06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

and Messaging, GlobalPlat<strong>for</strong>m, White Paper, April 2009. Online Available:<br />

http://www.globalplat<strong>for</strong>m.org/documents/GlobalPlat<strong>for</strong>m_NFC_Mobile_<br />

White_Paper.pdf<br />

[75] 3D-Secure: Veried by Visa System Overview, Visa International Service Association,<br />

External Version 1.0.2, December 2006.<br />

[76] S. J. Murdoch and R. J. Anderson, Veried by Visa and MasterCard SecureCode:<br />

Or, How Not to Design Authentication, in Financial Cryptography and Data <strong>Security</strong>,<br />

14th International Conference, FC 2010, ser. LNCS, R. Sion, Ed., vol. 6052.<br />

Springer, January 2010, pp. 336342.<br />

[77] R. Anderson, Can We Fix the <strong>Security</strong> Economics of Federated Authentication? in<br />

SPW 2011, 19th International Workshop on <strong>Security</strong> Protocols, J. A. Malcolm, Ed.<br />

London, UK: Springer, March 2011.<br />

[78] S. Drimer, S. J. Murdoch, and R. J. Anderson, Optimised to Fail: Card Readers<br />

<strong>for</strong> Online Banking, in Financial Cryptography and Data <strong>Security</strong>, 13th International<br />

Conference, FC 2009, R. Dingledine and P. Golle, Eds., vol. 5628. Barbados:<br />

Springer, February 2009, pp. 184200.<br />

[79] (Visited May, 2011) Sony's PlayStation Network Hack: When Did They Know?<br />

Online. PCMagazine. Online Available: http://www.pcmag.com/article2/0,2817,<br />

2384366,00.asp<br />

[80] T. Moore, R. Clayton, and R. Anderson, The Economics of Online Crime, Journal<br />

of Economic Perspectives, vol. 23, no. 3, pp. 320, Summer 2009.<br />

[81] (Visited June, 2010) Barclaycard OnePulse. BarclayCard, Barclay Bank PLC.<br />

United Kingdom. Online Available: http://www.barclaycard-onepulse.co.uk<br />

[82] Z. Chen, Java Card Technology <strong>for</strong> Smart Cards: Architecture and Programmer's<br />

Guide. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 2000.<br />

[83] K. Markantonakis and K. Mayes, A Secure Channel Protocol <strong>for</strong> Multi-application<br />

Smart Cards based on Public Key Cryptography, in CMS 2004 - Eight IFIP<br />

TC-6-11 Conference on Communications and Multimedia <strong>Security</strong>, D. Chadwick and<br />

B. Prennel, Eds. Springer, September 2004, pp. 7996. Online Available: http://<br />

www.scc.rhul.ac.uk/public/A%20Secure%20Channel%20Protocol%20<strong>for</strong>%20Multi%<br />

20application%20smart%20cards%20based%20on%20PK%20Crytpography.pdf<br />

[84] G. Barthe, G. Dufay, L. Jakubiec, and a. M. d. Sousa, Sim A Formal Correspondence<br />

between Oensive and Defensive JavaCard Virtual Machines, in VMCAI '02:<br />

Revised Papers from the Third International Workshop on Verication, <strong>Model</strong> Checking,<br />

and Abstract Interpretation. London, UK: Springer-Verlag, 2002, pp. 3245.<br />

[85] R. N. Akram, K. Markantonakis, and K. Mayes, Simulator Problem in <strong>User</strong> <strong>Centric</strong><br />

Smart Card Ownership <strong>Model</strong>, in 6th IEEE/IFIP International Symposium on<br />

Trusted Computing and Communications (TrustCom-10), H. Y. Tang and X. Fu,<br />

Eds. HongKong, China: IEEE Computer Society, December 2010.<br />

[86] D. Sauveron and P. Dusart, Which Trust Can Be Expected of the Common Criteria<br />

Certication at End-<strong>User</strong> Level? Future Generation Communication and Network-<br />

456

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!