Research Terms
Computer Science Computer Applications Computer Security Information Science Technology
Industries
Military IT Software & Computer Systems Design
Recent Publications, a selection (for a complete list see Vita)
A. Radio Frequency Identification, Ubiquitous Applications
1. Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado. `Secure EPC Gen2 compliant Radio Frequency Identification'. 8th International Conference on AD-HOC Networks & Wireless, ADHOC-NOW 2009, Murcia, Spain, 22-25 September, 2009.
2. Mike Burmester and Jorge Munilla. `A Flyweight RFID Authentication Protocol'. Workshop on RFID Security 2009, RFIDSec2009, Leuven, Belgium, June 30 - July 2, 2009.
3. Mike Burmester, Tri van Le, Breno de Medeiros and Gene Tsudik. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. ACM Transactions on Information and System Security (TISSEC), 12(4), 2009.
4. Mike Burmester, Breno de Medeiros and Rossana Motta. Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT 1(2): 79-90 (2008).
5. Mike Burmester, Breno de Medeiros Rossana Motta. Robust, anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291.
6. Mike Burmester, Breno de Medeiros Rossana Motta. `Provably Secure Grouping-proofs for RFID tags'. International Conference, 8th Smart Card Research and Advanced Applications (CARDIS 2008), IFIP WG 8.8/11.2, September 8-11, 2008.
7. Mike Burmester and Breno de Medeiros. `The security of EPCGen2 compliant RFID protocols'. 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), June 3-6, 2008, Columbia University, NY, USA.
8. Mike Burmester and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID Security, RFIDSec07, Malaga, July, 2007.
9. Mike Burmester and Breno de Medeiros. `RFID Security, Countermeasures and Challenges'. 5th RFID Academic Convocation, The RFID Journal Conference, Orlando, April 30 - May 2, 2007
10. Tri van Le, Mike Burmester and Breno de Medeiros. `Universally Composable and Forward Secure RFID Authentication and Key exchange'. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 2007.
11. Mike Burmester, Tri van Le and Breno de Medeiros. `Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols'. 2nd Int. Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, Aug 2006.
12. Mike Burmester, Tri van Le, and Breno de Medeiros. `Towards provable security for ubiquitous applications’. Proc. 11th Australasian Conf. on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 2006, Lecture Notes in Computer Science #4058, Springer, 2006, pp. 295-312.
B. Mobile Ad Hoc Networks and Sensor networks
1. Mike Burmester, Reihaneh Safavi-Naini and Gelareh Taban.'Securing Random Key Predistribution Against Semi-Honest Adversaries'. Sixth International Conference on Networked Sensing Systems June 17 - 19, 2009, Carnegie Mellon University, Pittsburgh, USA.
2. Mike Burmester and Breno de Medeiros . `On the Security of Route Discovery in MANETs'. IEEE Transactions on Mobile Computing, 8(9), pp. 1180-1188, 2009.
3. Mike Burmester, Emmanuel Magkos and Vassilis Chrissikopoulos. `Strengthening Privacy Protection in VANETs'. Proceedings, IEEE WiMob2008, International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob 2008), Avignon, France, October 12-14, 2008.
5. Mike Burmester, Tri van Le and Alec Yasinsac. `Adaptive gossip protocols: managing security and redundancy in dense ad hoc networks.' Journal of Ad hoc Networks, Elsevier, 4(3), pp. 504-515, 2006.
C. Trust Management and Network Security
1. Mike Burmester, Prasanta Das, Martin Edwards and Alec Yasinsac. `Multi-Domain trust management in variable threat environments ---a user-centric model'. Military Communications Conference, 2009 (MILCOM 2009), IEEE, Boston, Oct 18-21, 2009.
2. Mike Burmester, Prasanta Das, Martin Edwards and Alec Yasinsac. `Multi-Domain trust managerment in variable threat environments using rollback-access'. Military Communications Conference, 2008 (MILCOM 2008), IEEE, San Diego, November 17-19, 2008.
Center for Security and Assurance in IT (C-SAIT)
Director |
Michael V Burmester |
Phone | (850) 644 6410 |
Website | http://www.sait.fsu.edu/home.shtml |
Mission | To serve as a focal point for members of different academic disciplines, government, and industry, to carry out world-class research and to advance the practice and public awareness of information technology security and assurance through education and public service. C-SAIT is dedicated to the synthesis of education and research through combined focus on the theory and applications of Information Security. The primary research function of the Center is to provide an environment that fosters world-class, applied research in information security technology, with a focus on innovation and learning. |