The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Mike Burmester" ( http://dblp.L3S.de/Authors/Mike_Burmester )

  Author page on DBLP  Author page in RDF  Community of Mike Burmester in ASPL-2

Publication years (Num. hits)
1989-1994 (15) 1996-2000 (20) 2001-2005 (22) 2006-2007 (15) 2008-2010 (15) 2011-2013 (16) 2014-2016 (16) 2017-2018 (7)
Publication types (Num. hits)
article(42) incollection(4) inproceedings(76) proceedings(4)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 47 occurrences of 38 keywords

Results
Found 127 publication records. Showing 126 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mike Burmester, Jorge Munilla, Andrés Ortiz Comments on "Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems". Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pino Caballero-Gil, Lilia Georgieva, Ljiljana Brankovic, Mike Burmester Ambient Assisted Living and Ambient Intelligence for Health. Search on Bibsonomy Mobile Information Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Panayiotis Kotzanikolaou, George Chatzisofroniou, Mike Burmester Broadcast anonymous routing (BAR): scalable real-time anonymous communication. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla, Andrés Ortiz, Pino Caballero-Gil An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jorge Munilla, Mike Burmester, Alberto Peinado, Guomin Yang, Willy Susilo RFID Ownership Transfer with Positive Secrecy Capacity Channels. Search on Bibsonomy Sensors The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Néstor Álvarez-Díaz, Pino Caballero-Gil, Mike Burmester A Luggage Control System Based on NFC and Homomorphic Cryptography. Search on Bibsonomy Mobile Information Systems The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Performance Analysis of LDPC-Based RFID Group Coding. Search on Bibsonomy IEEE Trans. Automation Science and Engineering The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jorge Munilla, Mike Burmester, Alberto Peinado Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments. Search on Bibsonomy Computer Communications The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Tag Memory-Erasure Tradeoff of RFID Grouping Codes. Search on Bibsonomy IEEE Communications Letters The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla An anonymous RFID grouping-proof with missing tag identification. Search on Bibsonomy IEEE RFID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Mike Burmester, Xiuwen Liu, Shashanka Surya Timmarajus Demystifying Insider Threat: Language-Action Cues in Group Dynamics. Search on Bibsonomy HICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Muye Liu, Shashank aSurya Timmarajus, Mike Burmester Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues. Search on Bibsonomy HICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1W. Owen Redwood, Jason Reynolds, Mike Burmester Integrating Simulated Physics and Device Virtualization in Control System Testbeds. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Resilient Metro-scale Smart Structures: Challenges & Future Directions. Search on Bibsonomy IoTBD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carmelo R. García, Pino Caballero-Gil, Mike Burmester, Alexis Quesada-Arencibia (eds.) Ubiquitous Computing and Ambient Intelligence - 10th International Conference, UCAmI 2016, San Bartolomé de Tirajana, Gran Canaria, Spain, November 29 - December 2, 2016, Proceedings, Part II Search on Bibsonomy UCAmI (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carmelo R. García, Pino Caballero-Gil, Mike Burmester, Alexis Quesada-Arencibia (eds.) Ubiquitous Computing and Ambient Intelligence - 10th International Conference, UCAmI 2016, San Bartolomé de Tirajana, Gran Canaria, Spain, November 29 - December 2, 2016, Proceedings, Part I Search on Bibsonomy UCAmI (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Resilient Grouping Proofs with Missing Tag Identification. Search on Bibsonomy UCAmI (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. Search on Bibsonomy ISI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonathan Jenkins, Mike Burmester Runtime Integrity for Cyber-Physical Infrastructures. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1W. Owen Redwood, Joshua Lawrence, Mike Burmester A Symbolic Honeynet Framework for SCADA System Threat Intelligence. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Pre vs Post State Update: Trading Privacy for Availability in RFID. Search on Bibsonomy IEEE Wireless Commun. Letters The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jorge Munilla, Mike Burmester, Alberto Peinado Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Shuyuan Mary Ho, Shashanka Surya Timmarajus, Mike Burmester, Xiuwen Liu Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions. Search on Bibsonomy SBP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Distributed Group Authentication for RFID Supply Management. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems. Search on Bibsonomy ISCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Joshua Lawrence, David Guidry, Sean Easton, Sereyvathana Ty, Xiuwen Liu, Xin Yuan 0001, Jonathan Jenkins Towards a secure electricity grid. Search on Bibsonomy ISSNIP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mike Burmester A trusted computing architecture for critical infrastructure protection. Search on Bibsonomy IISA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan Jenkins, Sean Easton, David Guidry, Mike Burmester, Xiuwen Liu, Xin Yuan 0001, Joshua Lawrence, Sereyvathana Ty Trusted Group Key Management for Real-Time Critical Infrastructure Protection. Search on Bibsonomy MILCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonathan Jenkins, Mike Burmester Protecting Infrastructure Assets from Real-Time and Run-Time Threats. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos Modeling security in cyber-physical systems. Search on Bibsonomy IJCIP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester Chord-PKI: A distributed trust infrastructure based on P2P networks. Search on Bibsonomy Computer Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos Secure and privacy-preserving, timed vehicular communications. Search on Bibsonomy IJAHUC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Burmester Localization Privacy. Search on Bibsonomy Cryptography and Security The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Guidry, Mike Burmester, Xiuwen Liu, Jonathan Jenkins, Sean Easton, Xin Yuan 0001 A Trusted Computing Architecture for Secure Substation Automation. Search on Bibsonomy CRITIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Jorge Munilla Lightweight RFID authentication with forward and backward security. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Burmester Group Key Agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Burmester His Late Master's Voice (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Burmester His Late Master's Voice: Barking for Location Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic (eds.) Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1W. Owen Redwood, Mike Burmester Markov anomaly modeling for trust management in variable threat environments. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik Universally Composable RFID Identification and Authentication Protocols. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication and key-exchange protocols, universal composability, RFID security
1Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado Secure EPC Gen2 compliant Radio Frequency Identification. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Mike Burmester, Breno de Medeiros On the Security of Route Discovery in MANETs. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Binay K. Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, Andreas Wiese Optimal movement of mobile sensors for barrier coverage of a planar region. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado Secure EPC Gen2 Compliant Radio Frequency Identification. Search on Bibsonomy ADHOC-NOW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EPCGen2 compliance, security, identification, unlinkability
1Jiangyi Hu, Mike Burmester Cooperation in Mobile Ad Hoc Networks. Search on Bibsonomy Guide to Wireless Ad Hoc Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Reihaneh Safavi-Naini, Gelareh Taban Secure Random Key Pre-Distribution Against Semi-Honest Adversaries. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2008 DBLP  BibTeX  RDF
1Mike Burmester, Breno de Medeiros, Rossana Motta Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Search on Bibsonomy IJACT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos Strengthening Privacy Protection in VANETs. Search on Bibsonomy WiMob The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Breno de Medeiros, Rossana Motta Robust, anonymous RFID authentication with constant key-lookup. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure protocols, privacy, scalability, RFID, availability, unlinkability
1Binay K. Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, Andreas Wiese Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region. Search on Bibsonomy COCOA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Breno de Medeiros The Security of EPC Gen2 Compliant RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPCGen2 compliance, security, anonymity, unlinkability, forward secrecy
1Mike Burmester, Breno de Medeiros, Rossana Motta Provably Secure Grouping-Proofs for RFID Tags. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback RFID security and privacy: long-term research or short-term tinkering? Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Alec Yasinsac Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tri Van Le, Mike Burmester, Breno de Medeiros Forward-secure RFID Authentication and Key Exchange. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Mike Burmester, Breno de Medeiros Towards provable security for route discovery protocols in mobile ad hoc networks. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Mike Burmester, Breno de Medeiros, Rossana Motta Robust, Anonymous RFID Authentication with Constant Key-Lookup. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Tri Van Le, Mike Burmester, Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability
1Yvo Desmedt, Tanja Lange 0001, Mike Burmester Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange
1Yvo Desmedt, Tanja Lange 0001, Mike Burmester Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2006 DBLP  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2006 DBLP  BibTeX  RDF
1Tri Van Le, Mike Burmester, Breno de Medeiros Universally Composable and Forward Secure RFID Authentication and Key Exchange. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2006 DBLP  BibTeX  RDF
1Jiangyi Hu, Mike Burmester LARS: a locally aware reputation system for mobile ad hoc networks. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual currency schemes, MANET, trust, reputation systems, selfishness
1Yvo Desmedt, Yongge Wang, Mike Burmester Revisiting Colored Networks and Privacy Preserving Censorship. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros Towards Provable Security for Ubiquitous Applications. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Judie Mulholland The advent of trusted computing: implications for digital forensics. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF specifications, encryption, file systems, trusted computing, forensics, cybercrime, data recovery
1Mike Burmester, Alec Yasinsac (eds.) Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers Search on Bibsonomy MADNES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alec Yasinsac, Mike Burmester Centers of Academic Excellence: A Case Study. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Florida State University, scholarship programs
1Mike Burmester, Yvo Desmedt A secure and scalable Group Key Exchange system. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1K. Maneva-Jakimoska, Goce Jakimoski, Mike Burmester Threshold Ring Signatures Efficient for Large Sets of Signers. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2005 DBLP  BibTeX  RDF
1Mike Burmester, Peter Henry, Leo Kermes Tracking cyberstalkers: a cryptographic approach. Search on Bibsonomy SIGCAS Computers and Society The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Burmester Group Key Agreement. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Yongge Wang, Mike Burmester A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. Search on Bibsonomy ISAAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Breno de Medeiros, Alec Yasinsac Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng Panel: Authentication in Constrained Environments. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt Is hierarchical public-key certification the next target for hackers? Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos Uncoercible e-Bidding Games. Search on Bibsonomy Electronic Commerce Research The full citation details ... 2004 DBLP  DOI  BibTeX  RDF uncoercibility, e-bidding games, e-commerce, e-voting, e-auctions
1Mike Burmester, Tri Van Le, Alec Yasinsac Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac Accountable Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le Secure Multipath Communication in Mobile Ad hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Mike Burmester Identity-based Key Infrastructures (IKI). Search on Bibsonomy SEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Alec Yasinsac Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tri Van Le, Mike Burmester, Jiangyi Hu Short c-Secure Fingerprinting Codes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF collusion secure, Fingerprinting, copyright protection
1Mike Burmester, Emmanouil Magkos Towards Secure and Practical E-Elections in the New Era. Search on Bibsonomy Secure Electronic Voting The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos Receipt-Freeness in Large-Scale Elections without Untappable Channels. Search on Bibsonomy I3E The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt, Mike Burmester, Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data confiscation, key escrow, RIP
1Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos Strong Forward Security. Search on Bibsonomy SEC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos Dynamic Multi-signatures for Secure Autonomous Agents. Search on Bibsonomy DEXA Workshops The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt Secure linking of customers, merchants and banks in electronic commerce. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz Computing Functions of a Shared Secret. Search on Bibsonomy SIAM J. Discrete Math. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Yvo Desmedt, Mike Burmester Models For Dependable Computation with Multiple Inputs and Some Hardness Results. Search on Bibsonomy Fundam. Inform. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos Secure Transactions with Mobile Agents in Hostile Environments. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos An Equitably Fair On-line Auction Scheme. Search on Bibsonomy EC-Web The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji A Structured ElGamal-Type Multisignature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. Search on Bibsonomy J. Cryptology The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Divertibility, Subliminal-free, Cryptographic protocols, Identification, Zero-knowledge, Proof systems, Untraceability
1Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith Weaknesses in Shared RSA Key Generation Protocols. Search on Bibsonomy IMA Int. Conf. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 126 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license