Search the dblp DataBase
Mike Burmester :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jiangyi Hu , Mike Burmester LARS: a locally aware reputation system for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 2006, pp:119-123 [Conf ] Mike Burmester , Tri Van Le , Breno de Medeiros Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:295-312 [Conf ] Panayiotis Kotzanikolaou , Mike Burmester , Vassilios Chrissikopoulos Secure Transactions with Mobile Agents in Hostile Environments. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:289-297 [Conf ] Mike Burmester , Tri Van Le , Alec Yasinsac Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2004, pp:96-107 [Conf ] Mike Burmester , Yvo Desmedt Secure Communication in an Unknown Network Using Certificates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:274-287 [Conf ] Mike Burmester , Yvo Desmedt , Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:380-391 [Conf ] Yvo Desmedt , Mike Burmester An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:360-367 [Conf ] Yvo Desmedt , Giovanni Di Crescenzo , Mike Burmester Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:21-32 [Conf ] Kaoru Kurosawa , Takuya Yoshida , Yvo Desmedt , Mike Burmester Some Bounds and a Construction for Secure Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:420-433 [Conf ] Yvo Desmedt , Mike Burmester Towards Practical ``Proven Secure'' Authenticated Key Distribution. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:228-231 [Conf ] Carlisle M. Adams , Mike Burmester , Yvo Desmedt , Michael K. Reiter , Philip Zimmermann Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf ] Tri Van Le , Mike Burmester , Breno de Medeiros Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:242-252 [Conf ] Mike Burmester On the Risk of Opening Distributed Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:308-317 [Conf ] Yair Frankel , Yvo Desmedt , Mike Burmester Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:549-557 [Conf ] Panayiotis Kotzanikolaou , Mike Burmester , Vassilios Chrissikopoulos Dynamic Multi-signatures for Secure Autonomous Agents. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 2001, pp:587-591 [Conf ] Emmanouil Magkos , Mike Burmester , Vassilios Chrissikopoulos An Equitably Fair On-line Auction Scheme. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:72-83 [Conf ] Simon R. Blackburn , Mike Burmester , Yvo Desmedt , Peter R. Wild Efficient Multiplicative Sharing Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:107-118 [Conf ] Mike Burmester Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:1-10 [Conf ] Mike Burmester A Remark on the Efficiency of Identification Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:493-495 [Conf ] Mike Burmester Cryptoanalysis of the Chang-Wu-Chen Key Distribution System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:440-442 [Conf ] Mike Burmester Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:96-106 [Conf ] Mike Burmester , Yvo Desmedt Broadcast Interactive Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:81-95 [Conf ] Mike Burmester , Yvo Desmedt A Secure and Efficient Conference Key Distribution System (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:275-286 [Conf ] Mike Burmester , Yvo Desmedt , Fred Piper , Michael Walker A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:122-133 [Conf ] Emmanouil Magkos , Mike Burmester , Vassilios Chrissikopoulos Receipt-Freeness in Large-Scale Elections without Untappable Channels. [Citation Graph (0, 0)][DBLP ] I3E, 2001, pp:683-694 [Conf ] Nikos Alexandris , Mike Burmester , Vassilios Chrissikopoulos An Efficient Public Key Distribution System. [Citation Graph (0, 0)][DBLP ] IFIP Congress (2), 1992, pp:532-539 [Conf ] Mike Burmester , Yvo Desmedt Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. [Citation Graph (0, 0)][DBLP ] IFIP Congress (2), 1992, pp:479-485 [Conf ] Mike Burmester , Yvo Desmedt , Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya , Moti Yung A Progress Report on Subliminal-Free Channels. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:157-168 [Conf ] Simon R. Blackburn , Simon Blake-Wilson , Mike Burmester , Steven D. Galbraith Weaknesses in Shared RSA Key Generation Protocols. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:300-306 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. [Citation Graph (0, 0)][DBLP ] ISAAC, 2005, pp:277-287 [Conf ] Tri Van Le , Mike Burmester , Jiangyi Hu Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:422-427 [Conf ] Mike Burmester , Tri Van Le Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2004, pp:405-409 [Conf ] Mike Burmester , Virgil D. Gligor , Evangelos Kranakis , J. D. Tygar , Yuliang Zheng Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:186-191 [Conf ] Yvo Desmedt , Mike Burmester , Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:277-286 [Conf ] Mike Burmester , Yvo Desmedt , Hiroshi Doi , Masahiro Mambo , Eiji Okamoto , Mitsuru Tada , Yuko Yoshifuji A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:466-483 [Conf ] Mike Burmester , Yvo Desmedt , Yongge Wang Using Approximation Hardness to Achieve Dependable Computation. [Citation Graph (0, 0)][DBLP ] RANDOM, 1998, pp:172-186 [Conf ] Mike Burmester , Judie Mulholland The advent of trusted computing: implications for digital forensics. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:283-287 [Conf ] S. Aggarwal , Mike Burmester , P. Henry , L. Kermes , Judie Mulholland Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:195-205 [Conf ] Nikos Alexandris , Mike Burmester , Vassilios Chrissikopoulos , D. Peppes Efficient and provably secure key agreement. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:227-236 [Conf ] Yvo Desmedt , Mike Burmester Identity-based Key Infrastructures (IKI). [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:167-176 [Conf ] Mike Burmester , Vassilios Chrissikopoulos , Panayiotis Kotzanikolaou , Emmanouil Magkos Strong Forward Security. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:109-122 [Conf ] Mike Burmester , Yvo Desmedt Efficient and Secure Conference-Key Distribution. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:119-129 [Conf ] Mike Burmester , Alec Yasinsac Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:274-282 [Conf ] Mike Burmester , Yvo Desmedt , Rebecca N. Wright , Alec Yasinsac Accountable Privacy. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:83-95 [Conf ] Yvo Desmedt , Yongge Wang , Mike Burmester Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP ] CRITIS, 2006, pp:140-150 [Conf ] Mike Burmester , Yvo Desmedt Is hierarchical public-key certification the next target for hackers? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:8, pp:68-74 [Journal ] Mike Burmester , Yvo Desmedt , Thomas Beth Efficient Zero-Knowledge Identification Schemes for Smart Cards. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:1, pp:21-29 [Journal ] Mike Burmester , Yvo Desmedt , Fred Piper , Michael Walker A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal ] Mike Burmester , Emmanouil Magkos , Vassilios Chrissikopoulos Uncoercible e-Bidding Games. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2004, v:4, n:1-2, pp:113-125 [Journal ] Yongge Wang , Yvo Desmedt , Mike Burmester Models For Dependable Computation with Multiple Inputs and Some Hardness Results. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2000, v:42, n:1, pp:61-73 [Journal ] Alec Yasinsac , Mike Burmester Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal ] Mike Burmester An Almost-Constant Round Interactive Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1992, v:42, n:2, pp:81-87 [Journal ] Mike Burmester , Yvo Desmedt A secure and scalable Group Key Exchange system. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:94, n:3, pp:137-143 [Journal ] Mike Burmester , Yvo Desmedt , Toshiya Itoh , Kouichi Sakurai , Hiroki Shizuya Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:3, pp:197-223 [Journal ] Amos Beimel , Mike Burmester , Yvo Desmedt , Eyal Kushilevitz Computing Functions of a Shared Secret. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 2000, v:13, n:3, pp:324-345 [Journal ] Mike Burmester , Tri Van Le , Alec Yasinsac Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal ] Nikos Alexandris , Mike Burmester , Vassilios Chrissikopoulos , Yvo Desmedt Secure linking of customers, merchants and banks in electronic commerce. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:393-401 [Journal ] The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP ] Secure EPC Gen2 Compliant Radio Frequency Identification. [Citation Graph (, )][DBLP ] Provably Secure Grouping-Proofs for RFID Tags. [Citation Graph (, )][DBLP ] Robust, anonymous RFID authentication with constant key-lookup. [Citation Graph (, )][DBLP ] Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. [Citation Graph (, )][DBLP ] Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP ] RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP ] Strengthening Privacy Protection in VANETs. [Citation Graph (, )][DBLP ] Search in 0.076secs, Finished in 0.081secs