06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHY<br />

Group_TRUST/PubsPDF/CASED-TR-2011-06-01.pdf<br />

[136] S. Chari, V. V. Diluoo, P. A. Karger, E. R. Palmer, T. Rabin, J. R. Rao, P. Rohatgi,<br />

H. Scherzer, M. Steiner, and D. C. Toll, Designing a Side Channel <strong>Resistant</strong> Random<br />

Number Generator, in Smart Card Research and Advanced Application, 9th IFIP<br />

WG 8.8/11.2 International Conference, CARDIS 2010, D. Gollmann, J.-L. Lanet,<br />

and J. Iguchi-Cartigny, Eds. Springer, April 2010, pp. 4964.<br />

[137] J. Bringer, H. Chabanne, T. Kevenaar, and B. Kindarji, Extending Match-On-Card<br />

to Local Biometric Identication, in Biometric ID Management and Multimodal<br />

Communication, ser. Lecture Notes in Computer Science, J. Fierrez, J. Ortega-<br />

Garcia, A. Esposito, A. Drygajlo, and M. Faundez-Zanuy, Eds. Springer Berlin<br />

/ Heidelberg, 2009, vol. 5707, pp. 178186, 10.1007/978-3-642-04391-8_23. Online<br />

Available: http://www.springerlink.com/content/b16016708315549v/fulltext.pdf<br />

[138] T. Bourlai, J. Kittler, and K. Messer, On design and optimization of<br />

face verication systems that are smart-card based, Machine Vision and<br />

Applications, vol. 21, pp. 695711, 2010, 10.1007/s00138-009-0187-x. Online<br />

Available: http://www.springerlink.com/content/e73334305v740016/fulltext.pdf<br />

[139] L. Beaugé and A. Drygajlo, Fully featured secure biometric smart card device <strong>for</strong><br />

ngerprint-based authentication and identication, in Proceedings of the 12th ACM<br />

workshop on Multimedia and security, ser. MM&#38;Sec '10. New York, NY, USA:<br />

ACM, 2010, pp. 181186.<br />

[140] ISO/IEC 14888: In<strong>for</strong>mation Technology <strong>Security</strong> Techiques Digital Signature<br />

with Appendix, International Organization <strong>for</strong> Standardization (ISO) Std., April<br />

2008.<br />

[141] ISO/IEC 9796: In<strong>for</strong>mation Technology <strong>Security</strong> Techniques Digital Signature<br />

Schemes Giving Message Recovery , International Organization <strong>for</strong> Standardization<br />

(ISO) Std., December 2010.<br />

[142] G. Lowe, Casper: a compiler <strong>for</strong> the analysis of security protocols,<br />

J. Comput. Secur., vol. 6, pp. 5384, January 1998. Online Available:<br />

http://dl.acm.org/citation.cfm?id=353677.353680<br />

[143] C. A. R. Hoare, Communicating sequential processes. New York, NY, USA: ACM,<br />

1978, vol. 21, no. 8.<br />

[144] P. Ryan and S. Schneider, The <strong>Model</strong>ling and Analysis of <strong>Security</strong> Protocols: the<br />

CSP Approach. Addison-Wesley Professional, 2000.<br />

[145] Joan Daemen and Vincent Rijmen, The Design of Rijndael: AES - The Advanced<br />

Encryption Standard. Berlin, Heidelberg, New York: Springer Verlag, 2002.<br />

[146] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography.<br />

CRC, October 1996.<br />

[147] FIPS 180-2: Secure Hash Standard (SHS), National Institute of Standards and<br />

Technology (NIST) Std., 2002. Online Available: http://csrc.nist.gov/publications/<br />

ps/ps180-2/ps180-2.pdf<br />

[148] M. Lepinski and S. Kent, RFC 5114 - Additional Die-Hellman Groups<br />

461

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!