His Late Master’s Voice (Transcript of Discussion)

  • Mike Burmester
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)


My name is Mike Burmester and I will be talking about localization privacy, which I will distinguish from location privacy. First I will try to motivate the topic—this is a novel application. Then I will explain the title of this talk: “His Late Master’s Voice”, and I will say something about RFID technologies, which I will be using.

I will present three protocols: the idea is to try to capture the essence of this distinctive steganographic attribute which is localization. I will talk about the adversarial model towards the end; clearly this is not the way to design good (secure) protocols, but because my application is novel I will break the rules.


Authentication Protocol Mutual Authentication Localization Privacy Replay Attack Threat Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Mike Burmester
    • 1
  1. 1.Florida State UniversityTallahasseeUSA

Personalised recommendations