-
"Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments"
2022 ▪
Applied Sciences
Mike Burmester;
Vaggelis Malamas;
Panayiotis Kotzanikolaou;
George Palaiologos;
Dimitris Glynos;
-
"Janus: Hierarchical Multi-Blockchain Based Access Control (Hmbac) for Multi-Authority & Multi-Domain Environments"
2022 ▪
SSRN Electronic Journal
Mike Burmester;
Vaggelis Malamas;
Panayiotis Kotzanikolaou;
George Palaiologos;
Dimitrios Glynos;
-
"Janus: Hierarchical Multi-Blockchain Based Access Control (Hmbac) for Multi-Authority & Multi-Domain Environments"
2022 ▪
SSRN Electronic Journal
Mike Burmester;
Vaggelis Malamas;
Panayiotis Kotzanikolaou;
George Palaiologos;
Dimitrios Glynos;
-
"An enhanced symmetric-key based 5G-AKA protocol"
2021 ▪
Computer Networks
-
"Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi"
2021 ▪
International Journal of Cyber Forensics and Advanced Threat Investigations
-
"Energy-Time Profiling for Machine Learning Methods to EEG Classification"
2021 ▪
Lecture notes in computer science
Mike Burmester;
Juan Carlos Gómez-López;
Juan José Escobar;
Jesús González;
Francisco Gil-Montoya;
Julio Ortega;
Miguel Damas;
-
"5G-Compliant Authentication Protocol for RFID"
2020 ▪
Electronics
-
"Challenges of Securing and Defending Unmanned Aerial Vehicles"
2020 ▪
Advances in intelligent systems and computing
-
"Lightweight Stream Authentication for Mobile Objects"
2020 ▪
Learning and analytics in intelligent systems
-
"A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data"
2020 ▪
IEEE Access
Mike Burmester;
Vaggelis Malamas;
Thomas Dasaklis;
Panayiotis Kotzanikolaou;
-
"Guest Editorial Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures"
2019 ▪
IEEE Internet of Things Journal
Mike Burmester;
Panayiotis Kotzanikolaou;
Cristina Alcaraz;
Jorge Cuellar;
Xinyi Huang;
Mihalis Psarakis;
-
"Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks"
2019 ▪
Information Systems
Mike Burmester;
Jorge Munilla;
Iván Santos-González;
Alexandra Rivero-García;
Pino Caballero-Gil;
-
"A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain"
2019 ▪
Mike Burmester;
Vaggelis Malamas;
Thomas Dasaklis;
Panayiotis Kotzanikolaou;
Sokratis Katsikas;
-
"Ambient Assisted Living and Ambient Intelligence for Health"
2018 ▪
Mobile Information Systems
-
"Comments on “Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems”"
2018 ▪
IEEE Transactions on Information Forensics and Security
-
"RFID Authentication: Reconciling Anonymity and Availability"
2017 ▪
CRC Press eBooks
-
"An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels"
2017 ▪
Sensors
-
"A Luggage Control System Based on NFC and Homomorphic Cryptography"
2017 ▪
Mobile Information Systems
-
"RFID Ownership Transfer with Positive Secrecy Capacity Channels"
2016 ▪
Sensors
-
"Keynote talk: some unresolved concerns & future directions for resilient RFID smart structures in the supply chain"
2016 ▪
-
"Performance Analysis of LDPC-Based RFID Group Coding"
2016 ▪
IEEE Transactions on Automation Science and Engineering
-
"Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments"
2016 ▪
Computer Communications
-
"An anonymous RFID grouping-proof with missing tag identification"
2016 ▪
-
"Tag Memory-Erasure Tradeoff of RFID Grouping Codes"
2016 ▪
IEEE Communications Letters
-
"Broadcast anonymous routing (BAR): scalable real-time anonymous communication"
2016 ▪
International Journal of Information Security
-
"Demystifying Insider Threat: Language-Action Cues in Group Dynamics"
2016 ▪
-
"Integrating Simulated Physics and Device Virtualization in Control System Testbeds"
2016 ▪
IFIP advances in information and communication technology
-
"Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues"
2016 ▪
-
"Resilient Grouping Proofs with Missing Tag Identification"
2016 ▪
Lecture notes in computer science
-
"Resilient Metro-scale Smart Structures: Challenges & Future Directions"
2016 ▪
-
"Some Unresolved Concerns a Future Directions for Resilient RFID Smart Structures in the Supply Chain"
2016 ▪
-
"Ubiquitous Computing and Ambient Intelligence"
2016 ▪
Lecture notes in computer science
Mike Burmester;
Pino Caballero-Gil;
Carmelo R. García;
Alexis Quesada-Arencibia;
-
"Ubiquitous Computing and Ambient Intelligence"
2016 ▪
Lecture notes in computer science
Mike Burmester;
Pino Caballero-Gil;
Carmelo R. García;
Alexis Quesada-Arencibia;
-
"Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication"
2015 ▪
-
"A Symbolic Honeynet Framework for SCADA System Threat Intelligence"
2015 ▪
IFIP advances in information and communication technology
-
"Runtime Integrity for Cyber-Physical Infrastructures"
2015 ▪
IFIP advances in information and communication technology
-
"Group-scanning for supply chain management"
2014 ▪
-
"Establishing a PKI in an Open Adversarial Environment"
2014 ▪
Networking, Architecture and Storages
-
"Pre vs Post State Update: Trading Privacy for Availability in RFID"
2014 ▪
IEEE Wireless Communications Letters
-
"Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions"
2014 ▪
Lecture notes in computer science
-
"Trusted Group Key Management for Real-Time Critical Infrastructure Protection"
2013 ▪
-
"A trusted computing architecture for critical infrastructure protection"
2013 ▪
-
"T-ABAC: An attribute-based access control model for real-time availability in highly dynamic systems"
2013 ▪
-
"Towards a secure electricity grid"
2013 ▪
-
"A Trusted Computing Architecture for Secure Substation Automation"
2013 ▪
Lecture notes in computer science
-
"Protecting Infrastructure Assets from Real-Time and Run-Time Threats"
2013 ▪
IFIP advances in information and communication technology
-
"Modeling security in cyber–physical systems"
2012 ▪
International Journal of Critical Infrastructure Protection
-
"RFID Grouping-Proofs"
2012 ▪
IGI Global eBooks
-
"Dynamic Trust Management: Network Profiling for High Assurance Resilience"
2012 ▪
Mathematics in industry
-
"Localization Privacy"
2012 ▪
Lecture notes in computer science
-
"Secure and privacy-preserving, timed vehicular communications"
2012 ▪
International Journal of Ad Hoc and Ubiquitous Computing
-
"Chord-PKI: A distributed trust infrastructure based on P2P networks"
2011 ▪
Computer Networks
Mike Burmester;
Panayiotis Kotzanikolaou;
Agapios Avramidis;
Christos Douligeris;
-
"Trust Models for Ubiquitous Mobile Systems"
2011 ▪
IGI Global eBooks
-
"Lightweight RFID authentication with forward and backward security"
2011 ▪
ACM Transactions on Information and System Security
-
"Trust Models for Ubiquitous Mobile Systems"
2011 ▪
IGI Global eBooks
-
"Trust Models for Ubiquitous Mobile Systems"
2011 ▪
IGI Global eBooks
-
"Trust Models for Ubuitous Mobile Systems"
2011 ▪
IGI Global eBooks
-
"Trust Models for Ubuitous Mobile Systems"
2011 ▪
IGI Global eBooks
-
"Group Key Agreement"
2011 ▪
Springer eBooks
-
"His Late Master’s Voice (Transcript of Discussion)"
2011 ▪
Lecture notes in computer science
-
"His Late Master’s Voice: Barking for Location Privacy"
2011 ▪
Lecture notes in computer science
-
"Information Security"
2011 ▪
Lecture notes in computer science
-
"Information security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers"
2011 ▪
Springer eBooks
-
"Proceedings of the 13th international conference on Information security"
2010 ▪
-
"Markov anomaly modeling for trust management in variable threat environments"
2010 ▪
-
"Multi-domain Trust Management in variable-threat environments - a user-centric model"
2009 ▪
-
"Optimal movement of mobile sensors for barrier coverage of a planar region"
2009 ▪
Theoretical Computer Science
Mike Burmester;
Binay Bhattacharya;
Yuzhuang Hu;
Evangelos Kranakis;
Qiaosheng Shi;
Andreas Wiese;
-
"Securing random key predistribution against semi-honest adversaries"
2009 ▪
-
"Universally Composable RFID Identification and Authentication Protocols"
2009 ▪
ACM Transactions on Information and System Security
-
"On the Security of Route Discovery in MANETs"
2009 ▪
IEEE Transactions on Mobile Computing
-
"Cooperation in Mobile Ad Hoc Networks"
2009 ▪
Computer communications and networks
-
"Secure EPC Gen2 Compliant Radio Frequency Identification"
2009 ▪
Lecture notes in computer science
-
"Trust Models for Ubiquitous Mobile Systems"
2009 ▪
IGI Global eBooks
-
"Trust Models for Ubiquitous Mobile Systems"
2009 ▪
Advances in electronic commerce (AEC) book series/Advances in electronic commerce series
-
"Multi-domain Trust Management in variable-threat environments using rollback-access"
2008 ▪
-
"Strengthening Privacy Protection in VANETs"
2008 ▪
-
"RFID security and privacy"
2008 ▪
Mike Burmester;
Gene Tsudik;
Ari Juels;
Alfred Kobsa;
David Molnar;
Roberto Di Pietro;
Melanie Rieback;
-
"RFID Authentication"
2008 ▪
CRC Press eBooks
-
"Robust, anonymous RFID authentication with constant key-lookup"
2008 ▪
-
"Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries"
2008 ▪
International Journal of Applied Cryptography
-
"Provably Secure Grouping-Proofs for RFID Tags"
2008 ▪
Lecture notes in computer science
-
"The Security of EPC Gen2 Compliant RFID Protocols"
2008 ▪
Lecture notes in computer science
-
"Trust Models for Ubiquitous Mobile Systems"
2008 ▪
IGI Global eBooks
-
"Trust Models for Ubuitous Mobile Systems"
2008 ▪
IGI Global eBooks
-
"A General Zero-Knowledge Scheme"
2007 ▪
Springer eBooks
-
"On the Risk of Opening Distributed Keys"
2007 ▪
Springer eBooks
-
"Research Directions in Security and Privacy for Mobile and Wireless Networks"
2007 ▪
Springer eBooks
-
"Broadcast Interactive Proofs"
2007 ▪
Springer eBooks
-
"Non-existence of homomorphic general sharing schemes for some key spaces"
2007 ▪
Springer eBooks
-
"Cryptanalysis of the Chang-Wu-Chen key distribution system"
2007 ▪
Springer eBooks
-
"Universally composable and forward-secure RFID authentication and authenticated key exchange"
2007 ▪
-
"Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer"
2007 ▪
Lecture notes in computer science
-
"Cryptography and Coding"
2007 ▪
Lecture notes in computer science
-
"Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups"
2007 ▪
Lecture notes in computer science
-
"Trust Models for Ubuitous Mobile Systems"
2007 ▪
IGI Global eBooks
-
"GROUP KEY AGREEMENT"
2006 ▪
Springer eBooks
-
"Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers (Lecture Notes in Computer Science)"
2006 ▪
Springer eBooks
-
"Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols"
2006 ▪
-
"Secure Mobile Ad-hoc Networks and Sensors: First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers"
2006 ▪
-
"The advent of trusted computing"
2006 ▪
-
"LARS"
2006 ▪
-
"Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System"
2006 ▪
-
"Accountable Privacy"
2006 ▪
Lecture notes in computer science
-
"Panel: Authentication in Constrained Environments"
2006 ▪
Lecture notes in computer science
Mike Burmester;
Evangelos Kranakis;
Virgil Gligor;
Doug Tygar;
Yuliang Zheng;
-
"Remarks on entity authentication"
2006 ▪
-
"Revisiting Colored Networks and Privacy Preserving Censorship"
2006 ▪
Lecture notes in computer science
-
"Secure Mobile Ad-hoc Networks and Sensors"
2006 ▪
Lecture notes in computer science
-
"Towards provable security for ubiquitous applications"
2006 ▪
Lecture notes in computer science
-
"Towards Provable Security for Ubiquitous Applications"
2006 ▪
Lecture notes in computer science
-
"Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks"
2005 ▪
Ad Hoc Networks
-
"Receipt-freeness in Large-scale Elections without Untappable Channels"
2005 ▪
Kluwer Academic Publishers eBooks
-
"Proceedings of the 2005 International Conference on Pervasive Systems and Computing, PSC'05: Message from PSC-05 chairs"
2005 ▪
Mike Burmester;
Alec Yasinsac;
Kia Makki;
Hamid Abachi;
Sheikh Ahamed Iqbal;
Hesham Ali;
Hamid R. Arabnia;
Yan Bai;
Bhagyavati;
Hans Peter Bischof;
Raouf Boutaba;
S. Clarke;
Antonio Coronato;
Brian D'Auriol;
Breno d'Medieros;
Arek Dadej;
Partha Dasgupta;
Giuseppe De Pietro;
Mieso Denko;
Jitender Deogun;
Peter Dommel;
Huirong Fu;
George A. Gravvanis;
Takahiro Hara;
Elaine May Huang;
Sozo Inoue;
Hatsuhiko Kato;
Nobuo Kawaguchi;
Stan Kurkovsky;
Tysen Leckie;
Hyunjeong Lee;
Kuan Ching Li;
Wei Li;
Ramiro Liscano;
Kathy J. Liszka;
Luigi Logrippo;
Jianhua Ma;
Todd MacDonald;
Qusay Mahmoud;
D. Manivannan;
John Marshall;
Klaus D. McDonald-Maier;
Muralidhar Medidi;
Masateru Minami;
Jin Nakazawa;
Lata Narayanan;
Nidal Nasser;
Takuichi Nishimura;
Haruo Noma;
Seungjin Park;
Niki Pissinou;
Gilda Pour;
Kyeun Ra;
Rick Raines;
S. S. Ravi;
Shiva Sastry;
Albrecht Schmidt;
Hamid Sharif;
Timothy K. Shih;
H. Shrikumar;
Martin Strohbach;
Makoto Takizawa;
Tsutomu Terada;
Levan Tri;
Gulden Uchyigit;
Cliff Wang;
Chulho Won;
Lu Yan;
Laurence T. Yang;
Seong Moo Yoo;
Jon Youn;
Qing An Zeng;
Qiang Zhu;
-
"Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors"
2005 ▪
-
"Tracking cyberstalkers"
2005 ▪
ACM SIGCAS Computers and Society
-
"Secure communications in ad hoc networks"
2005 ▪
-
"A secure and scalable Group Key Exchange system"
2005 ▪
Information Processing Letters
-
"? ?????? ??? ???????????, ? ???????????? ??? ?? ?????????"
2005 ▪
?????????? ???????? ??????????? ????????
-
"A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback"
2005 ▪
Lecture notes in computer science
-
"Centers of academic excellence: a case study"
2005 ▪
IEEE Security & Privacy
-
"Group Key Agreement."
2005 ▪
Encyclopedia of Cryptography and Security (2nd Ed.)
-
"Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks"
2005 ▪
Lecture notes in computer science
-
"Secure Tactical Mobile Intelligent Agents"
2004 ▪
-
"Is hierarchical public-key certification the next target for hackers?"
2004 ▪
Communications of the ACM
-
"Attack on Sebe?, Domingo-Ferrer and Herrera-Joancomarti fingerprinting schemes"
2004 ▪
Electronics Letters
-
"Identity-Based Key Infrastructures (IKI)"
2004 ▪
Springer eBooks
-
"Secure multipath communication in mobile ad hoc networks"
2004 ▪
-
"Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks"
2004 ▪
Lecture notes in computer science
-
"Uncoercible e-Bidding Games"
2003 ▪
Electronic Commerce Research
-
"On perfect traitor tracing"
2003 ▪
-
"Short c-Secure Fingerprinting Codes"
2003 ▪
Lecture notes in computer science
-
"Towards Secure and Practical E-Elections in the New Era"
2003 ▪
Advances in information security
-
"Hash codes"
2002 ▪
-
"Zero day vulnerabilities"
2002 ▪
Network Security
-
"Designated 2-Verifier Proofs and their Application to Electronic Commerce"
2001 ▪
Birkhäuser Basel eBooks
-
"Dynamic multi-signatures for secure autonomous agents"
2001 ▪
-
"Equitability in Retroactive Data Confiscation versus Proactive Key Escrow"
2001 ▪
Lecture notes in computer science
-
"Strong Forward Security"
2001 ▪
IFIP advances in information and communication technology
Mike Burmester;
Emmanouil Magkos;
Panayiotis Kotzanikolaou;
Vassilios Chrissikopoulos;
-
"Which PKI (public key infrastructure) is the right one? (panel session)"
2000 ▪
Mike Burmester;
Yvo Desmedt;
Carlisle Adams;
Mike Reiter;
Philip Zimmermann;
-
"Secure linking of customers, merchants and banks in electronic commerce"
2000 ▪
Future Generation Computer Systems
-
"A Structured ElGamal-Type Multisignature Scheme"
2000 ▪
Lecture notes in computer science
Mike Burmester;
Yvo Desmedt;
Hiroshi Doi;
Masahiro Mambo;
Eiji Okamoto;
Mitsuru Tada;
Yuko Yoshifuji;
-
"An Equitably Fair On-line Auction Scheme"
2000 ▪
Lecture notes in computer science
-
"Computing Functions of a Shared Secret"
2000 ▪
SIAM Journal on Discrete Mathematics
-
"Models For Dependable Computation with Multiple Inputs and Some Hardness Results"
2000 ▪
Fundamenta Informaticae
-
"Secure Transactions with Mobile Agents in Hostile Environments"
2000 ▪
Lecture notes in computer science
-
"Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages"
1999 ▪
Journal of Cryptology
Mike Burmester;
Yvo Desmedt;
Toshiya Itoh;
Kouichi Sakurai;
Hiroki Shizuya;
-
"Secure Communication in an Unknown Network Using Certificates"
1999 ▪
Lecture notes in computer science
-
"Weaknesses in Shared RSA Key Generation Protocols"
1999 ▪
Lecture notes in computer science
-
"Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)"
1998 ▪
International Cryptology Conference
-
"Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract"
1998 ▪
Lecture notes in computer science
-
"Secure communication in an unknown network with Byzantine faults"
1998 ▪
Electronics Letters
-
"Some Bounds and a Construction for Secure Broadcast Encryption"
1998 ▪
Lecture notes in computer science
-
"Using Approximation Hardness to Achieve Dependable Computation"
1998 ▪
Lecture notes in computer science
-
"Trust and security: A new look at the Byzantine generals problem"
1997 ▪
DIMACS series in discrete mathematics and theoretical computer science
-
"Efficient and secure conference key distribution"
1997 ▪
-
"Efficient and secure conference-key distribution"
1997 ▪
Lecture notes in computer science
-
"Hash codes"
1997 ▪
International Symposium on Information Theory
-
"Secure group communication: a dynamic approach"
1997 ▪
IFIP advances in information and communication technology
-
"Untitled"
1997 ▪
Designs Codes and Cryptography
-
"A progress report on subliminal-free channels"
1996 ▪
Lecture notes in computer science
Mike Burmester;
Yvo Desmedt;
Toshiya Itoh;
Kouichi Sakurai;
Hiroki Shizuya;
Moti Yung;
-
"Efficient and provably secure key agreement"
1996 ▪
IFIP advances in information and communication technology
-
"Efficient Multiplicative Sharing Schemes"
1996 ▪
Lecture notes in computer science
-
"Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing"
1996 ▪
Lecture notes in computer science
-
"A secure and efficient conference key distribution system"
1995 ▪
Lecture notes in computer science
-
"Multiplicative non-abelian sharing schemes and their application to threshold cryptography"
1995 ▪
Lecture notes in computer science
-
"An efficient zero-knowledge scheme for the discrete logarithm based on smooth numbers"
1993 ▪
Lecture notes in computer science
-
"Towards practical “proven secure” authenticated key distribution"
1993 ▪
-
"An Efficient Public Key Distribution System"
1992 ▪
World Computer Congress on Education and Society
-
"Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token"
1992 ▪
World Computer Congress on Education and Society
-
"Non-Existence of Homomorphic General Sharing Schemes for Some Key Spaces (Extended Abstract)"
1992 ▪
International Cryptology Conference
-
"An almost-constant round interactive zero-knowledge proof"
1992 ▪
Information Processing Letters
-
"Efficient Zero-Knowledge Identification Schemes for Smart Cards"
1992 ▪
The Computer Journal
-
"All languages in NP have divertible zero-knowledge proofs and arguments under cryptographic assumptions (extended abstract)"
1991 ▪
Theory and Application of Cryptographic Techniques
-
"A remark on the efficiency of identification schemes"
1991 ▪
Lecture notes in computer science
-
"All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions"
1991 ▪
Lecture notes in computer science
-
"Broadcast Interactive Proofs (Extended Abstract)."
1991 ▪
Theory and Application of Cryptographic Techniques
-
"Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions."
1990 ▪
Theory and Application of Cryptographic Techniques
-
"A General Zero-Knowledge Scheme (Extended Abstract)."
1989 ▪
Theory and Application of Cryptographic Techniques
-
"Remarks on soundness of proofs"
1989 ▪
Electronics Letters
-
"Circles of numbers"
1978 ▪
Glasgow Mathematical Journal
-
"On the solvability of autotopism groups"
1965 ▪
Archiv der Mathematik
-
"On the non-unicity of translation planes over division algebras"
1964 ▪
Archiv der Mathematik