The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mike Burmester: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jiangyi Hu, Mike Burmester
    LARS: a locally aware reputation system for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2006, pp:119-123 [Conf]
  2. Mike Burmester, Tri Van Le, Breno de Medeiros
    Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:295-312 [Conf]
  3. Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos
    Secure Transactions with Mobile Agents in Hostile Environments. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:289-297 [Conf]
  4. Mike Burmester, Tri Van Le, Alec Yasinsac
    Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2004, pp:96-107 [Conf]
  5. Mike Burmester, Yvo Desmedt
    Secure Communication in an Unknown Network Using Certificates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:274-287 [Conf]
  6. Mike Burmester, Yvo Desmedt, Jennifer Seberry
    Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:380-391 [Conf]
  7. Yvo Desmedt, Mike Burmester
    An Efficient Zero-Knowledge Scheme for the Discrete Logarithm Based on Smooth Numbers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:360-367 [Conf]
  8. Yvo Desmedt, Giovanni Di Crescenzo, Mike Burmester
    Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:21-32 [Conf]
  9. Kaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester
    Some Bounds and a Construction for Secure Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:420-433 [Conf]
  10. Yvo Desmedt, Mike Burmester
    Towards Practical ``Proven Secure'' Authenticated Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:228-231 [Conf]
  11. Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann
    Which PKI (public key infrastructure) is the right one? (panel session). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:98-101 [Conf]
  12. Tri Van Le, Mike Burmester, Breno de Medeiros
    Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:242-252 [Conf]
  13. Mike Burmester
    On the Risk of Opening Distributed Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:308-317 [Conf]
  14. Yair Frankel, Yvo Desmedt, Mike Burmester
    Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:549-557 [Conf]
  15. Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos
    Dynamic Multi-signatures for Secure Autonomous Agents. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:587-591 [Conf]
  16. Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos
    An Equitably Fair On-line Auction Scheme. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:72-83 [Conf]
  17. Simon R. Blackburn, Mike Burmester, Yvo Desmedt, Peter R. Wild
    Efficient Multiplicative Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:107-118 [Conf]
  18. Mike Burmester
    Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:1-10 [Conf]
  19. Mike Burmester
    A Remark on the Efficiency of Identification Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:493-495 [Conf]
  20. Mike Burmester
    Cryptoanalysis of the Chang-Wu-Chen Key Distribution System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:440-442 [Conf]
  21. Mike Burmester
    Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:96-106 [Conf]
  22. Mike Burmester, Yvo Desmedt
    Broadcast Interactive Proofs (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:81-95 [Conf]
  23. Mike Burmester, Yvo Desmedt
    A Secure and Efficient Conference Key Distribution System (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:275-286 [Conf]
  24. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:122-133 [Conf]
  25. Emmanouil Magkos, Mike Burmester, Vassilios Chrissikopoulos
    Receipt-Freeness in Large-Scale Elections without Untappable Channels. [Citation Graph (0, 0)][DBLP]
    I3E, 2001, pp:683-694 [Conf]
  26. Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos
    An Efficient Public Key Distribution System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:532-539 [Conf]
  27. Mike Burmester, Yvo Desmedt
    Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:479-485 [Conf]
  28. Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung
    A Progress Report on Subliminal-Free Channels. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:157-168 [Conf]
  29. Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith
    Weaknesses in Shared RSA Key Generation Protocols. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:300-306 [Conf]
  30. Yvo Desmedt, Yongge Wang, Mike Burmester
    A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2005, pp:277-287 [Conf]
  31. Tri Van Le, Mike Burmester, Jiangyi Hu
    Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:422-427 [Conf]
  32. Mike Burmester, Tri Van Le
    Secure Multipath Communication in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:405-409 [Conf]
  33. Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
    Panel: Authentication in Constrained Environments. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:186-191 [Conf]
  34. Yvo Desmedt, Mike Burmester, Jennifer Seberry
    Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:277-286 [Conf]
  35. Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji
    A Structured ElGamal-Type Multisignature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:466-483 [Conf]
  36. Mike Burmester, Yvo Desmedt, Yongge Wang
    Using Approximation Hardness to Achieve Dependable Computation. [Citation Graph (0, 0)][DBLP]
    RANDOM, 1998, pp:172-186 [Conf]
  37. Mike Burmester, Judie Mulholland
    The advent of trusted computing: implications for digital forensics. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:283-287 [Conf]
  38. S. Aggarwal, Mike Burmester, P. Henry, L. Kermes, Judie Mulholland
    Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:195-205 [Conf]
  39. Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, D. Peppes
    Efficient and provably secure key agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:227-236 [Conf]
  40. Yvo Desmedt, Mike Burmester
    Identity-based Key Infrastructures (IKI). [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:167-176 [Conf]
  41. Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
    Strong Forward Security. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:109-122 [Conf]
  42. Mike Burmester, Yvo Desmedt
    Efficient and Secure Conference-Key Distribution. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:119-129 [Conf]
  43. Mike Burmester, Alec Yasinsac
    Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:274-282 [Conf]
  44. Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac
    Accountable Privacy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:83-95 [Conf]
  45. Yvo Desmedt, Yongge Wang, Mike Burmester
    Revisiting Colored Networks and Privacy Preserving Censorship. [Citation Graph (0, 0)][DBLP]
    CRITIS, 2006, pp:140-150 [Conf]
  46. Mike Burmester, Yvo Desmedt
    Is hierarchical public-key certification the next target for hackers? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:8, pp:68-74 [Journal]
  47. Mike Burmester, Yvo Desmedt, Thomas Beth
    Efficient Zero-Knowledge Identification Schemes for Smart Cards. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:1, pp:21-29 [Journal]
  48. Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker
    A General Zero-Knowledge Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:1, pp:13-37 [Journal]
  49. Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos
    Uncoercible e-Bidding Games. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:113-125 [Journal]
  50. Yongge Wang, Yvo Desmedt, Mike Burmester
    Models For Dependable Computation with Multiple Inputs and Some Hardness Results. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2000, v:42, n:1, pp:61-73 [Journal]
  51. Alec Yasinsac, Mike Burmester
    Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal]
  52. Mike Burmester
    An Almost-Constant Round Interactive Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1992, v:42, n:2, pp:81-87 [Journal]
  53. Mike Burmester, Yvo Desmedt
    A secure and scalable Group Key Exchange system. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:94, n:3, pp:137-143 [Journal]
  54. Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
    Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:197-223 [Journal]
  55. Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz
    Computing Functions of a Shared Secret. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2000, v:13, n:3, pp:324-345 [Journal]
  56. Mike Burmester, Tri Van Le, Alec Yasinsac
    Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal]
  57. Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos, Yvo Desmedt
    Secure linking of customers, merchants and banks in electronic commerce. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:393-401 [Journal]

  58. The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP]


  59. Secure EPC Gen2 Compliant Radio Frequency Identification. [Citation Graph (, )][DBLP]


  60. Provably Secure Grouping-Proofs for RFID Tags. [Citation Graph (, )][DBLP]


  61. Robust, anonymous RFID authentication with constant key-lookup. [Citation Graph (, )][DBLP]


  62. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  63. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]


  64. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


  65. Strengthening Privacy Protection in VANETs. [Citation Graph (, )][DBLP]


Search in 0.076secs, Finished in 0.081secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002