2008 | ||
---|---|---|
67 | EE | Mike Burmester, Breno de Medeiros: The Security of EPC Gen2 Compliant RFID Protocols. ACNS 2008: 490-506 |
66 | EE | Mike Burmester, Breno de Medeiros, Rossana Motta: Robust, anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291 |
65 | EE | Mike Burmester, Breno de Medeiros, Rossana Motta: Provably Secure Grouping-Proofs for RFID Tags. CARDIS 2008: 176-190 |
64 | EE | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 |
63 | EE | Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos: Strengthening Privacy Protection in VANETs. WiMob 2008: 508-513 |
62 | EE | Mike Burmester, Breno de Medeiros, Rossana Motta: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT 1(2): 79-90 (2008) |
2007 | ||
61 | EE | Tri Van Le, Mike Burmester, Breno de Medeiros: Universally composable and forward-secure RFID authentication and authenticated key exchange. ASIACCS 2007: 242-252 |
60 | EE | Yvo Desmedt, Tanja Lange, Mike Burmester: Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Financial Cryptography 2007: 104-118 |
59 | EE | Mike Burmester, Tri Van Le, Alec Yasinsac: Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Ad Hoc Networks 5(3): 313-323 (2007) |
2006 | ||
58 | Mike Burmester, Alec Yasinsac: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers Springer 2006 | |
57 | EE | Mike Burmester, Tri Van Le, Breno de Medeiros: Towards Provable Security for Ubiquitous Applications. ACISP 2006: 295-312 |
56 | EE | Jiangyi Hu, Mike Burmester: LARS: a locally aware reputation system for mobile ad hoc networks. ACM Southeast Regional Conference 2006: 119-123 |
55 | EE | Yvo Desmedt, Yongge Wang, Mike Burmester: Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150 |
54 | EE | Mike Burmester, Judie Mulholland: The advent of trusted computing: implications for digital forensics. SAC 2006: 283-287 |
2005 | ||
53 | EE | Yvo Desmedt, Yongge Wang, Mike Burmester: A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287 |
52 | EE | Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191 |
51 | EE | Sudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland: Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. SADFE 2005: 195-205 |
50 | EE | Mike Burmester, Breno de Medeiros, Alec Yasinsac: Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 228-237 |
49 | EE | Mike Burmester: Group Key Agreement. Encyclopedia of Cryptography and Security 2005 |
48 | EE | Alec Yasinsac, Mike Burmester: Centers of Academic Excellence: A Case Study. IEEE Security & Privacy 3(1): 62-65 (2005) |
47 | EE | Mike Burmester, Yvo Desmedt: A secure and scalable Group Key Exchange system. Inf. Process. Lett. 94(3): 137-143 (2005) |
2004 | ||
46 | EE | Mike Burmester, Tri Van Le, Alec Yasinsac: Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. ADHOC-NOW 2004: 96-107 |
45 | EE | Mike Burmester, Tri Van Le: Secure Multipath Communication in Mobile Ad hoc Networks. ITCC (2) 2004: 405-409 |
44 | Yvo Desmedt, Mike Burmester: Identity-based Key Infrastructures (IKI). SEC 2004: 167-176 | |
43 | EE | Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95 |
42 | EE | Mike Burmester, Yvo Desmedt: Is hierarchical public-key certification the next target for hackers? Commun. ACM 47(8): 68-74 (2004) |
41 | EE | Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos: Uncoercible e-Bidding Games. Electronic Commerce Research 4(1-2): 113-125 (2004) |
2003 | ||
40 | EE | Tri Van Le, Mike Burmester, Jiangyi Hu: Short c-Secure Fingerprinting Codes. ISC 2003: 422-427 |
39 | EE | Mike Burmester, Alec Yasinsac: Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Security Protocols Workshop 2003: 274-282 |
2001 | ||
38 | Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos: Dynamic Multi-signatures for Secure Autonomous Agents. DEXA Workshop 2001: 587-591 | |
37 | Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos: Receipt-Freeness in Large-Scale Elections without Untappable Channels. I3E 2001: 683-694 | |
36 | EE | Yvo Desmedt, Mike Burmester, Jennifer Seberry: Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286 |
35 | Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos: Strong Forward Security. SEC 2001: 109-122 | |
2000 | ||
34 | Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos: Secure Transactions with Mobile Agents in Hostile Environments. ACISP 2000: 289-297 | |
33 | EE | Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101 |
32 | EE | Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos: An Equitably Fair On-line Auction Scheme. EC-Web 2000: 72-83 |
31 | Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483 | |
30 | Yongge Wang, Yvo Desmedt, Mike Burmester: Models For Dependable Computation with Multiple Inputs and Some Hardness Results. Fundam. Inform. 42(1): 61-73 (2000) | |
29 | EE | Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt: Secure linking of customers, merchants and banks in electronic commerce. Future Generation Comp. Syst. 16(4): 393-401 (2000) |
28 | EE | Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz: Computing Functions of a Shared Secret. SIAM J. Discrete Math. 13(3): 324-345 (2000) |
1999 | ||
27 | Mike Burmester, Yvo Desmedt: Secure Communication in an Unknown Network Using Certificates. ASIACRYPT 1999: 274-287 | |
26 | EE | Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith: Weaknesses in Shared RSA Key Generation Protocols. IMA Int. Conf. 1999: 300-306 |
25 | EE | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999) |
1998 | ||
24 | EE | Mike Burmester, Yvo Desmedt, Jennifer Seberry: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391 |
23 | EE | Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester: Some Bounds and a Construction for Secure Broadcast Encryption. ASIACRYPT 1998: 420-433 |
22 | EE | Mike Burmester, Yvo Desmedt, Yongge Wang: Using Approximation Hardness to Achieve Dependable Computation. RANDOM 1998: 172-186 |
1997 | ||
21 | Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme. Des. Codes Cryptography 12(1): 13-37 (1997) | |
1996 | ||
20 | EE | Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild: Efficient Multiplicative Sharing Schemes. EUROCRYPT 1996: 107-118 |
19 | EE | Mike Burmester: Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. EUROCRYPT 1996: 96-106 |
18 | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168 | |
17 | Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, D. Peppes: Efficient and provably secure key agreement. SEC 1996: 227-236 | |
16 | Mike Burmester, Yvo Desmedt: Efficient and Secure Conference-Key Distribution. Security Protocols Workshop 1996: 119-129 | |
1994 | ||
15 | Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester: Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. ASIACRYPT 1994: 21-32 | |
14 | EE | Mike Burmester: On the Risk of Opening Distributed Keys. CRYPTO 1994: 308-317 |
13 | EE | Mike Burmester, Yvo Desmedt: A Secure and Efficient Conference Key Distribution System (Extended Abstract). EUROCRYPT 1994: 275-286 |
1993 | ||
12 | EE | Yvo Desmedt, Mike Burmester: Towards Practical ``Proven Secure'' Authenticated Key Distribution. ACM Conference on Computer and Communications Security 1993: 228-231 |
11 | EE | Mike Burmester: Cryptoanalysis of the Chang-Wu-Chen Key Distribution System. EUROCRYPT 1993: 440-442 |
1992 | ||
10 | EE | Yair Frankel, Yvo Desmedt, Mike Burmester: Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). CRYPTO 1992: 549-557 |
9 | Mike Burmester, Yvo Desmedt: Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. IFIP Congress (2) 1992: 479-485 | |
8 | Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos: An Efficient Public Key Distribution System. IFIP Congress (2) 1992: 532-539 | |
7 | Mike Burmester, Yvo Desmedt, Thomas Beth: Efficient Zero-Knowledge Identification Schemes for Smart Cards. Comput. J. 35(1): 21-29 (1992) | |
6 | Mike Burmester: An Almost-Constant Round Interactive Zero-Knowledge Proof. Inf. Process. Lett. 42(2): 81-87 (1992) | |
1991 | ||
5 | Yvo Desmedt, Mike Burmester: An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. ASIACRYPT 1991: 360-367 | |
4 | EE | Mike Burmester, Yvo Desmedt: Broadcast Interactive Proofs (Extended Abstract). EUROCRYPT 1991: 81-95 |
1990 | ||
3 | EE | Mike Burmester: Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. EUROCRYPT 1990: 1-10 |
2 | EE | Mike Burmester: A Remark on the Efficiency of Identification Schemes. EUROCRYPT 1990: 493-495 |
1989 | ||
1 | EE | Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133 |