Security and Privacy Issues in Machine Readable Travel Documents (MRTDs)
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..
[2] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[3] Axel Schairer,et al. Verification of a Formal Security Model for Multiapplicative Smart Cards , 2000, ESORICS.
[4] P A Karger,et al. SECURITY AND PRIVACY THREATS TO ITS , 1995 .
[5] Paul A. Karger,et al. A New Mandatory Security Policy Combining Secrecy and Integrity , 2000 .
[6] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[7] Tsutomu Matsumoto. Gummy and conductive silicone rubber fingers: Importance of vulnerability analysis , 2002 .
[8] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[9] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[10] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[11] Hugo Krawczyk,et al. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card , 2003, ESORICS.
[12] Hugo Krawczyk,et al. Security Analysis of IKE's Signature-Based Key-Exchange Protocol , 2002, CRYPTO.