dblp.uni-trier.dewww.uni-trier.de

Mike Burmester

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
67EEMike Burmester, Breno de Medeiros: The Security of EPC Gen2 Compliant RFID Protocols. ACNS 2008: 490-506
66EEMike Burmester, Breno de Medeiros, Rossana Motta: Robust, anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291
65EEMike Burmester, Breno de Medeiros, Rossana Motta: Provably Secure Grouping-Proofs for RFID Tags. CARDIS 2008: 176-190
64EEGene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160
63EEMike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos: Strengthening Privacy Protection in VANETs. WiMob 2008: 508-513
62EEMike Burmester, Breno de Medeiros, Rossana Motta: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT 1(2): 79-90 (2008)
2007
61EETri Van Le, Mike Burmester, Breno de Medeiros: Universally composable and forward-secure RFID authentication and authenticated key exchange. ASIACCS 2007: 242-252
60EEYvo Desmedt, Tanja Lange, Mike Burmester: Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Financial Cryptography 2007: 104-118
59EEMike Burmester, Tri Van Le, Alec Yasinsac: Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Ad Hoc Networks 5(3): 313-323 (2007)
2006
58 Mike Burmester, Alec Yasinsac: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers Springer 2006
57EEMike Burmester, Tri Van Le, Breno de Medeiros: Towards Provable Security for Ubiquitous Applications. ACISP 2006: 295-312
56EEJiangyi Hu, Mike Burmester: LARS: a locally aware reputation system for mobile ad hoc networks. ACM Southeast Regional Conference 2006: 119-123
55EEYvo Desmedt, Yongge Wang, Mike Burmester: Revisiting Colored Networks and Privacy Preserving Censorship. CRITIS 2006: 140-150
54EEMike Burmester, Judie Mulholland: The advent of trusted computing: implications for digital forensics. SAC 2006: 283-287
2005
53EEYvo Desmedt, Yongge Wang, Mike Burmester: A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. ISAAC 2005: 277-287
52EEMike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng: Panel: Authentication in Constrained Environments. MADNES 2005: 186-191
51EESudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland: Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. SADFE 2005: 195-205
50EEMike Burmester, Breno de Medeiros, Alec Yasinsac: Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 228-237
49EEMike Burmester: Group Key Agreement. Encyclopedia of Cryptography and Security 2005
48EEAlec Yasinsac, Mike Burmester: Centers of Academic Excellence: A Case Study. IEEE Security & Privacy 3(1): 62-65 (2005)
47EEMike Burmester, Yvo Desmedt: A secure and scalable Group Key Exchange system. Inf. Process. Lett. 94(3): 137-143 (2005)
2004
46EEMike Burmester, Tri Van Le, Alec Yasinsac: Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. ADHOC-NOW 2004: 96-107
45EEMike Burmester, Tri Van Le: Secure Multipath Communication in Mobile Ad hoc Networks. ITCC (2) 2004: 405-409
44 Yvo Desmedt, Mike Burmester: Identity-based Key Infrastructures (IKI). SEC 2004: 167-176
43EEMike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95
42EEMike Burmester, Yvo Desmedt: Is hierarchical public-key certification the next target for hackers? Commun. ACM 47(8): 68-74 (2004)
41EEMike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos: Uncoercible e-Bidding Games. Electronic Commerce Research 4(1-2): 113-125 (2004)
2003
40EETri Van Le, Mike Burmester, Jiangyi Hu: Short c-Secure Fingerprinting Codes. ISC 2003: 422-427
39EEMike Burmester, Alec Yasinsac: Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Security Protocols Workshop 2003: 274-282
2001
38 Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos: Dynamic Multi-signatures for Secure Autonomous Agents. DEXA Workshop 2001: 587-591
37 Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos: Receipt-Freeness in Large-Scale Elections without Untappable Channels. I3E 2001: 683-694
36EEYvo Desmedt, Mike Burmester, Jennifer Seberry: Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Public Key Cryptography 2001: 277-286
35 Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos: Strong Forward Security. SEC 2001: 109-122
2000
34 Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos: Secure Transactions with Mobile Agents in Hostile Environments. ACISP 2000: 289-297
33EECarlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann: Which PKI (public key infrastructure) is the right one? (panel session). ACM Conference on Computer and Communications Security 2000: 98-101
32EEEmmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos: An Equitably Fair On-line Auction Scheme. EC-Web 2000: 72-83
31 Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji: A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
30 Yongge Wang, Yvo Desmedt, Mike Burmester: Models For Dependable Computation with Multiple Inputs and Some Hardness Results. Fundam. Inform. 42(1): 61-73 (2000)
29EENikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt: Secure linking of customers, merchants and banks in electronic commerce. Future Generation Comp. Syst. 16(4): 393-401 (2000)
28EEAmos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz: Computing Functions of a Shared Secret. SIAM J. Discrete Math. 13(3): 324-345 (2000)
1999
27 Mike Burmester, Yvo Desmedt: Secure Communication in an Unknown Network Using Certificates. ASIACRYPT 1999: 274-287
26EESimon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith: Weaknesses in Shared RSA Key Generation Protocols. IMA Int. Conf. 1999: 300-306
25EEMike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999)
1998
24EEMike Burmester, Yvo Desmedt, Jennifer Seberry: Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ASIACRYPT 1998: 380-391
23EEKaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester: Some Bounds and a Construction for Secure Broadcast Encryption. ASIACRYPT 1998: 420-433
22EEMike Burmester, Yvo Desmedt, Yongge Wang: Using Approximation Hardness to Achieve Dependable Computation. RANDOM 1998: 172-186
1997
21 Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme. Des. Codes Cryptography 12(1): 13-37 (1997)
1996
20EESimon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild: Efficient Multiplicative Sharing Schemes. EUROCRYPT 1996: 107-118
19EEMike Burmester: Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. EUROCRYPT 1996: 96-106
18 Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168
17 Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, D. Peppes: Efficient and provably secure key agreement. SEC 1996: 227-236
16 Mike Burmester, Yvo Desmedt: Efficient and Secure Conference-Key Distribution. Security Protocols Workshop 1996: 119-129
1994
15 Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester: Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. ASIACRYPT 1994: 21-32
14EEMike Burmester: On the Risk of Opening Distributed Keys. CRYPTO 1994: 308-317
13EEMike Burmester, Yvo Desmedt: A Secure and Efficient Conference Key Distribution System (Extended Abstract). EUROCRYPT 1994: 275-286
1993
12EEYvo Desmedt, Mike Burmester: Towards Practical ``Proven Secure'' Authenticated Key Distribution. ACM Conference on Computer and Communications Security 1993: 228-231
11EEMike Burmester: Cryptoanalysis of the Chang-Wu-Chen Key Distribution System. EUROCRYPT 1993: 440-442
1992
10EEYair Frankel, Yvo Desmedt, Mike Burmester: Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). CRYPTO 1992: 549-557
9 Mike Burmester, Yvo Desmedt: Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. IFIP Congress (2) 1992: 479-485
8 Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos: An Efficient Public Key Distribution System. IFIP Congress (2) 1992: 532-539
7 Mike Burmester, Yvo Desmedt, Thomas Beth: Efficient Zero-Knowledge Identification Schemes for Smart Cards. Comput. J. 35(1): 21-29 (1992)
6 Mike Burmester: An Almost-Constant Round Interactive Zero-Knowledge Proof. Inf. Process. Lett. 42(2): 81-87 (1992)
1991
5 Yvo Desmedt, Mike Burmester: An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. ASIACRYPT 1991: 360-367
4EEMike Burmester, Yvo Desmedt: Broadcast Interactive Proofs (Extended Abstract). EUROCRYPT 1991: 81-95
1990
3EEMike Burmester: Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. EUROCRYPT 1990: 1-10
2EEMike Burmester: A Remark on the Efficiency of Identification Schemes. EUROCRYPT 1990: 493-495
1989
1EEMike Burmester, Yvo Desmedt, Fred Piper, Michael Walker: A General Zero-Knowledge Scheme (Extended Abstract). EUROCRYPT 1989: 122-133

Coauthor Index

1Carlisle M. Adams (Carlisle Adams) [33]
2Sudhir Aggarwal [51]
3Nikos Alexandris (Nikolaos Alexandris) [8] [17] [29]
4Amos Beimel [28]
5Thomas Beth [7]
6Simon R. Blackburn [20] [26]
7Simon Blake-Wilson [26]
8Vassilios Chrissikopoulos [8] [17] [29] [32] [34] [35] [37] [38] [41] [63]
9Giovanni Di Crescenzo [15]
10Yvo Desmedt [1] [4] [5] [7] [9] [10] [12] [13] [15] [16] [18] [20] [21] [22] [23] [24] [25] [27] [28] [29] [30] [31] [33] [36] [42] [43] [44] [47] [53] [55] [60]
11Hiroshi Doi [31]
12Yair Frankel [10]
13Steven D. Galbraith [26]
14Virgil D. Gligor [52]
15Peter Henry [51]
16Jiangyi Hu [40] [56]
17Toshiya Itoh [18] [25]
18Ari Juels [64]
19Leo Kermes [51]
20Alfred Kobsa [64]
21Panayiotis Kotzanikolaou [34] [35] [38]
22Evangelos Kranakis [52]
23Kaoru Kurosawa [23]
24Eyal Kushilevitz [28]
25Tanja Lange [60]
26Tri Van Le [40] [45] [46] [57] [59] [61]
27Emmanouil Magkos [32] [35] [37] [41] [63]
28Masahiro Mambo [31]
29Breno de Medeiros [50] [57] [61] [62] [65] [66] [67]
30David Molnar [64]
31Rossana Motta [62] [65] [66]
32Judie Mulholland [51] [54]
33Eiji Okamoto [31]
34D. Peppes [17]
35Roberto Di Pietro [64]
36Fred Piper [1] [21]
37Michael K. Reiter [33]
38Melanie R. Rieback [64]
39Kouichi Sakurai [18] [25]
40Jennifer Seberry (Jennifer Seberry Wallis) [24] [36]
41Hiroki Shizuya [18] [25]
42Mitsuru Tada [31]
43Gene Tsudik [64]
44J. Doug Tygar (J. D. Tygar) [52]
45Michael Walker [1] [21]
46Yongge Wang [22] [30] [53] [55]
47Peter R. Wild [20]
48Rebecca N. Wright [43]
49Alec Yasinsac [39] [43] [46] [48] [50] [58] [59]
50Takuya Yoshida [23]
51Yuko Yoshifuji [31]
52Moti Yung (Mordechai M. Yung) [18]
53Yuliang Zheng [52]
54Philip Zimmermann [33]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)