06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

[161] D. A. Basin, S. Friedrich, J. Posegga, and H. Vogt, Java Bytecode Verication by<br />

<strong>Model</strong> Checking, in CAV '99: Proceedings of the 11th International Conference on<br />

Computer Aided Verication. London, UK: Springer-Verlag, 1999, pp. 491494.<br />

[162] D. A. Basin, S. Friedrich, and M. Gawkowski, Veried Bytecode <strong>Model</strong> Checkers, in<br />

TPHOLs '02: Proceedings of the 15th International Conference on Theorem Proving<br />

in Higher Order Logics. London, UK: Springer-Verlag, 2002, pp. 4766.<br />

[163] X. Leroy, On-Card Bytecode Verication <strong>for</strong> Java Card, in E-SMART '01: Proceedings<br />

of the International Conference on Research in Smart Cards. London, UK:<br />

Springer-Verlag, 2001, pp. 150164.<br />

[164] Smart Cards; Smart Card Plat<strong>for</strong>m Requirements Stage 1(Release 9), European<br />

Telecommunications Standards Institute (ETSI), France, Technical Specication<br />

ETSI TS 102 412 (V9.1.0), June 2009. Online Available: http://www.etsi.org/<br />

deliver/etsi_ts/102400_102499/102412/09.01.00_60/ts_102412v090100p.pdf<br />

[165] Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, and N. Asokan, Beyond Secure<br />

Channels, in STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted<br />

computing. New York, NY, USA: ACM, 2007, pp. 3040.<br />

[166] L. Zhou and Z. Zhang, Trusted Channels with Password-Based Authentication and<br />

TPM-Based Attestation, Communications and Mobile Computing, International<br />

Conference on, vol. 1, pp. 223227, 2010.<br />

[167] F. Armknecht, Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, G. Ramunno, and<br />

D. Vernizzi, An ecient implementation of trusted channels based on openssl, in<br />

Proceedings of the 3rd ACM workshop on Scalable trusted computing, ser. STC '08.<br />

New York, NY, USA: ACM, 2008, pp. 4150.<br />

[168] G. Horn, K. M. Martin, and C. J. Mitchell, Authentication Protocols <strong>for</strong><br />

Mobile Network Environment Value-Added Services, in IEEE Transactions on<br />

Vehicular Technology, vol. 51. IEEE, March 2002, pp. 383392. Online Available:<br />

http://www.isg.rhul.ac.uk/cjm/apfmne2.pdf<br />

[169] Remote Application Management over HTTP, Card Specication v 2.2 - Amendment<br />

B, Online, GlobalPlat<strong>for</strong>m Specication, September 2006. Online Available:<br />

http://www.globalplat<strong>for</strong>m.org/specicationscard.asp<br />

[170] GlobalPlat<strong>for</strong>m Card Technology: Secure Channel Protocol 03, Card Specication v 2.2<br />

- Amendment D,, Online, GlobalPlat<strong>for</strong>m Public Release GPC SPE 014, September<br />

2009. Online Available: http://www.globalplat<strong>for</strong>m.org/specicationscard.asp<br />

[171] Smart Cards; Secured Packet Structure <strong>for</strong> UICC based Applications (Release 6),<br />

European Telecommunications Standards Institute (ETSI), France, Technical Specication<br />

ETSI TS 102 225 (V6.8.0), April 2006.<br />

[172] Y. S. T. Tin, C. Boyd, and J. M. G. Nieto, Provably Secure Mobile Key<br />

Exchange: Applying the Canetti-Krawczyk Approach, in Proceedings of the<br />

8th Australasian conference on In<strong>for</strong>mation security and privacy, ser. ACISP'03.<br />

Berlin, Heidelberg: Springer-Verlag, 2003, pp. 166179. Online Available:<br />

http://portal.acm.org/citation.cfm?id=1760479.1760499<br />

463

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!