Markus Jakobsson
#150,965
Most Influential Person Now
American computer security researcher, entrepreneur and writer
Markus Jakobsson's AcademicInfluence.com Rankings
Markus Jakobssoncriminal-justice Degrees
Criminal Justice
#191
World Rank
#217
Historical Rank
Cyber Security
#19
World Rank
#21
Historical Rank
Markus Jakobssoncomputer-science Degrees
Computer Science
#8215
World Rank
#8637
Historical Rank
Internet Security
#3
World Rank
#3
Historical Rank
Cybersecurity
#20
World Rank
#22
Historical Rank
Database
#5698
World Rank
#5913
Historical Rank
Download Badge
Criminal Justice Computer Science
Markus Jakobsson's Degrees
- PhD Computer Science University of California, San Diego
- Masters Computer Science University of California, San Diego
- Bachelors Computer Science University of California, San Diego
Similar Degrees You Can Earn
Why Is Markus Jakobsson Influential?
(Suggest an Edit or Addition)According to Wikipedia, Markus Jakobsson is a computer security researcher, entrepreneur and writer, whose work is focused on the issue of digital security. Career Markus Jakobsson is currently Chief Scientist at Artema Labs, a company with the mission of disrupting and improving the crypto and NFT markets. Prior to his current role, he has been Chief Scientist at ByteDance; Chief of Security and Data Analytics at Amber Solutions, and Chief Scientist at Agari.
Markus Jakobsson's Published Works
Published Works
- Controlling data in the cloud: outsourcing computation without outsourcing control (2009) (984)
- Designated Verifier Proofs and Their Applications (1996) (866)
- Coercion-resistant electronic elections (2005) (630)
- Social phishing (2007) (614)
- Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking (2002) (453)
- Universal Re-encryption for Mixnets (2004) (450)
- Proofs of Work and Bread Pudding Protocols (1999) (409)
- Security Weaknesses in Bluetooth (2001) (324)
- A charging and rewarding scheme for packet forwarding in multi-hop cellular networks (2003) (308)
- Mix and Match: Secure Function Evaluation via Ciphertexts (2000) (304)
- Implicit Authentication through Learning User Behavior (2010) (300)
- Proactive public key and signature systems (1997) (290)
- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks (2003) (288)
- Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft (2006) (283)
- Implicit authentication for mobile devices (2009) (269)
- Abuse-Free Optimistic Contract Signing (1999) (263)
- A Practical Mix (1998) (220)
- Almost Optimal Hash Sequence Traversal (2002) (186)
- Threshold Password-Authenticated Key Exchange (2002) (176)
- Authentication in the clouds: a framework and its application to mobile users (2010) (163)
- Security of Signed ElGamal Encryption (2000) (160)
- PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) (1999) (159)
- Flash mixing (1999) (151)
- Modeling and Preventing Phishing Attacks (2005) (141)
- Designing ethical phishing experiments: a study of (ROT13) rOnl query features (2006) (140)
- On Quorum Controlled Asymmetric Proxy Re-encryption (1999) (138)
- Balancing auditability and privacy in vehicular networks (2005) (134)
- Optimistic Mixing for Exit-Polls (2002) (132)
- Efficient Constructions for One-Way Hash Chains (2005) (120)
- Fractal hash sequence representation and traversal (2002) (115)
- Fractal Merkle Tree Representation and Traversal (2003) (113)
- Node cooperation in hybrid ad hoc networks (2006) (111)
- What Instills Trust? A Qualitative Study of Phishing (2007) (110)
- Drive-By Pharming (2007) (109)
- Mutual Authentication for Low-Power Mobile Devices (2002) (106)
- Messin' with Texas Deriving Mother's Maiden Names Using Public Records (2005) (101)
- An optimally robust hybrid mix network (2001) (98)
- Timed Release of Standard Digital Signatures (2002) (93)
- Revokable and versatile electronic money (extended abstract) (1996) (92)
- Designing ethical phishing experiments (2007) (89)
- Making CAPTCHAs clickable (2008) (84)
- How to Forget a Secret (1999) (80)
- Discount Anonymous On Demand Routing for Mobile Ad hoc Networks (2006) (78)
- Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function (1997) (77)
- The Benefits of Understanding Passwords (2012) (74)
- Ripping Coins For a Fair Exchange (1995) (73)
- Crimeware: Understanding New Attacks and Defenses (2008) (72)
- How to turn loaded dice into fair coins (2000) (68)
- Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks (2004) (68)
- Stealth attacks on ad-hoc wireless networks (2003) (67)
- Phishing IQ Tests Measure Fear, Not Ability (2007) (67)
- Using Cartoons to Teach Internet Security (2008) (67)
- Invasive browser sniffing and countermeasures (2006) (67)
- Cache cookies for browser authentication (2006) (63)
- Mix-Based Electronic Payments (1998) (63)
- Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers (1996) (62)
- Curbing Junk E-Mail via Secure Classification (1998) (61)
- Blackmailing using Undeniable Signatures (1994) (60)
- Badvertisements: Stealthy Click-Fraud with Unwitting Accessories (2006) (60)
- Secure Server-Aided Signature Generation (2001) (60)
- Why and How to Perform Fraud Experiments (2008) (59)
- Towards Trustworthy Elections, New Directions in Electronic Voting (2010) (57)
- Combating Click Fraud via Premium Clicks (2007) (54)
- Love and authentication (2008) (51)
- Retroactive Detection of Malware with Applications to Mobile Platforms (2010) (50)
- Discouraging Software Piracy Using Software Aging (2001) (48)
- A practical secure physical random bit generator (1998) (47)
- Mind your SMSes: Mitigating social engineering in second factor authentication (2017) (46)
- Rethinking Passwords to Adapt to Constrained Keyboards (2011) (46)
- Designing and Conducting Phishing Experiments (2006) (45)
- Cryptographic Randomized Response Techniques (2003) (45)
- Phishing and Countermeasures (2006) (45)
- Scambaiter: Understanding Targeted Nigerian Scams on Craigslist (2014) (43)
- Distributed "Magic Ink" Signatures (1997) (42)
- Warkitting: The Drive-by Subversion of Wireless Home Routers (2006) (42)
- Scramble All, Encrypt Small (1999) (40)
- IntelliShopper: a proactive, personal, private shopping assistant (2002) (39)
- Secure and Lightweight Advertising on the Web (1999) (37)
- Reusable anonymous return channels (2003) (36)
- Privacy-preserving global customization (2000) (35)
- Distributed Phishing Attacks (2005) (34)
- Reputation-based Wi-Fi deployment protocols and security analysis (2004) (33)
- Reputation-based Wi-Fi deployment (2005) (32)
- Practical and Secure Software-Based Attestation (2011) (32)
- Understanding Social Engineering Based Scams (2016) (28)
- Efficient attribute authentication with applications to ad hoc networks (2004) (28)
- Quantifying the security of preference-based authentication (2008) (28)
- Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware (2006) (26)
- Server-side detection of malware infection (2009) (25)
- Cryptographic Approaches to Provacy in Forensic DNA Databases (2000) (25)
- Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System (1997) (24)
- Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks (2007) (22)
- Efficient Oblivious Proofs of Correct Exponentiation (1999) (22)
- The Future of Authentication (2020) (20)
- Improved Magic Ink Signatures Using Hints (1999) (18)
- Delayed password disclosure (2007) (18)
- Electronic Payments: Where Do We Go from Here? (1999) (17)
- The Human Factor in (2007) (17)
- Stealth attacks in vehicular technologies (2004) (16)
- Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games (2007) (16)
- Introduction to Phishing (2006) (15)
- Proprietary Certificates (2002) (14)
- Delayed password disclosure (2007) (14)
- Crimeware: Understanding New Attacks and Defenses (Symantec Press) (2008) (14)
- X-Cash: Executable Digital Cash (1998) (14)
- Mix and Match: Secure Function Evaluation via Ciphertexts (Extended Abstract) (2000) (13)
- Specifying Patterns for Mobile Application Domain Using General Architectural Components (2005) (13)
- Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service (2003) (12)
- Addition of ElGamal Plaintexts (2000) (12)
- On Assurance Structures for WWW Commerce (1998) (12)
- Two-factor inauthentication – the rise in SMS phishing attacks (2018) (12)
- Security of Discrete Log Cryptosystems in the Random Oracle and the Generic Model (2005) (12)
- Deterring voluntary trace disclosure in re-encryption mix networks (2006) (12)
- Fuelling WiFi deployment: A reputation-based solution (2004) (11)
- Phishing Attacks: Information Flow and Chokepoints (2006) (11)
- Mini-Cash: A Minimalistic Approach to E-Commerce (1999) (11)
- Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities (2019) (10)
- Threshold password-authenticated key exchange: (Extended abstract) (2002) (10)
- How to Protect Against a Militant Spammer (2003) (10)
- Active Cookies for Browser Authentication (2007) (10)
- Traditional Countermeasures to Unwanted Email (2016) (9)
- Auditable Privacy: On Tamper-Evident Mix Networks (2006) (9)
- Assured Detection of Malware With Applications to Mobile Platforms (2010) (8)
- Privacy-Preserving History Mining for Web Browsers (2008) (8)
- Secure Mobile Gambling (2001) (7)
- Could you fall for a scam? Spam filters are passe. What we need is software that unmasks fraudsters (2016) (7)
- The Threat of Political Phishing (2008) (7)
- Your Password is Your New PIN (2013) (7)
- SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention (2012) (7)
- An Optimally Robust Hybrid Mix Network ( Extended Abstract ) (2001) (6)
- Captcha-free throttling (2009) (6)
- Secure Remote Attestation (2018) (6)
- Authentication - Are We Doing Well Enough? [Guest Editors' Introduction] (2012) (5)
- Mobile Malware : Why the Traditional AV Paradigm is Doomed , and How to Use Physics to Detect Undesirable Routines (2013) (5)
- Why Mobile Security is not Like Traditional Security (2010) (5)
- Bootstrapping Mobile PINs Using Passwords (2011) (5)
- Helping You Protect You (2014) (5)
- User trust assessment: a new approach to combat deception (2016) (5)
- The Rising Threat of Launchpad Attacks (2019) (5)
- Theft-Protected Proprietary Certificates (2002) (4)
- Improved Visual Preference Authentication (2012) (4)
- Predicting Trends (2016) (4)
- Mobile Authentication (2013) (4)
- Applied cryptography and network security : second International Conference, ACNS 2004, Yellow Mountain, China, June, 8-11, 2004 : proceedings (2004) (4)
- The Death of the Internet: Jakobsson/Death of the Internet (2012) (4)
- About People (1972) (4)
- The Death of the Internet (2012) (4)
- Making Takedown Difficult (2006) (4)
- Mobile Authentication: Problems and Solutions (2012) (3)
- Stimulating cooperation in ad hoc and multi-hop cellular networks (2003) (3)
- Solutions to the Problem (2012) (3)
- The Case for Replacing Passwords with Biometrics (2012) (3)
- Incentive Mechanisms in Multi-Hop Wireless Networks (2003) (3)
- Microsoft's Anti-Phishing Technologies and Tactics (2006) (3)
- Financial Instruments in Recommendation Mechanisms (2002) (3)
- Persuasion in Scams (2016) (3)
- Privacy-Preserving Polling using Playing Cards (2005) (3)
- Case Study: Romance Scams (2016) (3)
- Hand authentication on multi-touch tablets (2014) (3)
- Reducing Costs in Identification Protocols (1992) (3)
- Quantifying Security in Hybrid Cellular Networks (2005) (3)
- A Chat at the Old Phishin' Hole (2005) (3)
- Can Biometrics Replace Passwords (2013) (2)
- Authentication — Are We Doing Well Enough ? (2)
- Spoofing and Countermeasures (2006) (2)
- Designing Phishing Experiments (2007) (2)
- How Vulnerable Are We To Scams ? (2015) (2)
- Case Study: Business Email Compromise (2016) (2)
- Social Engineering Resistant 2FA (2020) (2)
- Cooperation in Multi-hop Cellular Networks (2003) (2)
- Machine-generated music with themes (1992) (2)
- Identifying Scams and Trends (2016) (2)
- Scams and Targeting (2016) (2)
- Conclusion and Next Steps (2016) (2)
- How Criminals Profit (2012) (1)
- Liability for Phishing (2006) (1)
- A Framework for Analysis Attackers’ Accounts (2020) (1)
- Privacy-Preserving Global Customization ( Extended Abstract ) (2000) (1)
- How to Wear Your Password (2014) (1)
- Stealth Attacks on Vehicular Wireless Networks ( Invited Paper ) (1)
- Adding Context to Phishing Attacks: Spear Phishing (2006) (1)
- Web 2 . 0 Security Position Paper : “ JavaScript Breaks Free ” (2007) (1)
- Status Quo Security Tools (2006) (1)
- Case Study: Rental Scams (2016) (1)
- Timed Release of Standard Digital Signatures Extended Abstract (2003) (1)
- Pharming and Client Side Attacks (2006) (1)
- Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems (2006) (1)
- Biometrics and Authentication (2006) (1)
- Remote Harm-Diagnostics (2006) (1)
- How things Work and Fail (2012) (0)
- Case Study: Sales Scams (2016) (0)
- Jeu de Paume : A Security Suite for Handheld Devices (2013) (0)
- Protecting Browser State (2006) (0)
- Real-World Phishing Experiments: A Case Study (2006) (0)
- Mutual Authentication and Trusted Pathways (2006) (0)
- Short Paper: Addressing Sophisticated Email Attacks (2017) (0)
- Breaking and fixing content-based filtering (2017) (0)
- The Mobile Problem (2012) (0)
- Chapter e49 – Identity Theft (2013) (0)
- What Could Kill the Internet? And so What? (2012) (0)
- WhyandhowtoPerform Fraude xperiments (2008) (0)
- Using S/MIME (2006) (0)
- Untraceable Email Cluster Bombs (2003) (0)
- Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 (2005) (0)
- Chapter 49 – Identity Theft (2013) (0)
- Chapter e59 – Identity Theft (2013) (0)
- The Internet and the Physical World (2012) (0)
- Session details: Secure wireless protocols (2003) (0)
- Cooperation in Multi-hop Cellular Networks with Extended Security Analysis 1 ∗ (2003) (0)
- Proving Without Knowing: (2002) (0)
- Semantic Analysis of Messages (2016) (0)
- Seeing the Future (2020) (0)
- Experimental Evaluation of Attacks and Countermeasures (2006) (0)
- Legacy Servers: Teaching Old Dogs New Tricks (2013) (0)
- Understanding Click Fraud (2007) (0)
- Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004 (2004) (0)
- Liar Buyer Fraud, and How to Curb It (2015) (0)
- A DIGITAL CONTENT MEDIATOR ( DCM ) APPROACH TO IMPLEMENTING LEGITIMATE AND SECURE P 2 P ONLINE TRANSACTIONS (2005) (0)
- Discouraging Counterfeiting (2020) (0)
- Phishing – What to Expect Next (2006) (0)
- Web Forms and Untraceable DDoS Attacks (2010) (0)
- How to Kill Spoofing (2013) (0)
- An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions (2006) (0)
- Obfuscation in Spam and Scam (2016) (0)
- X-Cash : Exe utable Digital Cash (2007) (0)
- Privacy and Tracking (2020) (0)
- Environmentally and Politically Conscious Crypto (2020) (0)
- Permissions and Privacy (2020) (0)
- Proprietary Certificates ( Extended Abstract ) (2005) (0)
- Efficient Constructions for One-way Hash Chains 1 (2006) (0)
- Thinking about Solutions (2012) (0)
- Like Passwords: But Faster, Easier and More Secure (2013) (0)
- Publicly Verifiable Proofs of Space (2018) (0)
- Security, Privacy and User Interaction (2020) (0)
This paper list is powered by the following services:
Other Resources About Markus Jakobsson
What Schools Are Affiliated With Markus Jakobsson?
Markus Jakobsson is affiliated with the following schools: