466 results on '"BURMESTER, MIKE"'
Search Results
2. Lightweight Stream Authentication for Mobile Objects
3. Challenges of Securing and Defending Unmanned Aerial Vehicles
4. An enhanced symmetric-key based 5G-AKA protocol
5. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
6. Energy-Time Profiling for Machine Learning Methods to EEG Classification
7. Resilient Grouping Proofs with Missing Tag Identification
8. Challenges of Securing and Defending Unmanned Aerial Vehicles
9. Lightweight Stream Authentication for Mobile Objects
10. Integrating Simulated Physics and Device Virtualization in Control System Testbeds
11. Runtime Integrity for Cyber-Physical Infrastructures
12. A Symbolic Honeynet Framework for SCADA System Threat Intelligence
13. Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions
14. Panel: Authentication in Constrained Environments
15. RFID Authentication: Reconciling Anonymity and Availability
16. Janus: Hierarchical Multi-Blockchain-Based Access Control (HMBAC) for Multi-Authority and Multi-Domain Environments
17. Janus: Hierarchical Multi-blockchain Based Access Control (HMBAC) for Multi-Authority & Multi-Domain Environments
18. Broadcast anonymous routing (BAR): scalable real-time anonymous communication
19. Protecting Infrastructure Assets from Real-Time and Run-Time Threats
20. Dynamic Trust Management: Network Profiling for High Assurance Resilience
21. A Trusted Computing Architecture for Secure Substation Automation
22. Localization Privacy
23. Group Key Agreement
24. His Late Master’s Voice (Transcript of Discussion)
25. His Late Master’s Voice: Barking for Location Privacy
26. Cooperation in Mobile Ad Hoc Networks
27. Secure EPC Gen2 Compliant Radio Frequency Identification
28. The Security of EPC Gen2 Compliant RFID Protocols
29. Provably Secure Grouping-Proofs for RFID Tags
30. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
31. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
32. Research Directions in Security and Privacy for Mobile and Wireless Networks
33. Revisiting Colored Networks and Privacy Preserving Censorship
34. Accountable Privacy
35. Towards Provable Security for Ubiquitous Applications
36. A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback
37. Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
38. Identity-Based Key Infrastructures (IKI)
39. Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
40. Towards Secure and Practical E-Elections in the New Era
41. Short c-Secure Fingerprinting Codes
42. Receipt-freeness in Large-scale Elections without Untappable Channels
43. Strong Forward Security
44. Designated 2-Verifier Proofs and their Application to Electronic Commerce
45. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
46. A Structured ElGamal-Type Multisignature Scheme
47. Secure Transactions with Mobile Agents in Hostile Environments
48. An Equitably Fair On-line Auction Scheme
49. Modeling security in cyber–physical systems
50. Secure Communication in an Unknown Network Using Certificates
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.