Mike Burmester
Cited by
Cited by
A secure and efficient conference key distribution system
M Burmester, Y Desmedt
Workshop on the Theory and Application of of Cryptographic Techniques, 275-286, 1994
Proving program termination
B Cook, A Podelski, A Rybalchenko
Communications of the ACM 54 (5), 88-98, 2011
Universally composable and forward-secure RFID authentication and authenticated key exchange
T Van Le, M Burmester, B De Medeiros
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
A secure and scalable group key exchange system
M Burmester, Y Desmedt
Information Processing Letters 94 (3), 137-143, 2005
Secure transactions with mobile agents in hostile environments
P Kotzanikolaou, M Burmester, V Chrissikopoulos
Australasian Conference on Information Security and Privacy, 289-297, 2000
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
M Burmester, T Van Le, B de Medeiros
2006 SecureComm and workshops, 1-9, 2006
Efficient and secure conference-key distribution
M Burmester, YG Desmedt
International Workshop on Security Protocols, 119-129, 1996
Provably secure grouping-proofs for RFID tags
M Burmester, B De Medeiros, R Motta
International Conference on Smart Card Research and Advanced Applications …, 2008
On the risk of opening distributed keys
M Burmester
Annual International Cryptology Conference, 308-317, 1994
Cooperation in mobile ad hoc networks
J Hu, M Burmester
Guide to Wireless Ad Hoc Networks, 43-57, 2009
Receipt-freeness in large-scale elections without untappable channels
E Magkos, M Burmester, V Chrissikopoulos
Towards The E-Society, 683-693, 2001
Secure anonymous RFID authentication protocols
C Chatmon, T van Le, M Burmester
Technical Report TR-060112, Florida State University, Department of Computer …, 2006
Modeling security in cyber–physical systems
M Burmester, E Magkos, V Chrissikopoulos
International journal of critical infrastructure protection 5 (3-4), 118-126, 2012
A structured ElGamal-type multisignature scheme
M Burmester, Y Desmedt, H Doi, M Mambo, E Okamoto, M Tada, ...
International Workshop on Public Key Cryptography, 466-483, 2000
Universally composable RFID identification and authentication protocols
M Burmester, T Van Le, B De Medeiros, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 12 (4), 1-33, 2009
Towards secure and practical e-elections in the new era
M Burmester, E Magkos
Secure electronic voting, 63-76, 2003
SoftWater: Software-defined networking for next-generation underwater communication systems
IF Akyildiz, P Wang, SC Lin
Ad Hoc Networks 46, 1-11, 2016
LARS: a locally aware reputation system for mobile ad hoc networks
J Hu, M Burmester
Proceedings of the 44th annual Southeast regional conference, 119-123, 2006
Optimal movement of mobile sensors for barrier coverage of a planar region
B Bhattacharya, M Burmester, Y Hu, E Kranakis, Q Shi, A Wiese
Theoretical Computer Science 410 (52), 5515-5528, 2009
Robust, anonymous RFID authentication with constant key-lookup
M Burmester, B De Medeiros, R Motta
Proceedings of the 2008 ACM Symposium on information, Computer and …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20