Publications
– a selection
Ubiquitous Applications, the IOT, Radio
Frequency Identification
-
Mike Burmester and Jorge Munilla, 'Pre vs Post State Update:
Trading Privacy for Availability in RFID', IEEE Wireless Communication Letters, 2014.
Early draft.
(pdf version).
- Mike Burmester.
`Localization privacy'.
Lecture Notes in Computer Science #6805, Festschrift Jean-Jacques Quisquater, Springer, 2011. Early draft.
(pdf version)
- Mike Burmester. 'His Late
Master's Voice: barking for location privacy'.
Proceedings, 19th InternationalWorkshop
on Security Protocols, Cambridge, England, March 28-30, 2011 (WSP 2011). Lecture Notes in Computer Science
#7114, Springer, 2011. Early draft.
(pdf version)
-
Mike Burmester and Jorge
Munilla. `Lightweight RFID authentication with forward and backward security'.
ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1):11 (2011)
ACM Portal (pdf version).
Early draft
(pdf version)
- Mike Burmester and Jorge
Munilla. `Flyweight authentication with forward
and backward security'.
WISP Summit 2009, First workshop on Wirelessly
Powered Sensor Networks and Computational RFID,
November 3, 2009, Berkeley, California,
(pdf version)
- Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado.
`Secure EPC Gen2 compliant Radio Frequency Identification'. 8th International Conference on AD-HOC Networks & Wireless, ADHOC-NOW 2009, Murcia, Spain, 22-25 September, 2009. Early draft
(pdf version)
-
Mike Burmester and Jorge Munilla.
`A Flyweight RFID Authentication Protocol'. Workshop on RFID Security 2009, RFIDSec2009, Leuven, Belgium, June 30 - July 2, 2009. (pdf version)
-
Mike Burmester, Tri van Le, Breno de Medeiros and Gene Tsudik.
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
ACM Transactions on Information and
System Security (TISSEC), 12(4), 2009. ACM Portal (pdf version).
-
Mike Burmester, Breno de Medeiros and Rossana Motta. Anonymous
RFID authentication supporting constant-cost key-lookup against active
adversaries. IJACT 1(pdf version)
-
Mike Burmester, Breno de Medeiros Rossana Motta. Robust,
anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291. (pdf version)
-
Mike Burmester, Breno de Medeiros Rossana Motta. `Provably Secure
Grouping-proofs for RFID tags'. International Conference, 8th Smart Card
Research and Advanced Applications (CARDIS 2008), IFIP WG 8.8/11.2, September
8-11, 2008. (pdf version).
See also, Cryptology ePrint Archive, 2007/407. (pdf version)
- Mike
Burmester and Breno de Medeiros. `The security of EPCGen2 compliant RFID protocols'.
6th International Conference on Applied Cryptography and Network Security (ACNS 2008),
June 3-6, 2008, Columbia University, NY, USA.
Early draft
(pdf version).
- Mike Burmester
and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID Security, RFIDSec07, Malaga, July, 2007. (pdf version)
- Mike Burmester and Breno de Medeiros. `RFID
Security, Countermeasures and Challenges'. 5th RFID Academic Convocation, The RFID Journal Conference, Orlando, April 30 - May 2, 2007 (pdf version)
- Tri van Le, Mike Burmester and Breno de Medeiros.
`Universally Composable and Forward Secure RFID Authentication and Key
exchange'. ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2007, Singapore, March 2007. (pdf version)
- Mike Burmester, Tri van Le and Breno de Medeiros.
`Provably Secure Ubiquitous Systems: Universally Composable RFID
Authentication Protocols'. 2nd Int.
Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, Aug 2006. (pdf version)
- Mike Burmester, Tri van Le, and Breno de
Medeiros. `Towards provable security for ubiquitous applications’. Proc.
11th Australasian Conf. on Information Security and Privacy (ACISP 2006),
Melbourne, Australia, July 2006, Lecture Notes in Computer Science #4058,
Springer, 2006, pp. 295-312 (pdf version)
- Christy Chatmon, Tri van Le and Mike Burmester.
`Secure Anonymous RFID Protocols', 2005.
(pdf version)