Publications – a selection 

 

Ubiquitous Applications, the IOT, Radio Frequency Identification

  1. Mike Burmester and Jorge Munilla, 'Pre vs Post State Update: Trading Privacy for Availability in RFID', IEEE Wireless Communication Letters, 2014. Early draft. (pdf version).
  2. Mike Burmester. `Localization privacy'. Lecture Notes in Computer Science #6805, Festschrift Jean-Jacques Quisquater, Springer, 2011. Early draft. (pdf version)
  3. Mike Burmester. 'His Late Master's Voice: barking for location privacy'. Proceedings, 19th InternationalWorkshop on Security Protocols, Cambridge, England, March 28-30, 2011 (WSP 2011). Lecture Notes in Computer Science #7114, Springer, 2011. Early draft. (pdf version)
  4. Mike Burmester and Jorge Munilla. `Lightweight RFID authentication with forward and backward security'. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1):11 (2011) ACM Portal (pdf version). Early draft (pdf version)
  5. Mike Burmester and Jorge Munilla. `Flyweight authentication with forward and backward security'. WISP Summit 2009, First workshop on Wirelessly Powered Sensor Networks and Computational RFID, November 3, 2009, Berkeley, California, (pdf version)
  6. Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado. `Secure EPC Gen2 compliant Radio Frequency Identification'. 8th International Conference on AD-HOC Networks & Wireless, ADHOC-NOW 2009, Murcia, Spain, 22-25 September, 2009. Early draft (pdf version)
  7. Mike Burmester and Jorge Munilla. `A Flyweight RFID Authentication Protocol'. Workshop on RFID Security 2009, RFIDSec2009, Leuven, Belgium, June 30 - July 2, 2009. (pdf version)
  8. Mike Burmester, Tri van Le, Breno de Medeiros and Gene Tsudik. Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. ACM Transactions on Information and System Security (TISSEC), 12(4), 2009. ACM Portal (pdf version).
  9. Mike Burmester, Breno de Medeiros and Rossana Motta. Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT 1(pdf version)
  10. Mike Burmester, Breno de Medeiros Rossana Motta. Robust, anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291. (pdf version)
  11. Mike Burmester, Breno de Medeiros Rossana Motta. `Provably Secure Grouping-proofs for RFID tags'. International Conference, 8th Smart Card Research and Advanced Applications (CARDIS 2008), IFIP WG 8.8/11.2, September 8-11, 2008. (pdf version). See also, Cryptology ePrint Archive, 2007/407. (pdf version)
  12. Mike Burmester and Breno de Medeiros. `The security of EPCGen2 compliant RFID protocols'. 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), June 3-6, 2008, Columbia University, NY, USA. Early draft (pdf version).
  13. Mike Burmester and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID Security, RFIDSec07, Malaga, July, 2007. (pdf version)
  14. Mike Burmester and Breno de Medeiros. `RFID Security, Countermeasures and Challenges'. 5th RFID Academic Convocation, The RFID Journal Conference, Orlando, April 30 - May 2, 2007 (pdf version)
  15. Tri van Le, Mike Burmester and Breno de Medeiros. `Universally Composable and Forward Secure RFID Authentication and Key exchange'. ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 2007. (pdf version)
  16. Mike Burmester, Tri van Le and Breno de Medeiros. `Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols'. 2nd Int. Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, Aug 2006. (pdf version)
  17. Mike Burmester, Tri van Le, and Breno de Medeiros. `Towards provable security for ubiquitous applications’. Proc. 11th Australasian Conf. on Information Security and Privacy (ACISP 2006), Melbourne, Australia, July 2006, Lecture Notes in Computer Science #4058, Springer, 2006, pp. 295-312 (pdf version)
  18. Christy Chatmon, Tri van Le and Mike Burmester. `Secure Anonymous RFID Protocols', 2005. (pdf version)