06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY<br />

August 2009, pp. 2035. Online Available: http://www.springerlink.com/content/<br />

f7027021h1067261/fulltext.pdf<br />

[11] D. Sauveron, Multiapplication Smart Card: Towards an Open Smart Card? Inf.<br />

Secur. Tech. Rep., vol. 14, no. 2, pp. 7078, 2009.<br />

[12] W. Atkins, The Smart Card Report, 8th ed. Elsevier, January 2004.<br />

[13] E. Brack, Déterminants du Développement du Porte-Monnaie Électronique:<br />

Analyse Théorique et Empirique: Exemple Moneo, English Title: Electronic<br />

Wallet Development Determinants: Theoretical and Empirical Analysis: Moneo,<br />

University Library of Munich, Germany, MPRA Paper 23453, 2003. Online<br />

Available: http://ideas.repec.org/p/pra/mprapa/23453.html<br />

[14] D. Deville, A. Galland, G. Grimaud, and S. Jean, Smart Card Operating<br />

Systems: Past, Present and Future, in In Proceedings of the 5 th<br />

NORDU/USENIX Conference, 2003. Online Available: http://www.gemplus.com/<br />

smart/rd/publications/pdf/DGGJ03os.pdf<br />

[15] K. Markantonakis, The Case <strong>for</strong> a Secure Multi-Application Smart Card Operating<br />

System, in ISW '97: Proceedings of the First International Workshop on<br />

In<strong>for</strong>mation <strong>Security</strong>. London, UK: Springer-Verlag, 1998, pp. 188197. Online<br />

Available: http://www.springerlink.com/content/w62286334532m71n/fulltext.pdf<br />

[16] Java Card Plat<strong>for</strong>m Specication: Classic Edition; Application Programming<br />

Interface, Runtime Environment Specication, Virtual Machine Specication,<br />

Connected Edition; Runtime Environment Specication, Java Servlet Specication,<br />

Application Programming Interface, Virtual Machine Specication, Sample Structure<br />

of Application Modules, Oracle Std. Version 3.0.1, May 2009. Online Available:<br />

http://java.sun.com/javacard/3.0.1/specs.jsp<br />

[17] ISO/IEC 18092: Near Field Communication - Interface and Protocol (NFCIP-1),<br />

International Organization <strong>for</strong> Standardization (ISO) Std., April 2004.<br />

[18] Trusted Module Specication 1.2: Part 1- Design Principles, Part 2- Structures<br />

of the TPM, Part 3- Commands, Trusted Computing Group Std., Rev. 103, July<br />

2007. Online Available: http://www.trustedcomputinggroup.org/resources/tpm_<br />

specication_version_12_revision_103_part_1__3<br />

[19] TCG Mobile Trusted Module Specication, Trusted Computing Group (TCG),<br />

Specication Ver 1.0, June 2008.<br />

[20] G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, AEGIS: Architecture<br />

<strong>for</strong> <strong>Tamper</strong>-Evident and <strong>Tamper</strong>-<strong>Resistant</strong> Processing, in ICS '03: Proceedings<br />

of the 17th annual international conference on Supercomputing. New York, NY,<br />

USA: ACM, 2003, pp. 160171.<br />

[21] ARM <strong>Security</strong> Technology: Building a Secure System using TrustZone Technology,<br />

ARM, White Paper PRD29-GENC-009492C, 2009.<br />

[22] M-Shield Mobile <strong>Security</strong> Technology: Making Wireless Secure, Texas Instruments,<br />

Whilte Paper, February 2008. Online Available: http://focus.ti.com/pdfs/wtbu/ti_<br />

mshield_whitepaper.pdf<br />

451

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!