Rainer Böhme
TitleCited byYear
Bitcoin: Economics, technology, and governance
R Böhme, N Christin, B Edelman, T Moore
Journal of Economic Perspectives 29 (2), 213-38, 2015
7842015
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
4802013
The'Dresden Image Database'for benchmarking digital image forensics
T Gloe, R Böhme
Proceedings of the 2010 ACM Symposium on Applied Computing, 1584-1590, 2010
4082010
An inquiry into money laundering tools in the Bitcoin ecosystem
M Möser, R Böhme, D Breuker
2013 APWG eCrime Researchers Summit, 1-14, 2013
2212013
Can we trust digital image forensics?
T Gloe, M Kirchner, A Winkler, R Böhme
Proceedings of the 15th ACM international conference on Multimedia, 78-86, 2007
2102007
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2092013
Revisiting weighted stego-image steganalysis
AD Ker, R Böhme
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
1972008
Modeling Cyber-Insurance: Towards a Unifying Framework.
R Böhme, G Schwartz
WEIS, 2010
1762010
Exploiting preserved statistics for steganalysis
R Böhme, A Westfeld
International Workshop on Information Hiding, 82-96, 2004
1742004
Hiding traces of resampling in digital images
M Kirchner, R Bohme
IEEE Transactions on Information Forensics and Security 3 (4), 582-592, 2008
1692008
Models and Measures for Correlation in Cyber-Insurance.
R Böhme, G Kataria
WEIS, 2006
1512006
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
1312008
The challenges of personal data markets and privacy
S Spiekermann, A Acquisti, R Böhme, KL Hui
Electronic markets 25 (2), 161-167, 2015
1302015
Trained to accept?: a field experiment on consent dialogs
R Böhme, S Köpsell
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
1262010
Cyber-Insurance Revisited.
R Böhme
WEIS, 2005
1232005
Counter-forensics: Attacking image forensics
R Böhme, M Kirchner
Digital image forensics, 327-366, 2013
1222013
Breaking Cauchy model-based JPEG steganography with first order statistics
R Böhme, A Westfeld
European Symposium on Research in Computer Security, 125-140, 2004
1072004
Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency
J Becker, D Breuker, T Heide, J Holler, HP Rauer, R Böhme
The economics of information security and privacy, 135-156, 2013
932013
The iterated weakest link
R Bohme, T Moore
IEEE Security & Privacy 8 (1), 53-55, 2010
902010
Security metrics and security investment models
R Böhme
International Workshop on Security, 10-24, 2010
882010
The system can't perform the operation now. Try again later.
Articles 1–20