06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

Science, P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, and D. Sauveron,<br />

Eds. Springer, 2010, vol. 6033, pp. 316323, 10.1007/978-3-642-12368-9_25.<br />

[230] A.-A.-K. Séré, J. Iguchi-Cartigny, and J.-L. Lanet, Checking the Paths to Identify<br />

Mutant Application on Embedded Systems, in Future Generation In<strong>for</strong>mation<br />

Technology - Second International Conference (FGIT 2010), ser. Lecture Notes in<br />

Computer Science, T.-H. Kim, Y.-H. Lee, B. H. Kang, and D. Slezak, Eds., vol.<br />

6485. Jeju Island, Korea,: Springer, December 2010, pp. 459468.<br />

[231] K. Markantonakis, Secure Logging Mechanisms <strong>for</strong> Smart Cards, Ph.D. dissertation,<br />

Royal Holloway, University of London, Egham, United Kingdom, December<br />

1999.<br />

[232] Advanced <strong>Security</strong> <strong>for</strong> Personal Communications Technology (ASPeCT). Online<br />

Available: http://www.esat.kuleuven.be/cosic/aspect/<br />

[233] Failures-Divergence Renement, Formal Systems (Europe) Ltd, June 2005. Online<br />

Available: www.fsel.com<br />

469

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!