Search

Your search keyword '"BURMESTER, MIKE"' showing total 466 results

Search Constraints

Start Over You searched for: Author "BURMESTER, MIKE" Remove constraint Author: "BURMESTER, MIKE"
466 results on '"BURMESTER, MIKE"'

Search Results

1. Energy-Time Profiling for Machine Learning Methods to EEG Classification

3. Challenges of Securing and Defending Unmanned Aerial Vehicles

7. Resilient Grouping Proofs with Missing Tag Identification

8. Challenges of Securing and Defending Unmanned Aerial Vehicles

10. Integrating Simulated Physics and Device Virtualization in Control System Testbeds

11. Runtime Integrity for Cyber-Physical Infrastructures

12. A Symbolic Honeynet Framework for SCADA System Threat Intelligence

13. Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions

14. Panel: Authentication in Constrained Environments

22. Localization Privacy

24. His Late Master’s Voice (Transcript of Discussion)

25. His Late Master’s Voice: Barking for Location Privacy

27. Secure EPC Gen2 Compliant Radio Frequency Identification

28. The Security of EPC Gen2 Compliant RFID Protocols

29. Provably Secure Grouping-Proofs for RFID Tags

30. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

31. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer

33. Revisiting Colored Networks and Privacy Preserving Censorship

34. Accountable Privacy

35. Towards Provable Security for Ubiquitous Applications

36. A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback

37. Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks

39. Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks

43. Strong Forward Security

46. A Structured ElGamal-Type Multisignature Scheme

48. An Equitably Fair On-line Auction Scheme

Catalog

Books, media, physical & digital resources