Rainer Böhme
TitleCited byYear
Bitcoin: Economics, technology, and governance
R Böhme, N Christin, B Edelman, T Moore
Journal of economic Perspectives 29 (2), 213-38, 2015
8182015
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
4872013
The dresden image database for benchmarking digital image forensics
T Gloe, R Böhme
Journal of Digital Forensic Practice 3 (2-4), 150-159, 2010
4102010
An inquiry into money laundering tools in the Bitcoin ecosystem
M Möser, R Böhme, D Breuker
2013 APWG eCrime Researchers Summit, 1-14, 2013
2302013
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2112013
Can we trust digital image forensics?
T Gloe, M Kirchner, A Winkler, R Böhme
Proceedings of the 15th ACM international conference on Multimedia, 78-86, 2007
2112007
Revisiting weighted stego-image steganalysis
AD Ker, R Böhme
Security, Forensics, Steganography, and Watermarking of Multimedia Contents …, 2008
2032008
Modeling Cyber-Insurance: Towards a Unifying Framework.
R Böhme, G Schwartz
WEIS, 2010
1842010
Exploiting preserved statistics for steganalysis
R Böhme, A Westfeld
International Workshop on Information Hiding, 82-96, 2004
1752004
Hiding traces of resampling in digital images
M Kirchner, R Bohme
IEEE Transactions on Information Forensics and Security 3 (4), 582-592, 2008
1722008
Models and Measures for Correlation in Cyber-Insurance.
R Böhme, G Kataria
WEIS, 2006
1512006
The challenges of personal data markets and privacy
S Spiekermann, A Acquisti, R Böhme, KL Hui
Electronic markets 25 (2), 161-167, 2015
1412015
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
1322008
Trained to accept? A field experiment on consent dialogs
R Böhme, S Köpsell
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
1242010
Cyber-Insurance Revisited.
R Böhme
WEIS, 2005
1242005
Counter-forensics: Attacking image forensics
R Böhme, M Kirchner
Digital image forensics, 327-366, 2013
1222013
Breaking Cauchy model-based JPEG steganography with first order statistics
R Böhme, A Westfeld
European Symposium on Research in Computer Security, 125-140, 2004
1082004
Can we afford integrity by proof-of-work? Scenarios inspired by the Bitcoin currency
J Becker, D Breuker, T Heide, J Holler, HP Rauer, R Böhme
The economics of information security and privacy, 135-156, 2013
972013
Security metrics and security investment models
R Böhme
International Workshop on Security, 10-24, 2010
902010
The iterated weakest link
R Bohme, T Moore
IEEE Security & Privacy 8 (1), 53-55, 2010
902010
The system can't perform the operation now. Try again later.
Articles 1–20