Rainer Böhme
Cited by
Cited by
Bitcoin: Economics, technology, and governance
R Böhme, N Christin, B Edelman, T Moore
Journal of economic Perspectives 29 (2), 213-38, 2015
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
The'Dresden Image Database'for benchmarking digital image forensics
T Gloe, R Böhme
Proceedings of the 2010 ACM Symposium on Applied Computing, 1584-1590, 2010
An inquiry into money laundering tools in the Bitcoin ecosystem
M Möser, R Böhme, D Breuker
2013 APWG eCrime researchers summit, 1-14, 2013
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
Can we trust digital image forensics?
T Gloe, M Kirchner, A Winkler, R Böhme
Proceedings of the 15th ACM international conference on Multimedia, 78-86, 2007
Revisiting weighted stego-image steganalysis
AD Ker, R Böhme
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
Modeling Cyber-Insurance: Towards a Unifying Framework.
R Böhme, G Schwartz
WEIS, 2010
Hiding traces of resampling in digital images
M Kirchner, R Bohme
IEEE Transactions on Information Forensics and Security 3 (4), 582-592, 2008
Exploiting preserved statistics for steganalysis
R Böhme, A Westfeld
International Workshop on Information Hiding, 82-96, 2004
The challenges of personal data markets and privacy
S Spiekermann, A Acquisti, R Böhme, KL Hui
Electronic markets 25 (2), 161-167, 2015
Models and Measures for Correlation in Cyber-Insurance.
R Böhme, G Kataria
WEIS 2, 3, 2006
Trained to accept? A field experiment on consent dialogs
R Böhme, S Köpsell
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
Counter-forensics: Attacking image forensics
R Böhme, M Kirchner
Digital image forensics, 327-366, 2013
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
Cyber-Insurance Revisited.
R Böhme
WEIS, 2005
Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency
J Becker, D Breuker, T Heide, J Holler, HP Rauer, R Böhme
The economics of information security and privacy, 135-156, 2013
Breaking Cauchy model-based JPEG steganography with first order statistics
R Böhme, A Westfeld
European Symposium on Research in Computer Security, 125-140, 2004
Security metrics and security investment models
R Böhme
International Workshop on Security, 10-24, 2010
The iterated weakest link
R Bohme, T Moore
IEEE Security & Privacy 8 (1), 53-55, 2010
The system can't perform the operation now. Try again later.
Articles 1–20