Security Analysis of Australian and E.U. E-passport Implementation
暂无分享,去创建一个
Huaxiong Wang | Josef Pieprzyk | Vijayakrishnan Pasupathinathan | J. Pieprzyk | Huaxiong Wang | Vijayakrishnan Pasupathinathan
[1] G. Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using CSP and FDR , 1996 .
[2] Huaxiong Wang,et al. Formal analysis of card-based payment systems in mobile devices , 2006, ACSW.
[3] J. Doug Tygar,et al. A Model for Secure Protocols and Their Compositions , 1996, IEEE Trans. Software Eng..
[4] Hugo Krawczyk,et al. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card , 2003, ESORICS.
[5] John Ulrich,et al. Automated Analysis of Cryptographic Protocols Using Mur ' , 1997 .
[6] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[7] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[8] John C. Mitchell,et al. Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Paul A. Karger,et al. IBM Research Report Preventing Security and Privacy Attacks on Machine Readable Travel Documents (MRTDs) , 2005 .
[10] Gavin Lowe,et al. Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.
[11] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[12] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[13] Paul A. Karger,et al. Preventing Attacks on Machine Readable Travel Documents (MRTDs) , 2005, IACR Cryptol. ePrint Arch..
[14] A. W. Roscoe,et al. Using CSP to Detect Errors in the TMN Protocol , 1997, IEEE Trans. Software Eng..
[15] Serge Vaudenay,et al. About Machine-Readable Travel Documents , 2007 .
[16] P. Jonathon Phillips,et al. An Introduction to Evaluating Biometric Systems , 2000, Computer.
[17] Zhe Dang,et al. Using the ASTRAL Model Checker for Cryptographic Protocol Analysis , 1997 .
[18] Dennis Kügler. Security Concept of the EU-Passport , 2005, SPC.