06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY<br />

Smartcard Technology. Berkeley, CA, USA: USENIX Association, 1999, pp. 33.<br />

Online Available: http://portal.acm.org/citation.cfm?id=1267115.1267118<br />

[47] C. K. Prahalad and G. Hamel, The Core Competence of the Corporation,<br />

Harvard Business Review, 1990. Online Available: http://tle-inc.com/PDFS/<br />

FILES/resources/The%20Core%20Competencies%20of%20the%20Corp.pdf<br />

[48] J. Vincent, Aliations, Emotion and the Mobile Phone, in Cross-Modal Analysis<br />

of Speech, Gestures, Gaze and Facial Expressions, ser. Lecture Notes in Computer<br />

Science, A. Esposito and R. Vích, Eds. Springer, 2009, vol. 5641, pp. 2841.<br />

[49] R. Ling, New Tech, New Ties: How Mobile Communication Is Reshaping Social<br />

Cohesion. The MIT Press, 2008.<br />

[50] GlobalPlat<strong>for</strong>m Device: Secure Element Remote Application Management, Online,<br />

GlobalPlat<strong>for</strong>m, Specication, February 2011.<br />

[51] N. Seriot, iPhone Privacy, in Black Hat DC, 2010.<br />

[52] J. Winter, Trusted computing building blocks <strong>for</strong> embedded linux-based ARM trustzone<br />

plat<strong>for</strong>ms, in Proceedings of the 3rd ACM workshop on Scalable trusted computing,<br />

ser. STC '08. New York, NY, USA: ACM, 2008, pp. 2130.<br />

[53] S. R. White, ABYSS: A Trusted Architecture <strong>for</strong> Software Protection, <strong>Security</strong> and<br />

Privacy, IEEE Symposium on, vol. 0, p. 38, 1987.<br />

[54] GlobalPlat<strong>for</strong>m Device Technology: Device Application <strong>Security</strong> Management<br />

- Concepts and Description Document Specication, Online, GlobalPlat<strong>for</strong>m<br />

Specication, April 2008. Online Available: http://www.globalplat<strong>for</strong>m.org/<br />

specicationsdevice.asp<br />

[55] V. Costan, L. F. Sarmenta, M. Dijk, and S. Devadas, The Trusted Execution Module:<br />

Commodity General-Purpose Trusted Computing, in 8th IFIP WG 8.8/11.2<br />

international conference on Smart Card Research and Advanced Applications. London,<br />

United Kingdom: Springer, 2008, pp. 133148.<br />

[56] R. N. Akram, K. Markantonakis, and K. Mayes, A Dynamic and Ubiquitous Smart<br />

Card <strong>Security</strong> Assurance and Validation Mechanism, in 25th IFIP International<br />

In<strong>for</strong>mation <strong>Security</strong> Conference (SEC 2010), ser. IFIP AICT Series, K. Rannenberg<br />

and V. Varadharajan, Eds. Brisbane, Australia: Springer, September 2010, pp. 161<br />

172.<br />

[57] S. Peng and Z. Han, Design and Implementation of Portable TPM Device Driver<br />

Based on Extensible Firmware Interface, International Conference on Multimedia<br />

In<strong>for</strong>mation Networking and <strong>Security</strong>, vol. 2, pp. 342345, November 2009.<br />

[58] K. Dietrich and J. Winter, Implementation Aspects of Mobile and Embedded<br />

Trusted Computing, in Trust '09: Proceedings of the 2nd International Conference<br />

on Trusted Computing. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 2944.<br />

[59] P. England and T. Tariq, Towards a Programmable TPM, in Trusted Computing,<br />

ser. LNCS, L. Chen, C. Mitchell, and A. Martin, Eds. Springer Berlin / Heidelberg,<br />

2009, vol. 5471, pp. 113.<br />

[60] R. S. Pappu, Physical One-way Functions, Ph.D. dissertation, Massachusetts<br />

454

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!