TrustID: trustworthy identities for untrusted mobile devices
暂无分享,去创建一个
[1] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[2] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[3] Pascal Urien,et al. A New Convergent Identity System Based on EAP-TLS Smart Cards , 2011, 2011 Conference on Network and Information Systems Security.
[4] Adam J. Aviv,et al. Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.
[5] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[6] Konstantin Hyppönen,et al. An Open Mobile Identity Tool: An Architecture for Mobile Identity Management , 2008, EuroPKI.
[7] Andreas Leicher,et al. Smart OpenID A Smart Card based OpenID Protocol , 2012 .
[8] Ahmad-Reza Sadeghi,et al. Privilege Escalation Attacks on Android , 2010, ISC.
[9] Wei-Dar Chen,et al. NFC mobile payment with Citizen Digital Certificate , 2011, The 2nd International Conference on Next Generation Information Technology.
[10] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Ahmad-Reza Sadeghi,et al. SmartTokens: Delegable Access Control with NFC-Enabled Smartphones , 2012, TRUST.