A secure and efficient conference key distribution system M Burmester, Y Desmedt Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 1396 | 1995 |
Universally composable and forward-secure RFID authentication and authenticated key exchange T Van Le, M Burmester, B de Medeiros Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 216 | 2007 |
A secure and scalable group key exchange system M Burmester, Y Desmedt Information Processing Letters 94 (3), 137-143, 2005 | 167 | 2005 |
Provably secure ubiquitous systems: Universally composable RFID authentication protocols M Burmester, T Van Le, B de Medeiros 2006 SecureComm and workshops, 1-9, 2006 | 155 | 2006 |
Efficient and secure conference-key distribution M Burmester, YG Desmedt Security Protocols: International Workshop Cambridge, United Kingdom, April …, 1997 | 150 | 1997 |
Secure transactions with mobile agents in hostile environments P Kotzanikolaou, M Burmester, V Chrissikopoulos Information Security and Privacy: 5th Australasian Conference, ACISP 2000 …, 2000 | 145 | 2000 |
Modeling security in cyber–physical systems M Burmester, E Magkos, V Chrissikopoulos International journal of critical infrastructure protection 5 (3-4), 118-126, 2012 | 138 | 2012 |
Provably secure grouping-proofs for RFID tags M Burmester, B de Medeiros, R Motta International Conference on Smart Card Research and Advanced Applications …, 2008 | 135 | 2008 |
Receipt-freeness in large-scale elections without untappable channels E Magkos, M Burmester, V Chrissikopoulos Towards the E-Society: E-Commerce, E-Business, and E-Government, 683-693, 2001 | 124 | 2001 |
On the risk of opening distributed keys M Burmester Annual International Cryptology Conference, 308-317, 1994 | 119 | 1994 |
Cooperation in mobile ad hoc networks J Hu, M Burmester Guide to Wireless Ad Hoc Networks, 43-57, 2009 | 116 | 2009 |
Secure anonymous RFID authentication protocols C Chatmon, T van Le, M Burmester Technical Report TR-060112, Florida State University, Department of Computer …, 2006 | 115 | 2006 |
A structured ElGamal-type multisignature scheme M Burmester, Y Desmedt, H Doi, M Mambo, E Okamoto, M Tada, ... Public Key Cryptography: Third International Workshop on Practice and Theory …, 2000 | 105 | 2000 |
Towards secure and practical e-elections in the new era M Burmester, E Magkos Secure electronic voting, 63-76, 2003 | 104 | 2003 |
Universally composable RFID identification and authentication protocols M Burmester, T Van Le, B De Medeiros, G Tsudik ACM Transactions on Information and System Security (TISSEC) 12 (4), 1-33, 2009 | 97 | 2009 |
Optimal movement of mobile sensors for barrier coverage of a planar region B Bhattacharya, M Burmester, Y Hu, E Kranakis, Q Shi, A Wiese Theoretical Computer Science 410 (52), 5515-5528, 2009 | 91 | 2009 |
RFID security: attacks, countermeasures and challenges M Burmester, B De Medeiros The 5th RFID academic convocation, the RFID journal conference, 2007 | 90 | 2007 |
LARS: a locally aware reputation system for mobile ad hoc networks J Hu, M Burmester Proceedings of the 44th annual Southeast regional conference, 119-123, 2006 | 89 | 2006 |
Robust, anonymous RFID authentication with constant key-lookup M Burmester, B De Medeiros, R Motta Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 87 | 2008 |
On the security of route discovery in MANETs M Burmester, B De Medeiros IEEE Transactions on Mobile Computing 8 (9), 1180-1188, 2009 | 81 | 2009 |