719033},
  doi       = {10.1145/1719030.1719033},
  timestamp = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nspw/JakobssonJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SrikwanJ08,
  author    = {Sukamol Srikwan and
               Markus Jakobsson},
  title     = {Using Cartoons to Teach Internet Security},
  journal   = {Cryptologia},
  volume    = {32},
  number    = {2},
  pages     = {137--154},
  year      = {2008},
  url       = {https://doi.org/10.1080/01611190701743724},
  doi       = {10.1080/01611190701743724},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cryptologia/SrikwanJ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JakobssonFJ08,
  author    = {Markus Jakobsson and
               Peter Finn and
               Nathaniel A. Johnson},
  title     = {Why and How to Perform Fraud Experiments},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {6},
  number    = {2},
  pages     = {66--68},
  year      = {2008},
  url       = {https://doi.org/10.1109/MSP.2008.52},
  doi       = {10.1109/MSP.2008.52},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/JakobssonFJ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JakobssonM08,
  author    = {Markus Jakobsson and
               Steven Myers},
  title     = {Delayed password disclosure},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {1},
  pages     = {47--59},
  year      = {2008},
  url       = {https://doi.org/10.1504/IJACT.2008.017051},
  doi       = {10.1504/IJACT.2008.017051},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/JakobssonM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/JakobssonSWY08,
  author    = {Markus Jakobsson and
               Erik Stolterman and
               Susanne Wetzel and
               Liu Yang},
  title     = {Love and authentication},
  booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
               {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  pages     = {197--200},
  year      = {2008},
  crossref  = {DBLP:conf/chi/2008},
  url       = {https://doi.org/10.1145/1357054.1357087},
  doi       = {10.1145/1357054.1357087},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/JakobssonSWY08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JakobssonYW08,
  author    = {Markus Jakobsson and
               Liu Yang and
               Susanne Wetzel},
  title     = {Quantifying the security of preference-based authentication},
  booktitle = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
               VA, USA, October 31, 2008},
  pages     = {61--70},
  year      = {2008},
  crossref  = {DBLP:conf/dim/2008},
  url       = {https://doi.org/10.1145/1456424.1456435},
  doi       = {10.1145/1456424.1456435},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/JakobssonYW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/SoghoianFJ08,
  author    = {Christopher Soghoian and
               Oliver Friedrichs and
               Markus Jakobsson},
  title     = {The Threat of Political Phishing},
  booktitle = {2nd International Conference on Human Aspects of Information Security
               and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings},
  pages     = {126--143},
  year      = {2008},
  crossref  = {DBLP:conf/haisa/2008},
  url       = {http://www.cscan.org/openaccess/?paperid=44},
  timestamp = {Sat, 14 Sep 2013 18:40:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/haisa/SoghoianFJ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/ChowGJWW08,
  author    = {Richard Chow and
               Philippe Golle and
               Markus Jakobsson and
               Lusha Wang and
               XiaoFeng Wang},
  title     = {Making CAPTCHAs clickable},
  booktitle = {Proceedings of the 9th Workshop on Mobile Computing Systems and Applications,
               HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008},
  pages     = {91--94},
  year      = {2008},
  crossref  = {DBLP:conf/wmcsa/2008},
  url       = {https://doi.org/10.1145/1411759.1411783},
  doi       = {10.1145/1411759.1411783},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/ChowGJWW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JagaticJJM07,
  author    = {Tom N. Jagatic and
               Nathaniel A. Johnson and
               Markus Jakobsson and
               Filippo Menczer},
  title     = {Social phishing},
  journal   = {Commun. {ACM}},
  volume    = {50},
  number    = {10},
  pages     = {94--100},
  year      = {2007},
  url       = {https://doi.org/10.1145/1290958.1290968},
  doi       = {10.1145/1290958.1290968},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/JagaticJJM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JakobssonS07,
  author    = {Markus Jakobsson and
               Sid Stamm},
  title     = {Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {5},
  number    = {6},
  pages     = {16--24},
  year      = {2007},
  url       = {https://doi.org/10.1109/MSP.2007.182},
  doi       = {10.1109/MSP.2007.182},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/JakobssonS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/JakobssonM07,
  author    = {Markus Jakobsson and
               Steven Myers},
  title     = {Delayed password disclosure},
  journal   = {{SIGACT} News},
  volume    = {38},
  number    = {3},
  pages     = {56--75},
  year      = {2007},
  url       = {https://doi.org/10.1145/1324215.1324228},
  doi       = {10.1145/1324215.1324228},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigact/JakobssonM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/FinnJ07,
  author    = {Peter Finn and
               Markus Jakobsson},
  title     = {Designing ethical phishing experiments},
  journal   = {{IEEE} Technol. Soc. Mag.},
  volume    = {26},
  number    = {1},
  pages     = {46--58},
  year      = {2007},
  url       = {https://doi.org/10.1109/MTAS.2007.335565},
  doi       = {10.1109/MTAS.2007.335565},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tasm/FinnJ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/digra/BardzellJBPOH07,
  author    = {Jeffrey Bardzell and
               Markus Jakobsson and
               Shaowen Bardzell and
               Tyler Pace and
               Will Odom and
               Aaron R. Houssian},
  title     = {Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer
               Online Games},
  booktitle = {Proceedings of the 2007 DiGRA International Conference: Situated Play,
               DiGRA 2007, Tokyo, Japan, September 24-28, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/digra/2007},
  url       = {http://www.digra.org/digital-library/publications/virtual-worlds-and-fraud-approaching-cybersecurity-in-massively-multiplayer-online-games/},
  timestamp = {Mon, 19 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/digra/BardzellJBPOH07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JakobssonM07,
  author    = {Markus Jakobsson and
               Steven Myers},
  title     = {Delayed password disclosure},
  booktitle = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax,
               VA, USA, November 2, 2007},
  pages     = {17--26},
  year      = {2007},
  crossref  = {DBLP:conf/dim/2007},
  url       = {https://doi.org/10.1145/1314403.1314407},
  doi       = {10.1145/1314403.1314407},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/JakobssonM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonTSBL07,
  author    = {Markus Jakobsson and
               Alex Tsow and
               Ankur Shah and
               Eli Blevis and
               Youn{-}Kyung Lim},
  title     = {What Instills Trust? {A} Qualitative Study of Phishing},
  booktitle = {Financial Cryptography and Data Security, 11th International Conference,
               {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
               2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
               Selected Papers},
  pages     = {356--361},
  year      = {2007},
  crossref  = {DBLP:conf/fc/2007},
  url       = {https://doi.org/10.1007/978-3-540-77366-5\_32},
  doi       = {10.1007/978-3-540-77366-5\_32},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonTSBL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AnandparaDJLR07,
  author    = {Vivek Anandpara and
               Andrew Dingman and
               Markus Jakobsson and
               Debin Liu and
               Heather Roinestad},
  title     = {Phishing {IQ} Tests Measure Fear, Not Ability},
  booktitle = {Financial Cryptography and Data Security, 11th International Conference,
               {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
               2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
               Selected Papers},
  pages     = {362--366},
  year      = {2007},
  crossref  = {DBLP:conf/fc/2007},
  url       = {https://doi.org/10.1007/978-3-540-77366-5\_33},
  doi       = {10.1007/978-3-540-77366-5\_33},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/AnandparaDJLR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/StammRJ07,
  author    = {Sid Stamm and
               Zulfikar Ramzan and
               Markus Jakobsson},
  title     = {Drive-By Pharming},
  booktitle = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  pages     = {495--506},
  year      = {2007},
  crossref  = {DBLP:conf/icics/2007},
  url       = {https://doi.org/10.1007/978-3-540-77048-0\_38},
  doi       = {10.1007/978-3-540-77048-0\_38},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/StammRJ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JuelsSJ07,
  author    = {Ari Juels and
               Sid Stamm and
               Markus Jakobsson},
  title     = {Combating Click Fraud via Premium Clicks},
  booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
               August 6-10, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007},
  url       = {https://www.usenix.org/conference/16th-usenix-security-symposium/combating-click-fraud-premium-clicks},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/JuelsSJ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/GandhiJR06,
  author    = {Mona Gandhi and
               Markus Jakobsson and
               Jacob Ratkiewicz},
  title     = {Badvertisements: Stealthy Click-Fraud with Unwitting Accessories},
  journal   = {J. Digital Forensic Practice},
  volume    = {1},
  number    = {2},
  pages     = {131--142},
  year      = {2006},
  url       = {https://doi.org/10.1080/15567280601015598},
  doi       = {10.1080/15567280601015598},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jdfp/GandhiJR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/TsowJYW06,
  author    = {Alex Tsow and
               Markus Jakobsson and
               Liu Yang and
               Susanne Wetzel},
  title     = {Warkitting: The Drive-by Subversion of Wireless Home Routers},
  journal   = {J. Digital Forensic Practice},
  volume    = {1},
  number    = {3},
  pages     = {179--192},
  year      = {2006},
  url       = {https://doi.org/10.1080/15567280600995832},
  doi       = {10.1080/15567280600995832},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jdfp/TsowJYW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MacKenzieSJ06,
  author    = {Philip D. MacKenzie and
               Thomas Shrimpton and
               Markus Jakobsson},
  title     = {Threshold Password-Authenticated Key Exchange},
  journal   = {J. Cryptology},
  volume    = {19},
  number    = {1},
  pages     = {27--66},
  year      = {2006},
  url       = {https://doi.org/10.1007/s00145-005-0232-5},
  doi       = {10.1007/s00145-005-0232-5},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/MacKenzieSJ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/SalemBHJ06,
  author    = {Naouel Ben Salem and
               Levente Butty{\'{a}}n and
               Jean{-}Pierre Hubaux and
               Markus Jakobsson},
  title     = {Node Cooperation in Hybrid Ad Hoc Networks},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {5},
  number    = {4},
  pages     = {365--376},
  year      = {2006},
  url       = {https://doi.org/10.1109/TMC.2006.1599405},
  doi       = {10.1109/TMC.2006.1599405},
  timestamp = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tmc/SalemBHJ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SrikwanJAD06,
  author    = {Sukamol Srikwan and
               Markus Jakobsson and
               Andrew Albrecht and
               Mehmet Dalkilic},
  title     = {Trust Establishment in Data Sharing: An Incentive Model for Biodiversity
               Information Systems},
  booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/colcom/2006},
  url       = {https://doi.org/10.1109/COLCOM.2006.361904},
  doi       = {10.1109/COLCOM.2006.361904},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/SrikwanJAD06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/ChoiGJ06,
  author    = {Jong Youl Choi and
               Philippe Golle and
               Markus Jakobsson},
  title     = {Tamper-Evident Digital Signature Protecting Certification Authorities
               Against Malware},
  booktitle = {Second International Symposium on Dependable Autonomic and Secure
               Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
               Indiana, {USA}},
  pages     = {37--44},
  year      = {2006},
  crossref  = {DBLP:conf/dasc/2006},
  url       = {https://doi.org/10.1109/DASC.2006.46},
  doi       = {10.1109/DASC.2006.46},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/ChoiGJ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChoiGJ06,
  author    = {Jong Youl Choi and
               Philippe Golle and
               Markus Jakobsson},
  title     = {Auditable Privacy: On Tamper-Evident Mix Networks},
  booktitle = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  pages     = {126--141},
  year      = {2006},
  crossref  = {DBLP:conf/fc/2006},
  url       = {https://doi.org/10.1007/11889663\_9},
  doi       = {10.1007/11889663\_9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/ChoiGJ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KongCJMMG06,
  author    = {Jiejun Kong and
               Ling{-}Jyh Chen and
               Markus Jakobsson and
               Stan Moyer and
               Dave Marples and
               Mario Gerla},
  title     = {An Enhanced Digital Content Mediator {(DCM)} Approach to Implementing
               Legitimate and Secure {P2P} Online Transactions},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages     = {2351--2356},
  year      = {2006},
  crossref  = {DBLP:conf/icc/2006},
  url       = {https://doi.org/10.1109/ICC.2006.255121},
  doi       = {10.1109/ICC.2006.255121},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/KongCJMMG06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangJW06,
  author    = {Liu Yang and
               Markus Jakobsson and
               Susanne Wetzel},
  title     = {Discount Anonymous On Demand Routing for Mobile Ad hoc Networks},
  booktitle = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  pages     = {1--10},
  year      = {2006},
  crossref  = {DBLP:conf/securecomm/2006},
  url       = {https://doi.org/10.1109/SECCOMW.2006.359533},
  doi       = {10.1109/SECCOMW.2006.359533},
  timestamp = {Thu, 21 Jun 2018 08:02:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/YangJW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GolleWJT06,
  author    = {Philippe Golle and
               XiaoFeng Wang and
               Markus Jakobsson and
               Alex Tsow},
  title     = {Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks},
  booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
               May 2006, Berkeley, California, {USA}},
  pages     = {121--131},
  year      = {2006},
  crossref  = {DBLP:conf/sp/2006},
  url       = {https://doi.org/10.1109/SP.2006.14},
  doi       = {10.1109/SP.2006.14},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/GolleWJT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JuelsJJ06,
  author    = {Ari Juels and
               Markus Jakobsson and
               Tom N. Jagatic},
  title     = {Cache Cookies for Browser Authentication (Extended Abstract)},
  booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
               May 2006, Berkeley, California, {USA}},
  pages     = {301--305},
  year      = {2006},
  crossref  = {DBLP:conf/sp/2006},
  url       = {https://doi.org/10.1109/SP.2006.8},
  doi       = {10.1109/SP.2006.8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/JuelsJJ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JakobssonR06,
  author    = {Markus Jakobsson and
               Jacob Ratkiewicz},
  title     = {Designing ethical phishing experiments: a study of {(ROT13)} rOnl
               query features},
  booktitle = {Proceedings of the 15th international conference on World Wide Web,
               {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages     = {513--522},
  year      = {2006},
  crossref  = {DBLP:conf/www/2006},
  url       = {https://doi.org/10.1145/1135777.1135853},
  doi       = {10.1145/1135777.1135853},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/JakobssonR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JakobssonS06,
  author    = {Markus Jakobsson and
               Sid Stamm},
  title     = {Invasive browser sniffing and countermeasures},
  booktitle = {Proceedings of the 15th international conference on World Wide Web,
               {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages     = {523--532},
  year      = {2006},
  crossref  = {DBLP:conf/www/2006},
  url       = {https://doi.org/10.1145/1135777.1135854},
  doi       = {10.1145/1135777.1135854},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/JakobssonS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/SalemHJ05,
  author    = {Naouel Ben Salem and
               Jean{-}Pierre Hubaux and
               Markus Jakobsson},
  title     = {Reputation-based Wi-Fi deployment},
  journal   = {Mobile Computing and Communications Review},
  volume    = {9},
  number    = {3},
  pages     = {69--81},
  year      = {2005},
  url       = {https://doi.org/10.1145/1094549.1094559},
  doi       = {10.1145/1094549.1094559},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigmobile/SalemHJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GriffithJ05,
  author    = {Virgil Griffith and
               Markus Jakobsson},
  title     = {Messin' with Texas Deriving Mother's Maiden Names Using Public Records},
  booktitle = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  pages     = {91--103},
  year      = {2005},
  crossref  = {DBLP:conf/acns/2005},
  url       = {https://doi.org/10.1007/11496137\_7},
  doi       = {10.1007/11496137\_7},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/GriffithJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JakobssonY05,
  author    = {Markus Jakobsson and
               Liu Yang},
  title     = {Quantifying Security in Hybrid Cellular Networks},
  booktitle = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  pages     = {350--363},
  year      = {2005},
  crossref  = {DBLP:conf/acns/2005},
  url       = {https://doi.org/10.1007/11496137\_24},
  doi       = {10.1007/11496137\_24},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/JakobssonY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuJP05,
  author    = {Yih{-}Chun Hu and
               Markus Jakobsson and
               Adrian Perrig},
  title     = {Efficient Constructions for One-Way Hash Chains},
  booktitle = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  pages     = {423--441},
  year      = {2005},
  crossref  = {DBLP:conf/acns/2005},
  url       = {https://doi.org/10.1007/11496137\_29},
  doi       = {10.1007/11496137\_29},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/HuJP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05,
  author    = {Richard Clayton and
               Drew Dean and
               Markus Jakobsson and
               Steven Myers and
               Stuart G. Stubblebine and
               Michael Szydlo},
  title     = {A Chat at the Old Phishin' Hole},
  booktitle = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  pages     = {88},
  year      = {2005},
  crossref  = {DBLP:conf/fc/2005},
  url       = {https://doi.org/10.1007/11507840\_8},
  doi       = {10.1007/11507840\_8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/ClaytonDJMSS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson05,
  author    = {Markus Jakobsson},
  title     = {Modeling and Preventing Phishing Attacks},
  booktitle = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  pages     = {89},
  year      = {2005},
  crossref  = {DBLP:conf/fc/2005},
  url       = {https://doi.org/10.1007/11507840\_9},
  doi       = {10.1007/11507840\_9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/Jakobsson05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/ChoiJW05,
  author    = {Jong Youl Choi and
               Markus Jakobsson and
               Susanne Wetzel},
  title     = {Balancing auditability and privacy in vehicular networks},
  booktitle = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and
               Security for Wireless and Mobile Networks, Montreal, Quebec, Canada,
               October 13, 2005},
  pages     = {79--87},
  year      = {2005},
  crossref  = {DBLP:conf/mswim/2005q},
  url       = {https://doi.org/10.1145/1089761.1089775},
  doi       = {10.1145/1089761.1089775},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mswim/ChoiJW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/MazhelisMJ05,
  author    = {Oleksiy Mazhelis and
               Jouni Markkula and
               Markus Jakobsson},
  title     = {Specifying Patterns for Mobile Application Domain Using General Architectural
               Components},
  booktitle = {Product Focused Software Process Improvement, 6th International Conference,
               {PROFES} 2005, Oulu, Finland, June 13-15, 2005, Proceedings},
  pages     = {157--172},
  year      = {2005},
  crossref  = {DBLP:conf/profes/2005},
  url       = {https://doi.org/10.1007/11497455\_14},
  doi       = {10.1007/11497455\_14},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/profes/MazhelisMJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JuelsCJ05,
  author    = {Ari Juels and
               Dario Catalano and
               Markus Jakobsson},
  title     = {Coercion-resistant electronic elections},
  booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages     = {61--70},
  year      = {2005},
  crossref  = {DBLP:conf/wpes/2005},
  url       = {https://doi.org/10.1145/1102199.1102213},
  doi       = {10.1145/1102199.1102213},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/JuelsCJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2005,
  editor    = {Markus Jakobsson and
               Radha Poovendran},
  title     = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
               Germany, September 2, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-142-2},
  timestamp = {Thu, 07 Feb 2008 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ws/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonY05,
  author    = {Markus Jakobsson and
               Adam L. Young},
  title     = {Distributed Phishing Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {91},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/091},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JakobssonY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiGJ05,
  author    = {Jong Youl Choi and
               Philippe Golle and
               Markus Jakobsson},
  title     = {Tamper-Evident Digital Signatures: Protecting Certification Authorities
               Against Malware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {147},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/147},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChoiGJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StammJ05,
  author    = {Sid Stamm and
               Markus Jakobsson},
  title     = {Privacy-Preserving Polling using Playing Cards},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {444},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/444},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StammJ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GolleJJS04,
  author    = {Philippe Golle and
               Markus Jakobsson and
               Ari Juels and
               Paul F. Syverson},
  title     = {Universal Re-encryption for Mixnets},
  booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
               the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
               2004, Proceedings},
  pages     = {163--178},
  year      = {2004},
  crossref  = {DBLP:conf/ctrsa/2004},
  url       = {https://doi.org/10.1007/978-3-540-24660-2\_14},
  doi       = {10.1007/978-3-540-24660-2\_14},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/GolleJJS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/JakobssonW04,
  author    = {Markus Jakobsson and
               Susanne Wetzel},
  title     = {Efficient attribute authentication with applications to ad hoc networks},
  booktitle = {Proceedings of the First International Workshop on Vehicular Ad Hoc
               Networks, 2004, Philadelphia, PA, USA, October 1, 2004},
  pages     = {38--46},
  year      = {2004},
  crossref  = {DBLP:conf/mobicom/2004vanet},
  url       = {https://doi.org/10.1145/1023875.1023882},
  doi       = {10.1145/1023875.1023882},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/JakobssonW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AmbainisJL04,
  author    = {Andris Ambainis and
               Markus Jakobsson and
               Helger Lipmaa},
  title     = {Cryptographic Randomized Response Techniques},
  booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  pages     = {425--438},
  year      = {2004},
  crossref  = {DBLP:conf/pkc/2004},
  url       = {https://doi.org/10.1007/978-3-540-24632-9\_31},
  doi       = {10.1007/978-3-540-24632-9\_31},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/AmbainisJL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/JakobssonWW04,
  author    = {Markus Jakobsson and
               XiaoFeng Wang and
               Susanne Wetzel},
  title     = {Stealth attacks in vehicular technologies},
  booktitle = {Proceedings of the 60th {IEEE} Vehicular Technology Conference, {VTC}
               Fall 2004, 26-29 September 2004, Los Angeles, CA, {USA}},
  pages     = {1218--1222},
  year      = {2004},
  crossref  = {DBLP:conf/vtc/2004f},
  url       = {https://doi.org/10.1109/VETECF.2004.1400216},
  doi       = {10.1109/VETECF.2004.1400216},
  timestamp = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/JakobssonWW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmash/SalemHJ04,
  author    = {Naouel Ben Salem and
               Jean{-}Pierre Hubaux and
               Markus Jakobsson},
  title     = {Reputation-based Wi-Fi deployment protocols and security analysis},
  booktitle = {Proceedings of the 2nd {ACM} International Workshop on Wireless Mobile
               Applications and Services on {WLAN} Hotspots, {WMASH} 2004, Philadelphia,
               PA, USA, October 1, 2004},
  pages     = {29--40},
  year      = {2004},
  crossref  = {DBLP:conf/wmash/2004},
  url       = {https://doi.org/10.1145/1024733.1024738},
  doi       = {10.1145/1024733.1024738},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmash/SalemHJ04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2004,
  editor    = {Markus Jakobsson and
               Moti Yung and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security, Second International Conference,
               {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3089},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98360},
  doi       = {10.1007/b98360},
  isbn      = {3-540-22217-0},
  timestamp = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2004,
  editor    = {Markus Jakobsson and
               Adrian Perrig},
  title     = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
               PA, USA, October 1, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-925-X},
  timestamp = {Thu, 20 Jan 2005 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ws/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/JakobssonM03,
  author    = {Markus Jakobsson and
               Filippo Menczer},
  title     = {Untraceable Email Cluster Bombs},
  journal   = {;login:},
  volume    = {28},
  number    = {6},
  year      = {2003},
  url       = {https://www.usenix.org/publications/login/december-2003-volume-28-number-6/untraceable-email-cluster-bombs},
  timestamp = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/usenix-login/JakobssonM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonLMS03,
  author    = {Markus Jakobsson and
               Frank Thomson Leighton and
               Silvio Micali and
               Michael Szydlo},
  title     = {Fractal Merkle Tree Representation and Traversal},
  booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  pages     = {314--326},
  year      = {2003},
  crossref  = {DBLP:conf/ctrsa/2003},
  url       = {https://doi.org/10.1007/3-540-36563-X\_21},
  doi       = {10.1007/3-540-36563-X\_21},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/JakobssonLMS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonHB03,
  author    = {Markus Jakobsson and
               Jean{-}Pierre Hubaux and
               Levente Butty{\'{a}}n},
  title     = {A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular
               Networks},
  booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
               French West Indies, January 27-30, 2003, Revised Papers},
  pages     = {15--33},
  year      = {2003},
  crossref  = {DBLP:conf/fc/2003},
  url       = {https://doi.org/10.1007/978-3-540-45126-6\_2},
  doi       = {10.1007/978-3-540-45126-6\_2},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonHB03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/SalemBHJ03,
  author    = {Naouel Ben Salem and
               Levente Butty{\'{a}}n and
               Jean{-}Pierre Hubaux and
               Markus Jakobsson},
  title     = {A charging and rewarding scheme for packet forwarding in multi-hop
               cellular networks},
  booktitle = {Proceedings of the 4th {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA,
               June 1-3, 2003},
  pages     = {13--24},
  year      = {2003},
  crossref  = {DBLP:conf/mobihoc/2003},
  url       = {https://doi.org/10.1145/778415.778418},
  doi       = {10.1145/778415.778418},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/SalemBHJ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GolleJ03,
  author    = {Philippe Golle and
               Markus Jakobsson},
  title     = {Reusable anonymous return channels},
  booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages     = {94--100},
  year      = {2003},
  crossref  = {DBLP:conf/wpes/2003},
  url       = {https://doi.org/10.1145/1005140.1005155},
  doi       = {10.1145/1005140.1005155},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/GolleJ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CC-0302025,
  author    = {Andris Ambainis and
               Markus Jakobsson and
               Helger Lipmaa},
  title     = {Cryptographic Randomized Response Techniques},
  journal   = {CoRR},
  volume    = {cs.CC/0302025},
  year      = {2003},
  url       = {http://arxiv.org/abs/cs.CC/0302025},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-CC-0302025},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CY-0305042,
  author    = {Markus Jakobsson and
               Filippo Menczer},
  title     = {Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial
               of Service},
  journal   = {CoRR},
  volume    = {cs.CY/0305042},
  year      = {2003},
  url       = {http://arxiv.org/abs/cs.CY/0305042},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/cs-CY-0305042},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbainisJL03,
  author    = {Andris Ambainis and
               Markus Jakobsson and
               Helger Lipmaa},
  title     = {Cryptographic Randomized Response Techniques},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {27},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/027},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AmbainisJL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonLA03,
  author    = {Markus Jakobsson and
               John Linn and
               Joy Algesheimer},
  title     = {How to Protect Against a Militant Spammer},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {71},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/071},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JakobssonLA03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02,
  author    = {Philippe Golle and
               Sheng Zhong and
               Dan Boneh and
               Markus Jakobsson and
               Ari Juels},
  title     = {Optimistic Mixing for Exit-Polls},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {451--465},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2\_28},
  doi       = {10.1007/3-540-36178-2\_28},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/GolleZBJJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MenczerSVMJ02,
  author    = {Filippo Menczer and
               W. Nick Street and
               Narayan Vishwakarma and
               Alvaro E. Monge and
               Markus Jakobsson},
  title     = {IntelliShopper: a proactive, personal, private shopping assistant},
  booktitle = {The First International Joint Conference on Autonomous Agents {\&}
               Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy,
               Proceedings},
  pages     = {1001--1008},
  year      = {2002},
  crossref  = {DBLP:conf/atal/2002},
  url       = {https://doi.org/10.1145/545056.545059},
  doi       = {10.1145/545056.545059},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/atal/MenczerSVMJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaJ02,
  author    = {Alexandra Boldyreva and
               Markus Jakobsson},
  title     = {Theft-Protected Proprietary Certificates},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
               {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  pages     = {208--220},
  year      = {2002},
  crossref  = {DBLP:conf/ccs/2002drm},
  url       = {https://doi.org/10.1007/978-3-540-44993-5\_13},
  doi       = {10.1007/978-3-540-44993-5\_13},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BoldyrevaJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MacKenzieSJ02,
  author    = {Philip D. MacKenzie and
               Thomas Shrimpton and
               Markus Jakobsson},
  title     = {Threshold Password-Authenticated Key Exchange},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {385--400},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_25},
  doi       = {10.1007/3-540-45708-9\_25},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/MacKenzieSJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonJN02,
  author    = {Markus Jakobsson and
               Ari Juels and
               Phong Q. Nguyen},
  title     = {Proprietary Certificates},
  booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  pages     = {164--181},
  year      = {2002},
  crossref  = {DBLP:conf/ctrsa/2002},
  url       = {https://doi.org/10.1007/3-540-45760-7\_12},
  doi       = {10.1007/3-540-45760-7\_12},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/JakobssonJN02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jakobsson02,
  author    = {Markus Jakobsson},
  title     = {Financial Instruments in Recommendation Mechanisms},
  booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  pages     = {31--43},
  year      = {2002},
  crossref  = {DBLP:conf/fc/2002},
  url       = {https://doi.org/10.1007/3-540-36504-4\_3},
  doi       = {10.1007/3-540-36504-4\_3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/Jakobsson02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CoppersmithJ02,
  author    = {Don Coppersmith and
               Markus Jakobsson},
  title     = {Almost Optimal Hash Sequence Traversal},
  booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  pages     = {102--119},
  year      = {2002},
  crossref  = {DBLP:conf/fc/2002},
  url       = {https://doi.org/10.1007/3-540-36504-4\_8},
  doi       = {10.1007/3-540-36504-4\_8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CoppersmithJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GarayJ02,
  author    = {Juan A. Garay and
               Markus Jakobsson},
  title     = {Timed Release of Standard Digital Signatures},
  booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  pages     = {168--182},
  year      = {2002},
  crossref  = {DBLP:conf/fc/2002},
  url       = {https://doi.org/10.1007/3-540-36504-4\_13},
  doi       = {10.1007/3-540-36504-4\_13},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/GarayJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonJR02,
  author    = {Markus Jakobsson and
               Ari Juels and
               Ronald L. Rivest},
  title     = {Making Mix Nets Robust for Electronic Voting by Randomized Partial
               Checking},
  booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  pages     = {339--353},
  year      = {2002},
  crossref  = {DBLP:conf/uss/2002},
  url       = {http://www.usenix.org/publications/library/proceedings/sec02/jakobsson.html},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/JakobssonJR02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson02,
  author    = {Markus Jakobsson},
  title     = {Fractal Hash Sequence Representation and Traversal},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {1},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/001},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Jakobsson02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoppersmithJ02,
  author    = {Don Coppersmith and
               Markus Jakobsson},
  title     = {Almost Optimal Hash Sequence Traversal},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {23},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/023},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CoppersmithJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonJR02,
  author    = {Markus Jakobsson and
               Ari Juels and
               Ronald L. Rivest},
  title     = {Making Mix Nets Robust For Electronic Voting By Randomized Partial
               Checking},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {25},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/025},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JakobssonJR02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsCJ02,
  author    = {Ari Juels and
               Dario Catalano and
               Markus Jakobsson},
  title     = {Coercion-Resistant Electronic Elections},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {165},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/165},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JuelsCJ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonR01,
  author    = {Markus Jakobsson and
               Michael K. Reiter},
  title     = {Discouraging Software Piracy Using Software Aging},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  pages     = {1--12},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001drm},
  url       = {https://doi.org/10.1007/3-540-47870-1\_1},
  doi       = {10.1007/3-540-47870-1\_1},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JakobssonR01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonPY01,
  author    = {Markus Jakobsson and
               David Pointcheval and
               Adam L. Young},
  title     = {Secure Mobile Gambling},
  booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
               {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  pages     = {110--125},
  year      = {2001},
  crossref  = {DBLP:conf/ctrsa/2001},
  url       = {https://doi.org/10.1007/3-540-45353-9\_10},
  doi       = {10.1007/3-540-45353-9\_10},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/JakobssonPY01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonW01,
  author    = {Markus Jakobsson and
               Susanne Wetzel},
  title     = {Security Weaknesses in Bluetooth},
  booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
               {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  pages     = {176--191},
  year      = {2001},
  crossref  = {DBLP:conf/ctrsa/2001},
  url       = {https://doi.org/10.1007/3-540-45353-9\_14},
  doi       = {10.1007/3-540-45353-9\_14},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/JakobssonW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonP01,
  author    = {Markus Jakobsson and
               David Pointcheval},
  title     = {Mutual Authentication for Low-Power Mobile Devices},
  booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  pages     = {169--186},
  year      = {2001},
  crossref  = {DBLP:conf/fc/2001},
  url       = {https://doi.org/10.1007/3-540-46088-8\_17},
  doi       = {10.1007/3-540-46088-8\_17},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonP01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JakobssonW01,
  author    = {Markus Jakobsson and
               Susanne Wetzel},
  title     = {Secure Server-Aided Signature Generation},
  booktitle = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  pages     = {383--401},
  year      = {2001},
  crossref  = {DBLP:conf/pkc/2001},
  url       = {https://doi.org/10.1007/3-540-44586-2\_28},
  doi       = {10.1007/3-540-44586-2\_28},
  timestamp = {Wed, 24 May 2017 15:40:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/JakobssonW01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JakobssonJ01,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {An optimally robust hybrid mix network},
  booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
               August 26-29, 2001},
  pages     = {284--292},
  year      = {2001},
  crossref  = {DBLP:conf/podc/2001},
  url       = {https://doi.org/10.1145/383962.384046},
  doi       = {10.1145/383962.384046},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/JakobssonJ01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JuelsJSH00,
  author    = {Ari Juels and
               Markus Jakobsson and
               Elizabeth A. M. Shriver and
               Bruce Hillyer},
  title     = {How to turn loaded dice into fair coins},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {46},
  number    = {3},
  pages     = {911--921},
  year      = {2000},
  url       = {https://doi.org/10.1109/18.841170},
  doi       = {10.1109/18.841170},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tit/JuelsJSH00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SchnorrJ00,
  author    = {Claus{-}Peter Schnorr and
               Markus Jakobsson},
  title     = {Security of Signed ElGamal Encryption},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {73--89},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_7},
  doi       = {10.1007/3-540-44448-3\_7},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/SchnorrJ00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {Mix and Match: Secure Function Evaluation via Ciphertexts},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {162--177},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_13},
  doi       = {10.1007/3-540-44448-3\_13},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/JakobssonJ00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00a,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {Addition of ElGamal Plaintexts},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {346--358},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_26},
  doi       = {10.1007/3-540-44448-3\_26},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/JakobssonJ00a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohannonJS00,
  author    = {Philip Bohannon and
               Markus Jakobsson and
               Sukamol Srikwan},
  title     = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
  booktitle = {Public Key Cryptography, Third International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
               Australia, January 18-20, 2000, Proceedings},
  pages     = {373--390},
  year      = {2000},
  crossref  = {DBLP:conf/pkc/2000},
  url       = {https://doi.org/10.1007/978-3-540-46588-1\_25},
  doi       = {10.1007/978-3-540-46588-1\_25},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BohannonJS00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ArleinJJMR00,
  author    = {Robert M. Arlein and
               Ben Jai and
               Markus Jakobsson and
               Fabian Monrose and
               Michael K. Reiter},
  title     = {Privacy-preserving global customization},
  booktitle = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00),
               Minneapolis, MN, USA, October 17-20, 2000},
  pages     = {176--184},
  year      = {2000},
  crossref  = {DBLP:conf/sigecom/2000},
  url       = {https://doi.org/10.1145/352871.352891},
  doi       = {10.1145/352871.352891},
  timestamp = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigecom/ArleinJJMR00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JakobssonMS99,
  author    = {Markus Jakobsson and
               Philip D. MacKenzie and
               Julien P. Stern},
  title     = {Secure and Lightweight Advertising on the Web},
  journal   = {Computer Networks},
  volume    = {31},
  number    = {11-16},
  pages     = {1101--1109},
  year      = {1999},
  url       = {https://doi.org/10.1016/S1389-1286(99)00041-9},
  doi       = {10.1016/S1389-1286(99)00041-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/JakobssonMS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/JakobssonS99,
  author    = {Markus Jakobsson and
               Claus{-}Peter Schnorr},
  title     = {Efficient Oblivious Proofs of Correct Exponentiation},
  booktitle = {Secure Information Networks: Communications and Multimedia Security,
               {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
               Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  pages     = {71--86},
  year      = {1999},
  crossref  = {DBLP:conf/cms/1999},
  timestamp = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/JakobssonS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/JakobssonJ99,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {Proofs of Work and Bread Pudding Protocols},
  booktitle = {Secure Information Networks: Communications and Multimedia Security,
               {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
               Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  pages     = {258--272},
  year      = {1999},
  crossref  = {DBLP:conf/cms/1999},
  timestamp = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/JakobssonJ99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqre/JakobssonMTY99,
  author    = {Markus Jakobsson and
               David M'Ra{\"{\i}}hi and
               Yiannis Tsiounis and
               Moti Yung},
  title     = {Electronic Payments: Where Do We Go from Here?},
  booktitle = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
               and Congress D{\"{u}}sseldorf, Germany, November 30 - December
               2, 1999, Proceedings},
  pages     = {43--63},
  year      = {1999},
  crossref  = {DBLP:conf/cqre/1999},
  url       = {https://doi.org/10.1007/3-540-46701-7\_4},
  doi       = {10.1007/3-540-46701-7\_4},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cqre/JakobssonMTY99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayJM99,
  author    = {Juan A. Garay and
               Markus Jakobsson and
               Philip D. MacKenzie},
  title     = {Abuse-Free Optimistic Contract Signing},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {449--466},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1\_29},
  doi       = {10.1007/3-540-48405-1\_29},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GarayJM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonM99,
  author    = {Markus Jakobsson and
               Joy M{\"{u}}ller},
  title     = {Improved Magic Ink Signatures Using Hints},
  booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  pages     = {253--268},
  year      = {1999},
  crossref  = {DBLP:conf/fc/1999},
  url       = {https://doi.org/10.1007/3-540-48390-X\_19},
  doi       = {10.1007/3-540-48390-X\_19},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JakobssonSY99,
  author    = {Markus Jakobsson and
               Julien P. Stern and
               Moti Yung},
  title     = {Scramble All, Encrypt Small},
  booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
               Italy, March 24-26, 1999, Proceedings},
  pages     = {95--111},
  year      = {1999},
  crossref  = {DBLP:conf/fse/1999},
  url       = {https://doi.org/10.1007/3-540-48519-8\_8},
  doi       = {10.1007/3-540-48519-8\_8},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/JakobssonSY99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99,
  author    = {Markus Jakobsson},
  title     = {On Quorum Controlled Asymmetric Proxy Re-encryption},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {112--121},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7\_9},
  doi       = {10.1007/3-540-49162-7\_9},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/Jakobsson99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99a,
  author    = {Markus Jakobsson},
  title     = {Mini-Cash: {A} Minimalistic Approach to E-Commerce},
  booktitle = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  pages     = {122--135},
  year      = {1999},
  crossref  = {DBLP:conf/pkc/1999},
  url       = {https://doi.org/10.1007/3-540-49162-7\_10},
  doi       = {10.1007/3-540-49162-7\_10},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/Jakobsson99a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Jakobsson99,
  author    = {Markus Jakobsson},
  title     = {Flash Mixing},
  booktitle = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6,
               1999},
  pages     = {83--89},
  year      = {1999},
  crossref  = {DBLP:conf/podc/1999},
  url       = {https://doi.org/10.1145/301308.301333},
  doi       = {10.1145/301308.301333},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/podc/Jakobsson99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/CrescenzoFIJ99,
  author    = {Giovanni Di Crescenzo and
               Niels Ferguson and
               Russell Impagliazzo and
               Markus Jakobsson},
  title     = {How to Forget a Secret},
  booktitle = {{STACS} 99, 16th Annual Symposium on Theoretical Aspects of Computer
               Science, Trier, Germany, March 4-6, 1999, Proceedings},
  pages     = {500--509},
  year      = {1999},
  crossref  = {DBLP:conf/stacs/1999},
  url       = {https://doi.org/10.1007/3-540-49116-3\_47},
  doi       = {10.1007/3-540-49116-3\_47},
  timestamp = {Thu, 15 Jun 2017 21:34:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stacs/CrescenzoFIJ99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98,
  author    = {Markus Jakobsson and
               Elizabeth A. M. Shriver and
               Bruce Hillyer and
               Ari Juels},
  title     = {A Practical Secure Physical Random Bit Generator},
  booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
               Communications Security, San Francisco, CA, USA, November 3-5, 1998.},
  pages     = {103--111},
  year      = {1998},
  crossref  = {DBLP:conf/ccs/1998},
  url       = {https://doi.org/10.1145/288090.288114},
  doi       = {10.1145/288090.288114},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JakobssonSHJ98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson98,
  author    = {Markus Jakobsson},
  title     = {A Practical Mix},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  pages     = {448--461},
  year      = {1998},
  crossref  = {DBLP:conf/eurocrypt/98},
  url       = {https://doi.org/10.1007/BFb0054145},
  doi       = {10.1007/BFb0054145},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Jakobsson98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonJ98,
  author    = {Markus Jakobsson and
               Ari Juels},
  title     = {X-Cash: Executable Digital Cash},
  booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  pages     = {16--27},
  year      = {1998},
  crossref  = {DBLP:conf/fc/1998},
  url       = {https://doi.org/10.1007/BFb0055470},
  doi       = {10.1007/BFb0055470},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonJ98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY98,
  author    = {Markus Jakobsson and
               Moti Yung},
  title     = {On Assurance Structures for {WWW} Commerce},
  booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  pages     = {141--157},
  year      = {1998},
  crossref  = {DBLP:conf/fc/1998},
  url       = {https://doi.org/10.1007/BFb0055478},
  doi       = {10.1007/BFb0055478},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonY98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GabberJMM98,
  author    = {Eran Gabber and
               Markus Jakobsson and
               Yossi Matias and
               Alain J. Mayer},
  title     = {Curbing Junk E-Mail via Secure Classification},
  booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  pages     = {198--213},
  year      = {1998},
  crossref  = {DBLP:conf/fc/1998},
  url       = {https://doi.org/10.1007/BFb0055484},
  doi       = {10.1007/BFb0055484},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/GabberJMM98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JakobssonM98,
  author    = {Markus Jakobsson and
               David M'Ra{\"{\i}}hi},
  title     = {Mix-Based Electronic Payments},
  booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
               August 17-18, 1998, Proceedings},
  pages     = {157--173},
  year      = {1998},
  crossref  = {DBLP:conf/sacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-48892-8\_13},
  doi       = {10.1007/3-540-48892-8\_13},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/JakobssonM98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HerzbergJJKY97,
  author    = {Amir Herzberg and
               Markus Jakobsson and
               Stanislaw Jarecki and
               Hugo Krawczyk and
               Moti Yung},
  title     = {Proactive Public Key and Signature Systems},
  booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
               Communications Security, Zurich, Switzerland, April 1-4, 1997.},
  pages     = {100--110},
  year      = {1997},
  crossref  = {DBLP:conf/ccs/1997},
  url       = {https://doi.org/10.1145/266420.266442},
  doi       = {10.1145/266420.266442},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HerzbergJJKY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareJY97,
  author    = {Mihir Bellare and
               Markus Jakobsson and
               Moti Yung},
  title     = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  pages     = {280--305},
  year      = {1997},
  crossref  = {DBLP:conf/eurocrypt/97},
  url       = {https://doi.org/10.1007/3-540-69053-0\_20},
  doi       = {10.1007/3-540-69053-0\_20},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/BellareJY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JakobssonY97,
  author    = {Markus Jakobsson and
               Moti Yung},
  title     = {Distributed "Magic Ink" Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  pages     = {450--464},
  year      = {1997},
  crossref  = {DBLP:conf/eurocrypt/97},
  url       = {https://doi.org/10.1007/3-540-69053-0\_31},
  doi       = {10.1007/3-540-69053-0\_31},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/JakobssonY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonY97,
  author    = {Markus Jakobsson and
               Moti Yung},
  title     = {Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money
               System},
  booktitle = {Financial Cryptography, First International Conference, {FC} '97,
               Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  pages     = {217--238},
  year      = {1997},
  crossref  = {DBLP:conf/fc/1997},
  url       = {https://doi.org/10.1007/3-540-63594-7\_80},
  doi       = {10.1007/3-540-63594-7\_80},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JakobssonY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJY97,
  author    = {Mihir Bellare and
               Markus Jakobsson and
               Moti Yung},
  title     = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1997},
  pages     = {2},
  year      = {1997},
  url       = {http://eprint.iacr.org/1997/002},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BellareJY97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonY96,
  author    = {Markus Jakobsson and
               Moti Yung},
  title     = {Revokable and Versatile Electronic Money (extended abstract)},
  booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996.},
  pages     = {76--87},
  year      = {1996},
  crossref  = {DBLP:conf/ccs/1996},
  url       = {https://doi.org/10.1145/238168.238191},
  doi       = {10.1145/238168.238191},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JakobssonY96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JakobssonY96,
  author    = {Markus Jakobsson and
               Moti Yung},
  title     = {Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers},
  booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  pages     = {186--200},
  year      = {1996},
  crossref  = {DBLP:conf/crypto/1996},
  url       = {https://doi.org/10.1007/3-540-68697-5\_15},
  doi       = {10.1007/3-540-68697-5\_15},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/JakobssonY96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JakobssonSI96,
  author    = {Markus Jakobsson and
               Kazue Sako and
               Russell Impagliazzo},
  title     = {Designated Verifier Proofs and Their Applications},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  pages     = {143--154},
  year      = {1996},
  crossref  = {DBLP:conf/eurocrypt/96},
  url       = {https://doi.org/10.1007/3-540-68339-9\_13},
  doi       = {10.1007/3-540-68339-9\_13},
  timestamp = {Mon, 22 May 2017 16:14:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/JakobssonSI96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson95,
  author    = {Markus Jakobsson},
  title     = {Ripping Coins For a Fair Exchange},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  pages     = {220--230},
  year      = {1995},
  crossref  = {DBLP:conf/eurocrypt/95},
  url       = {https://doi.org/10.1007/3-540-49264-X\_18},
  doi       = {10.1007/3-540-49264-X\_18},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Jakobsson95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jakobsson94,
  author    = {Markus Jakobsson},
  title     = {Blackmailing using Undeniable Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  pages     = {425--427},
  year      = {1994},
  crossref  = {DBLP:conf/eurocrypt/94},
  url       = {https://doi.org/10.1007/BFb0053457},
  doi       = {10.1007/BFb0053457},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Jakobsson94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2017,
  title     = {2017 {APWG} Symposium on Electronic Crime Research, eCrime 2017, Phoenix,
               AZ, USA, April 25-27, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7937992},
  isbn      = {978-1-5386-2701-3},
  timestamp = {Wed, 21 Jun 2017 10:07:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecrime/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017,
  editor    = {Aggelos Kiayias},
  title     = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10322},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7},
  doi       = {10.1007/978-3-319-70972-7},
  isbn      = {978-3-319-70971-0},
  timestamp = {Tue, 02 Jan 2018 13:47:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/birthday/2016kahn,
  editor    = {Peter Y. A. Ryan and
               David Naccache and
               Jean{-}Jacques Quisquater},
  title     = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
               of His 85th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {9100},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49301-4},
  doi       = {10.1007/978-3-662-49301-4},
  isbn      = {978-3-662-49300-7},
  timestamp = {Tue, 23 May 2017 01:06:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/birthday/2016kahn},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/J2016,
  editor    = {Markus Jakobsson},
  title     = {Understanding Social Engineering Based Scams},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-1-4939-6457-4},
  doi       = {10.1007/978-1-4939-6457-4},
  isbn      = {978-1-4939-6455-0},
  timestamp = {Tue, 16 May 2017 14:01:45 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/J2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2014,
  title     = {21st Annual Network and Distributed System Security Symposium, {NDSS}
               2014, San Diego, California, USA, February 23-26, 2014},
  publisher = {The Internet Society},
  year      = {2014},
  url       = {https://www.ndss-symposium.org/ndss2014/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wmcsa/2014,
  title     = {15th Workshop on Mobile Computing Systems and Applications, HotMobile
               '14, Santa Barbara, CA, USA, February 26-27, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2565585},
  isbn      = {978-1-4503-2742-8},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2012,
  title     = {2nd Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
               2012, Cambridge, MA, USA, June 25, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6362318},
  isbn      = {978-1-4673-2748-0},
  timestamp = {Thu, 02 Oct 2014 17:00:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stast/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2012hotsec,
  editor    = {Patrick Traynor},
  title     = {7th {USENIX} Workshop on Hot Topics in Security, HotSec'12, Bellevue,
               WA, USA, August 7, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/conference/hotsec12},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2012hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010ccsw,
  editor    = {Adrian Perrig and
               Radu Sion},
  title     = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
               2010, Chicago, IL, USA, October 8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1866835},
  isbn      = {978-1-4503-0089-6},
  timestamp = {Wed, 25 Jan 2012 19:28:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2010,
  editor    = {Mike Burmester and
               Gene Tsudik and
               Spyros S. Magliveras and
               Ivana Ilic},
  title     = {Information Security - 13th International Conference, {ISC} 2010,
               Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6531},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18178-8},
  doi       = {10.1007/978-3-642-18178-8},
  isbn      = {978-3-642-18177-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010hotsec,
  editor    = {Wietse Z. Venema},
  title     = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
               D.C., USA, August 10, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/conference/hotsec10},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2010hotsec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor    = {David Chaum and
               Markus Jakobsson and
               Ronald L. Rivest and
               Peter Y. A. Ryan and
               Josh Benaloh and
               Miroslaw Kutylowski and
               Ben Adida},
  title     = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series    = {Lecture Notes in Computer Science},
  volume    = {6000},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12980-3},
  doi       = {10.1007/978-3-642-12980-3},
  isbn      = {978-3-642-12979-7},
  timestamp = {Sun, 21 May 2017 00:17:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wote/2010lncs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/crc/2010fcs,
  editor    = {Burton Rosenberg},
  title     = {Handbook of Financial Cryptography and Security},
  publisher = {Chapman and Hall/CRC},
  year      = {2010},
  url       = {https://doi.org/10.1201/9781420059823},
  doi       = {10.1201/9781420059823},
  isbn      = {978-1-4200-5981-6},
  timestamp = {Tue, 16 May 2017 14:02:19 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/crc/2010fcs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009aisec,
  editor    = {Dirk Balfanz and
               Jessica Staddon},
  title     = {Proceedings of the 2nd {ACM} Workshop on Security and Artificial Intelligence,
               AISec 2009, Chicago, Illinois, USA, November 9, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-781-3},
  timestamp = {Wed, 25 Nov 2009 10:48:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009aisec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009ccsw,
  editor    = {Radu Sion and
               Dawn Song},
  title     = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
               {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  url       = {http://dl.acm.org/citation.cfm?id=1655008},
  isbn      = {978-1-60558-784-4},
  timestamp = {Wed, 25 Jan 2012 19:34:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2009,
  editor    = {Anil Somayaji and
               Richard Ford},
  title     = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
               United Kingdom, September 8-11, 2009},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1719030},
  doi       = {10.1145/1719030},
  isbn      = {978-1-60558-845-2},
  timestamp = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nspw/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2008,
  editor    = {Mary Czerwinski and
               Arnold M. Lund and
               Desney S. Tan},
  title     = {Proceedings of the 2008 Conference on Human Factors in Computing Systems,
               {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-011-1},
  timestamp = {Tue, 08 Apr 2008 08:35:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2008,
  editor    = {Elisa Bertino and
               Kenji Takahashi},
  title     = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
               VA, USA, October 31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-294-8},
  timestamp = {Tue, 11 Nov 2008 17:25:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/haisa/2008,
  editor    = {Nathan L. Clarke and
               Steven Furnell},
  title     = {2nd International Conference on Human Aspects of Information Security
               and Assurance, {HAISA} 2008, Plymouth, UK, July 8-9, 2008. Proceedings},
  publisher = {University of Plymouth},
  year      = {2008},
  isbn      = {978-1-84102-189-8},
  timestamp = {Sat, 14 Sep 2013 18:40:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/haisa/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wmcsa/2008,
  editor    = {Mirjana Spasojevic and
               Mark D. Corner},
  title     = {Proceedings of the 9th Workshop on Mobile Computing Systems and Applications,
               HotMobile 2008, Napa Valley, California, USA, February 25-26, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-118-7},
  timestamp = {Mon, 12 Oct 2009 09:08:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/digra/2007,
  editor    = {Akira Baba},
  title     = {Proceedings of the 2007 DiGRA International Conference: Situated Play,
               DiGRA 2007, Tokyo, Japan, September 24-28, 2007},
  publisher = {Digital Games Research Association},
  year      = {2007},
  url       = {http://www.digra.org/digital-library/forums/4-situated-play/},
  timestamp = {Tue, 23 Aug 2016 16:17:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/digra/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2007,
  editor    = {Atsuhiro Goto},
  title     = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax,
               VA, USA, November 2, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-889-3},
  timestamp = {Thu, 21 Feb 2008 12:23:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2007,
  editor    = {Sven Dietrich and
               Rachna Dhamija},
  title     = {Financial Cryptography and Data Security, 11th International Conference,
               {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
               2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4886},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77366-5},
  doi       = {10.1007/978-3-540-77366-5},
  isbn      = {978-3-540-77365-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2007,
  editor    = {Sihan Qing and
               Hideki Imai and
               Guilin Wang},
  title     = {Information and Communications Security, 9th International Conference,
               {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4861},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77048-0},
  doi       = {10.1007/978-3-540-77048-0},
  isbn      = {978-3-540-77047-3},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007,
  editor    = {Niels Provos},
  title     = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
               August 6-10, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/legacy/events/sec07/},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2006,
  editor    = {Enrico Blanzieri and
               Tao Zhang},
  title     = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  publisher = {{IEEE} Computer Society / {ICST}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4207500},
  isbn      = {1-4244-0429-0},
  timestamp = {Thu, 19 Mar 2015 16:19:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2006,
  title     = {Second International Symposium on Dependable Autonomic and Secure
               Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
               Indiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4030851},
  isbn      = {0-7695-2539-3},
  timestamp = {Tue, 18 Aug 2015 20:06:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2006,
  editor    = {Giovanni Di Crescenzo and
               Aviel D. Rubin},
  title     = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4107},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11889663},
  doi       = {10.1007/11889663},
  isbn      = {3-540-46255-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2006,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4024074},
  isbn      = {1-4244-0355-3},
  timestamp = {Wed, 27 Feb 2013 11:24:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2006,
  title     = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4198788},
  isbn      = {1-4244-0423-1},
  timestamp = {Thu, 21 Jun 2018 08:02:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2006,
  title     = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
               May 2006, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10812},
  isbn      = {0-7695-2574-1},
  timestamp = {Thu, 08 Jan 2015 16:59:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2006,
  editor    = {Les Carr and
               David De Roure and
               Arun Iyengar and
               Carole A. Goble and
               Michael Dahlin},
  title     = {Proceedings of the 15th international conference on World Wide Web,
               {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-323-9},
  timestamp = {Mon, 17 Jul 2006 14:10:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2005,
  editor    = {John Ioannidis and
               Angelos D. Keromytis and
               Moti Yung},
  title     = {Applied Cryptography and Network Security, Third International Conference,
               {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3531},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137093},
  doi       = {10.1007/b137093},
  isbn      = {3-540-26223-7},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor    = {Andrew S. Patrick and
               Moti Yung},
  title     = {Financial Cryptography and Data Security, 9th International Conference,
               {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
               3, 2005, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3570},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137875},
  doi       = {10.1007/b137875},
  isbn      = {3-540-26656-9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mswim/2005q,
  editor    = {Azzedine Boukerche and
               Regina Borges de Araujo},
  title     = {Q2SWinet'05 - Proceedings of the First {ACM} Workshop on {Q2S} and
               Security for Wireless and Mobile Networks, Montreal, Quebec, Canada,
               October 13, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-241-0},
  timestamp = {Wed, 02 Apr 2008 14:48:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mswim/2005q},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/profes/2005,
  editor    = {Frank Bomarius and
               Seija Komi{-}Sirvi{\"{o}}},
  title     = {Product Focused Software Process Improvement, 6th International Conference,
               {PROFES} 2005, Oulu, Finland, June 13-15, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3547},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137178},
  doi       = {10.1007/b137178},
  isbn      = {3-540-26200-8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/profes/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2005,
  editor    = {Vijay Atluri and
               Sabrina De Capitani di Vimercati and
               Roger Dingledine},
  title     = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-228-3},
  timestamp = {Thu, 09 Mar 2006 14:46:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2004,
  editor    = {Tatsuaki Okamoto},
  title     = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
               the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2964},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95630},
  doi       = {10.1007/b95630},
  isbn      = {3-540-20996-4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2004vanet,
  editor    = {Kenneth P. Laberteaux and
               Raja Sengupta and
               Chen{-}Nee Chuah and
               Daniel Jiang},
  title     = {Proceedings of the First International Workshop on Vehicular Ad Hoc
               Networks, 2004, Philadelphia, PA, USA, October 1, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-922-5},
  timestamp = {Thu, 13 Oct 2005 10:10:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/2004vanet},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2004,
  editor    = {Feng Bao and
               Robert H. Deng and
               Jianying Zhou},
  title     = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
               Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
               2004},
  series    = {Lecture Notes in Computer Science},
  volume    = {2947},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95631},
  doi       = {10.1007/b95631},
  isbn      = {3-540-21018-0},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vtc/2004f,
  title     = {Proceedings of the 60th {IEEE} Vehicular Technology Conference, {VTC}
               Fall 2004, 26-29 September 2004, Los Angeles, CA, {USA}},
  publisher = {{IEEE}},
  year      = {2004},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vtc/2004f},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wmash/2004,
  editor    = {Giuseppe Bianchi and
               Sunghyun Choi and
               Bill N. Schilit},
  title     = {Proceedings of the 2nd {ACM} International Workshop on Wireless Mobile
               Applications and Services on {WLAN} Hotspots, {WMASH} 2004, Philadelphia,
               PA, USA, October 1, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-877-6},
  timestamp = {Mon, 26 Feb 2018 13:34:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmash/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2003,
  editor    = {Marc Joye},
  title     = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2612},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36563-X},
  doi       = {10.1007/3-540-36563-X},
  isbn      = {3-540-00847-0},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2003,
  editor    = {Rebecca N. Wright},
  title     = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
               French West Indies, January 27-30, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2742},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45126-6},
  doi       = {10.1007/978-3-540-45126-6},
  isbn      = {3-540-40663-8},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobihoc/2003,
  title     = {Proceedings of the 4th {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA,
               June 1-3, 2003},
  publisher = {{ACM}},
  year      = {2003},
  isbn      = {1-58113-684-6},
  timestamp = {Tue, 30 Mar 2004 12:35:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2003,
  editor    = {Sushil Jajodia and
               Pierangela Samarati and
               Paul F. Syverson},
  title     = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  publisher = {{ACM}},
  year      = {2003},
  isbn      = {1-58113-776-1},
  timestamp = {Wed, 16 Feb 2005 14:48:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2002,
  editor    = {Yuliang Zheng},
  title     = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2501},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36178-2},
  doi       = {10.1007/3-540-36178-2},
  isbn      = {3-540-00171-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atal/2002,
  title     = {The First International Joint Conference on Autonomous Agents {\&}
               Multiagent Systems, {AAMAS} 2002, July 15-19, 2002, Bologna, Italy,
               Proceedings},
  publisher = {{ACM}},
  year      = {2002},
  timestamp = {Tue, 13 Aug 2002 07:50:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/atal/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002drm,
  editor    = {Joan Feigenbaum},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
               {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2696},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11725},
  doi       = {10.1007/b11725},
  isbn      = {3-540-40410-4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2002drm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9},
  doi       = {10.1007/3-540-45708-9},
  isbn      = {3-540-44050-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2002,
  editor    = {Bart Preneel},
  title     = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
               the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2271},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45760-7},
  doi       = {10.1007/3-540-45760-7},
  isbn      = {3-540-43224-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2002,
  editor    = {Matt Blaze},
  title     = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
               Bermuda, March 11-14, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2357},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36504-4},
  doi       = {10.1007/3-540-36504-4},
  isbn      = {3-540-00646-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2002,
  editor    = {Dan Boneh},
  title     = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  publisher = {{USENIX}},
  year      = {2002},
  isbn      = {1-931971-00-5},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001drm,
  editor    = {Tomas Sander},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2320},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-47870-1},
  doi       = {10.1007/3-540-47870-1},
  isbn      = {3-540-43677-4},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2001drm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2001,
  editor    = {David Naccache},
  title     = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
               {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2020},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45353-9},
  doi       = {10.1007/3-540-45353-9},
  isbn      = {3-540-41898-9},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2001,
  editor    = {Paul F. Syverson},
  title     = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2339},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-46088-8},
  doi       = {10.1007/3-540-46088-8},
  isbn      = {3-540-44079-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2001,
  editor    = {Kwangjo Kim},
  title     = {Public Key Cryptography, 4th International Workshop on Practice and
               Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
               February 13-15, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1992},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44586-2},
  doi       = {10.1007/3-540-44586-2},
  isbn      = {3-540-41658-7},
  timestamp = {Wed, 24 May 2017 15:40:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/2001,
  editor    = {Ajay D. Kshemkalyani and
               Nir Shavit},
  title     = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
               August 26-29, 2001},
  publisher = {{ACM}},
  year      = {2001},
  url       = {http://dl.acm.org/citation.cfm?id=383962},
  isbn      = {1-58113-383-9},
  timestamp = {Wed, 23 May 2012 17:48:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3},
  doi       = {10.1007/3-540-44448-3},
  isbn      = {3-540-41404-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2000,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Third International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
               Australia, January 18-20, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1751},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/b75033},
  doi       = {10.1007/b75033},
  isbn      = {3-540-66967-1},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2000,
  editor    = {Anant Jhingran and
               Jeff Mackie{-}Mason and
               Doug J. Tygar},
  title     = {Proceedings of the 2nd {ACM} Conference on Electronic Commerce (EC-00),
               Minneapolis, MN, USA, October 17-20, 2000},
  publisher = {{ACM}},
  year      = {2000},
  url       = {https://doi.org/10.1145/352871},
  doi       = {10.1145/352871},
  isbn      = {1-58113-272-7},
  timestamp = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigecom/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/1999,
  editor    = {Bart Preneel},
  title     = {Secure Information Networks: Communications and Multimedia Security,
               {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
               Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series    = {{IFIP} Conference Proceedings},
  volume    = {152},
  publisher = {Kluwer},
  year      = {1999},
  isbn      = {0-7923-8600-0},
  timestamp = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cms/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cqre/1999,
  editor    = {Rainer Baumgart},
  title     = {Secure Networking - {CQRE} (Secure) '99, International Exhibition
               and Congress D{\"{u}}sseldorf, Germany, November 30 - December
               2, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1740},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-46701-7},
  doi       = {10.1007/3-540-46701-7},
  isbn      = {3-540-66800-4},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cqre/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor    = {Michael J. Wiener},
  title     = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1},
  doi       = {10.1007/3-540-48405-1},
  isbn      = {3-540-66347-9},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor    = {Matthew K. Franklin},
  title     = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1648},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48390-X},
  doi       = {10.1007/3-540-48390-X},
  isbn      = {3-540-66362-2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1999,
  editor    = {Lars R. Knudsen},
  title     = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
               Italy, March 24-26, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1636},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48519-8},
  doi       = {10.1007/3-540-48519-8},
  isbn      = {3-540-66226-X},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/1999,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Second International Workshop on Practice
               and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
               March 1-3, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1560},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49162-7},
  doi       = {10.1007/3-540-49162-7},
  isbn      = {3-540-65644-8},
  timestamp = {Wed, 14 Nov 2018 10:56:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/podc/1999,
  editor    = {Brian A. Coan and
               Jennifer L. Welch},
  title     = {Proceedings of the Eighteenth Annual {ACM} Symposium on Principles
               of Distributed Computing, PODC, '99Atlanta, Georgia, USA, May 3-6,
               1999},
  publisher = {{ACM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=301308},
  isbn      = {1-58113-099-6},
  timestamp = {Wed, 23 May 2012 14:26:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/podc/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stacs/1999,
  editor    = {Christoph Meinel and
               Sophie Tison},
  title     = {{STACS} 99, 16th Annual Symposium on Theoretical Aspects of Computer
               Science, Trier, Germany, March 4-6, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1563},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49116-3},
  doi       = {10.1007/3-540-49116-3},
  timestamp = {Thu, 15 Jun 2017 21:34:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stacs/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1998,
  editor    = {Li Gong and
               Michael K. Reiter},
  title     = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
               Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  publisher = {{ACM}},
  year      = {1998},
  url       = {http://dl.acm.org/citation.cfm?id=288090},
  isbn      = {1-58113-007-4},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/98,
  editor    = {Kaisa Nyberg},
  title     = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1403},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054112},
  doi       = {10.1007/BFb0054112},
  isbn      = {3-540-64518-7},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/1998,
  editor    = {Rafael Hirschfeld},
  title     = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1465},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0055468},
  doi       = {10.1007/BFb0055468},
  isbn      = {3-540-64951-4},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/1998,
  editor    = {Stafford E. Tavares and
               Henk Meijer},
  title     = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
               August 17-18, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1556},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48892-8},
  doi       = {10.1007/3-540-48892-8},
  isbn      = {3-540-65894-7},
  timestamp = {Tue, 23 May 2017 14:54:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1997,
  editor    = {Richard Graveman and
               Philippe A. Janson and
               Clifford Neuman and
               Li Gong},
  title     = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
               Communications Security, Zurich, Switzerland, April 1-4, 1997},
  publisher = {{ACM}},
  year      = {1997},
  url       = {http://dl.acm.org/citation.cfm?id=266420},
  isbn      = {0-89791-912-2},
  timestamp = {Mon, 07 Nov 2016 19:48:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
  editor    = {Walter Fumy},
  title     = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1233},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-69053-0},
  doi       = {10.1007/3-540-69053-0},
  isbn      = {3-540-62975-0},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/1997,
  editor    = {Rafael Hirschfeld},
  title     = {Financial Cryptography, First International Conference, {FC} '97,
               Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1318},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-63594-7},
  doi       = {10.1007/3-540-63594-7},
  isbn      = {3-540-63594-7},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1996,
  editor    = {Li Gong and
               Jacques Stearn},
  title     = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996},
  publisher = {{ACM}},
  year      = {1996},
  url       = {http://dl.acm.org/citation.cfm?id=238168},
  isbn      = {0-89791-829-0},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1996,
  editor    = {Neal Koblitz},
  title     = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1109},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68697-5},
  doi       = {10.1007/3-540-68697-5},
  isbn      = {3-540-61512-1},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/96,
  editor    = {Ueli M. Maurer},
  title     = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1070},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68339-9},
  doi       = {10.1007/3-540-68339-9},
  isbn      = {3-540-61186-X},
  timestamp = {Mon, 22 May 2017 16:14:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/95,
  editor    = {Louis C. Guillou and
               Jean{-}Jacques Quisquater},
  title     = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {921},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-49264-X},
  doi       = {10.1007/3-540-49264-X},
  isbn      = {3-540-59409-4},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/94,
  editor    = {Alfredo De Santis},
  title     = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {950},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0053418},
  doi       = {10.1007/BFb0053418},
  isbn      = {3-540-60176-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier