Languages
          
        
        
      Jakobsson, Markus.
Overview
            | Works: | 6 works in 2 publications in 1 languages | |
|---|---|---|
Titles
          
                  
                    Security, Privacy and User Interaction
                  
                  by: 
                  SpringerLink (Online service); Jakobsson, Markus.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Mobile authentication = problems and solutions /
                  
                  by: 
                  Jakobsson, Markus.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Understanding Social Engineering Based Scams
                  
                  by: 
                  Jakobsson, Markus.; SpringerLink (Online service)
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Applied cryptography and network security = second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings /
                  
                  by: 
                  Workshop on the Preservation of Stability under Discretization ((2001 :); Yung, Moti.; Jakobsson, Markus.; Zhou, Jianying.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Understanding social engineering based scams
                  
                  by: 
                  SpringerLink (Online service); Jakobsson, Markus.
                  (Language materials, printed)
                  
                  
                
                
          Subjects
          
            
              
                Systems and Data Security.
              
            
              
                Biometrics.
              
            
              
                Data protection.
              
            
              
                Data Encryption.
              
            
              
                Cryptography
              
            
              
                Computer Communication Networks.
              
            
              
                Privacy.
              
            
              
                Information Systems Applications (incl. Internet).
              
            
              
                User Interfaces and Human Computer Interaction.
              
            
              
                Fraud.
              
            
              
                Telecommunication
              
            
              
                Data encryption (Computer science)
              
            
              
                Computer Science.
              
            
              
                Computer security.
              
            
              
                Information Systems Applications (incl. Internet)
              
            
              
                Spam (Electronic mail)
              
            
              
                Application software.
              
            
              
                User interfaces (Computer systems).
              
            
              
                Computer crimes.
              
            
              
                Data Structures, Cryptology and Information Theory.
              
            
              
                Data encryption (Computer science).
              
            
              
                Cryptology.
              
            
              
                Computer Crime.