As size and power limitations vanish, wireless and mobile computing flourishes. Unfortunately, security for these services has fallen far behind their implementation. There is presently substantial ongoing research in this area at FSU.
Investigators
- Dr. Mike Burmester
- Dr. Alec Yasinsac
- Tri van Le
- John Marshall
- Stephen Carter
- Vikram Thakur
- Ilkay Cubukzu
- Ashutosh Chickurer
Workshops
Courses
Ongoing Research Programs
Publications
- Mike Burmester, Reihaneh Safavi-Naini and Gelareh Taban. `Secure Random Key
Pre-Distribution Against Semi-Honest Adversaries'. Cryptology ePrint Archive, Report
2008/446.
- Mike Burmester, Emmanuel Magkos and Vassilis Chrissikopoulos. `Strengthening Privacy
Protection in VANETs'. Proceedings, IEEE WiMob2008, International Workshop on Security
and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob
2008), Avignon, France, October 12-14, 2008.
- Mike Burmester and Breno de Medeiros. `Towards provable security for route discovery
protocols in mobile ad hoc networks'. Cryptology ePrint Archive, 2007/324.
- Mike Burmester and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID
Security, RFIDSec07, Malaga, July, 2007.
- Mike Burmester, Tri van Le, and Breno de Medeiros. `Towards provable security for
ubiquitous applications'. Proc. 11th Australasian Conf. on Information Security and
Privacy (ACISP 2006), Melbourne, Australia, July 2006, Lecture Notes in Computer Science
#4058, Springer, 2006, pp. 295-312
- Mike Burmester, Tri van Le and Alec Yasinsac. `Adaptive gossip protocols: managing
security and redundancy in dense ad hoc networks.' Journal of Ad hoc Networks, Elsevier,
4(3), pp. 504-515, 2006.
- McDonald, Todd, Alec Yasinsac, and Willard Thompson. “Mobile Agent Data Integrity Using Multi-agent Architecture.” Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 536-42. San Francisco, CA. 15-17 September 2004.
- Thompson, Willard, Alec Yasinsac, and Todd McDonald. “Semantic Encryption Transformation Scheme.” Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 516-21. San Francisco, CA. 15-17 September 2004.
- Burmester, Mike, Tri van Le, and Alec Yasinsac. “Weathering the Storm: Managing Redundancy and Security in Ad-hoc Networks.” Proceedings of the 3rd International Conference on Ad-hoc Networks & Wireless, pp. 96-107. Vancouver, British Columbia. 22-24 July 2004.
- Scott, D.J. and Alec Yasinsac. “Dynamic Probabilistic Retransmission in Ad-hoc Networks.” Proceedings of the International Conference on Wireless Networks, pp. 158-64. 21-24 June 2004.
- Burmester, Mike and Tri van Le. “Secure Communications in Ad-hoc Networks.” Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 234-241. West Point, NY. 10-11 June 2004.
- Ramachandran, Prabha and Alec Yasinsac. “Limitations of On Demand Secure Routing Protocols.” Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 52-59. West Point, NY. 10-11 June 2004.
- Burmester, Mike and Tri van Le. “Secure Multipath Communication in Mobile Ad-hoc Networks.” International Conference on Information Technology: Coding and Computing (ITCC 2004). Las Vegas, NV. 5-7 April 2004.
- Burmester, Mike, Tri van Le, and M. Weir. “Tracing Byzantine Faults in Ad-hoc Networks.” Communication, Network, and Information Security 2003, pp. 43-46. New York, NY. 10-12 December 2003.
- Yasinsac, Alec. “Rate of Change in Ad-hoc Networks.” Proceedings of the Information Resources Management Association International Conference, pp. 698-701. Philadelphia, PA. 18-21 May 2003.
- Marshall, John, Vikram Thakur, and Alec Yasinsac. “Identifying Flaws in the Secure Routing Protocol.” Proceedings of the 22nd International Performance, Computing, and Communications Conference (IPCCC 2003), pp. 167-174. 9-11 April 2003.
- Burmester, Mike and Alec Yasinsac. “Protocols for a Dynamic Key Exchange System for Ad-hoc Networks.” Eleventh International Workshop on Security Protocols, pp. 151-157. Cambridge, UK. 2-4 April 2003, LNCS.
- Carter, Stephen, and Alec Yasinsac. “Secure Position Aided Ad-hoc Routing Protocol.” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02). 3-4 November 2002.
- Yasinsac, Alec, Vik Thakur, Stephen Carter, and Ilkay Cubukcu. “A Family of Protocols for Group Key Generation in Ad-hoc Networks.” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02). 3-4 November 2002.
- Marshall, John. “An Analysis of SRP for Mobile Ad-hoc Networks.” Poster Presentation. The 2002 International Multi-Conference in Computer Science. 24-27 June 2002.
- Yasinsac, Alec and James A. Davis. “Modeling Protocols for Secure Group Communication in Ad-hoc Networks.” Tenth International Workshop on Security Protocols. Cambridge, UK. 17-19 April 2002, LNCS.
- Yvo Desmedt, Mike Burmester and Yonggue Wang. `Using economics to model threats and
security in distributed applications', Extended Abstract. Workshop on Economics and
Information Security, University of California, Berkeley, May 16-17, 2002.
Contacts
|