메뉴 건너뛰기




Volumn 53, Issue 2, 2009, Pages

Privacy is essential for secure mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

NATIONAL SECURITY; SECURITY OF DATA; SMART CARDS;

EID: 77955084210     PISSN: 00188646     EISSN: 00188646     Source Type: Journal    
DOI: 10.1147/JRD.2009.5429047     Document Type: Article
Times cited : (2)

References (65)
  • 1
    • 77955073791 scopus 로고    scopus 로고
    • Genisys
    • Symposium (July 2002), Anaheim, CA
    • D. Dyer, "Genisys," Proceedings of DARPATech 2002 Symposium (July 2002), Anaheim, CA, http://www.darpa.mil/DARPATech2002/presentations/iao- pdf/speeches/DYER.pdf.
    • (2002) Proceedings of DARPATech
    • Dyer, D.1
  • 2
    • 34250708345 scopus 로고
    • Getting the jump on fraud
    • S. Kumpf and N. Russell, "Getting the Jump on Fraud," Cellular Business 9, No.10, 24-26 (1992).
    • (1992) Cellular Business , vol.9 , Issue.10 , pp. 24-26
    • Kumpf, S.1    Russell, N.2
  • 3
    • 10444261429 scopus 로고    scopus 로고
    • Instant ciphertext-only cryptanalysis of GSM encrypted communications
    • Technion - Israel Institute of Technology
    • E. Barkan, E. Biham, and N. Keller, "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communications," Computer Science Department Technical Report CS-2006-2007, Technion - Israel Institute of Technology (2006), http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS- 2006-07.pdf.
    • (2006) Computer Science Department Technical Report CS-2006-07
    • Barkan, E.1    Biham, E.2    Keller, N.3
  • 6
    • 77955084478 scopus 로고    scopus 로고
    • Public Law No. 107-173: Enhanced Border Security and Visa Entry Reform Act of 2002, United States, 107th Congress, second session (May 14 2002)
    • Public Law No. 107-173: Enhanced Border Security and Visa Entry Reform Act of 2002, United States, 107th Congress, second session (May 14, 2002), http:// frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107-cong-public- laws&docid=f:publ173.107.pdf.
  • 7
    • 34250744059 scopus 로고    scopus 로고
    • Policy for a common identification standard for federal employees and contractors
    • The White House (August 27)
    • G. W. Bush, "Policy for a Common Identification Standard for Federal Employees and Contractors," Homeland Security Presidential Directive/Hspd-12, The White House (August 27, 2004), http://csrc.nist.gov/ drivers/documents/Presidential-Directive-Hspd-12.html.
    • (2004) Homeland Security Presidential Directive/Hspd-12
    • Bush, G.W.1
  • 8
    • 34250763588 scopus 로고    scopus 로고
    • Research Report RC 23909 IBM Thomas J. Watson Research Center (March)
    • G. S. Kc and P.A. Karger, "Preventing Attacks on Machine Readable Travel Documents (MRTDs)," Research Report RC 23909, IBM Thomas J. Watson Research Center (March 2006), http://domino.research.ibm.com/library/ cyberdig.nsf/1e4115aea78b6e7c85256b360066f0d4/ 7cd740a9883615da8525713a0053766a? OpenDocument.
    • (2006) Preventing Attacks on Machine Readable Travel Documents (MRTDs)
    • Kc, G.S.1    Karger, P.A.2
  • 9
    • 34250771078 scopus 로고    scopus 로고
    • Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
    • ACM Press, New York (July)
    • P. A. Karger, "Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program," Proceedings of the 2nd Symposium on Usable Privacy and Security, ACM Press, New York (July 2006), pp. 114-121, http://cups.cs.cmu.edu/soups/2006/proceedings/p114-karger.pdf.
    • (2006) Proceedings of the 2nd Symposium on Usable Privacy and Security , pp. 114-121
    • Karger, P.A.1
  • 12
    • 77955062323 scopus 로고
    • Vehicle radiotelephony becomes a bell system practice
    • (April)
    • A. C. Peterson Jr., "Vehicle Radiotelephony Becomes a Bell System Practice," Bell Laboratories Record, 137 (April 1947).
    • (1947) Bell Laboratories Record , vol.137
    • Peterson Jr., A.C.1
  • 13
    • 77955080094 scopus 로고
    • News Release, U.S. Attorney for the District of New Jersey, Newark, NJ (September 11)
    • "Cybersnare Sting-Arrests," News Release, U.S. Attorney for the District of New Jersey, Newark, NJ (September 11, 1995), http://fas.org/irp/ news/1995/nj62-txt.html.
    • (1995) Cybersnare Sting-Arrests
  • 15
    • 0028397595 scopus 로고
    • Authentication of mobile users
    • R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network 8, No.2, 26-34 (1994).
    • (1994) IEEE Network , vol.8 , Issue.2 , pp. 26-34
    • Molva, R.1    Samfat, D.2    Tsudik, G.3
  • 19
    • 84858342316 scopus 로고    scopus 로고
    • Technical Report, International Civil Aviation Organization (May)
    • "Biometrics Deployment of Machine Readable Travel Documents Version 1.9," Technical Report, International Civil Aviation Organization (May 2003), http://web.archive.org/web/20040716085423/http://www.icao.int/mrtd/ download/documents/Biometrics+deployment+of+Machine+Readable+Travel+Documents. pdf.
    • (2003) Biometrics Deployment of Machine Readable Travel Documents Version 1.9
  • 25
    • 34250766062 scopus 로고    scopus 로고
    • Tests reveal e-passport security flaw
    • (August 30)
    • J. Yoshida, "Tests Reveal e-Passport Security Flaw," Electronic Engineering Times (August 30, 2004), http:// www.eetimes.com/news/latest/ showArticle.jhtml? articleID=45400010.
    • (2004) Electronic Engineering Times
    • Yoshida, J.1
  • 28
    • 77955074776 scopus 로고    scopus 로고
    • Feds rethinking RFID passport
    • (April 26)
    • K. Zetter, "Feds Rethinking RFID Passport," Wired News (April 26, 2005), http://www.wired.com/news/privacy/ 0,1848,67333,00.html.
    • (2005) Wired News
    • Zetter, K.1
  • 29
    • 77955078948 scopus 로고    scopus 로고
    • Attacks on digital passports
    • (July)
    • M. Witteman, "Attacks on Digital Passports," What the Hack (July 2005), http://wiki.whatthehack.org/index.php/Track:Attacks-on-Digital- Passports.
    • (2005) What the Hack
    • Witteman, M.1
  • 32
    • 77955075918 scopus 로고    scopus 로고
    • (Body Check: Biometric Access Protection Devices and their Programs Put to the Test), c't - Magazin fü r Computertechnik, 114, November
    • P.-M. Ziegler, L. Thalheim, and J. Krissler, "Körperkontrolle: Biometrische Zugangssicherungen auf die Probe gestellt," (Body Check: Biometric Access Protection Devices and their Programs Put to the Test), c't - Magazin fü r Computertechnik, 114, November 2002, http://www.heise.de/ kiosk/archiv/ct/2002/11/114-kiosk.
    • (2002) Körperkontrolle: Biometrische Zugangssicherungen auf die Probe Gestellt
    • Ziegler, P.-M.1    Thalheim, L.2    Krissler, J.3
  • 33
    • 77955065449 scopus 로고    scopus 로고
    • Presentation to the International Civil Aviation Organization (ICAO) at the Twelfth Session of the Facilitation Division (March)
    • D.M. J. Kamdi, "The Malaysian Electronic Passport," Presentation to the International Civil Aviation Organization (ICAO) at the Twelfth Session of the Facilitation Division (March 2004), http://www.icao.int/ icao/en/ atb/fal/fal12/Presentations/Malaysia.ppt.
    • (2004) The Malaysian Electronic Passport
    • Kamdi, D.M.J.1
  • 34
    • 77955075199 scopus 로고    scopus 로고
    • Advanced security mechanisms for machine readable travel documents - Extended access control (EAC) version 1.11
    • Federal Office for Information Security (BSI), Bonn (February 21)
    • "Advanced Security Mechanisms for Machine Readable Travel Documents - Extended Access Control (EAC) Version 1.11," Technical Guideline TR-03110, Federal Office for Information Security (BSI), Bonn (February 21, 2008), http://www.bsi.de/literat/tr/tr03110/TR-03110-v111.pdf.
    • (2008) Technical Guideline TR-03110
  • 35
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal 40, No.3, 614-634 (2001).
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 36
    • 77955080504 scopus 로고    scopus 로고
    • Biometrics-how to put to use and how not at all?: How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics?
    • online proceedings (October)
    • A. Pfitzmann, "Biometrics-How to Put to Use and How Not at All?: How to Handle Security Problems of Biometrics and How to Handle Security and Privacy Problems Caused by Biometrics?" Proceedings of the Conference on Security and Privacy in Information Society (ISC 2005), online proceedings (October 2005), http://dud.inf.tu-dresden.de/literatur/Duesseldorf2005.10. 27Biometrics.pdf.
    • (2005) Proceedings of the Conference on Security and Privacy in Information Society (ISC 2005)
    • Pfitzmann, A.1
  • 37
    • 35248816546 scopus 로고    scopus 로고
    • SIGMA: The 'SIGn-and-Mac' approach to authenticated diffie-hellman and its use in the IKE protocols
    • Lecture Notes in Computer Science 2729, Springer-Verlag, Berlin (August)
    • H. Krawczyk, "SIGMA: The 'SIGn-and-Mac' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols," Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003), Lecture Notes in Computer Science 2729, Springer-Verlag, Berlin (August 2003), pp. 400-425.
    • (2003) Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003) , pp. 400-425
    • Krawczyk, H.1
  • 38
    • 0004115841 scopus 로고    scopus 로고
    • Request for Comments 2409, The Internet Society Network Working Group (November), ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt
    • D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," Request for Comments 2409, The Internet Society Network Working Group (November 1998), ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt.
    • (1998) The Internet Key Exchange (IKE)
    • Harkins, D.1    Carrel, D.2
  • 41
    • 77955064123 scopus 로고    scopus 로고
    • Presentation at BlackHat Asia 2008, Briefings (October)
    • J. van Beek, "ePassports Reloaded," Presentation at BlackHat Asia 2008 Briefings (October 2008), http://blackhat.com/presentations/bh-jp-08/ bh-jp-08-vanBeek/ BlackHat-Japan-08-Van-Beek-ePassports.pdf.
    • (2008) EPassports Reloaded
    • Van Beek, J.1
  • 42
    • 77955069205 scopus 로고    scopus 로고
    • International Civil Aviation Organization (October 31)
    • "PKD Procedures for the ICAO Public Key Directory (ICAO PKD), Version 2.0," International Civil Aviation Organization (October 31, 2006), http://www2.icao.int/en/MRTD/Downloads/PKD%20Documents/PKD-Procedures-Final- Version.pdf.
    • (2006) PKD Procedures for the ICAO Public Key Directory (ICAO PKD), Version 2.0
  • 43
    • 77955075509 scopus 로고    scopus 로고
    • International Civil Aviation Organization (April1)
    • "PKD Regulations for the ICAO Public Key Directory (ICAO PKD)," International Civil Aviation Organization (April1, 2007), http://www2.icao.int/ en/MRTD/Downloads/PKD%20Documents/PKD-Regultions-Final-Version.pdf.
    • (2007) PKD Regulations for the ICAO Public Key Directory (ICAO PKD)
  • 44
    • 77955061885 scopus 로고    scopus 로고
    • ICAO PKD Update, International Civil Aviation Organization, Technical Advisory Group on Machine Readable Travel Documents (April 22)
    • "ICAO PKD Update," International Civil Aviation Organization, Technical Advisory Group on Machine Readable Travel Documents (April 22, 2008), http://www.icao.int/icao/en/atb/meetings/2008/TagMRTD18/TagMrtd18-ip04.pdf.
    • (2008)
  • 45
    • 77955072033 scopus 로고    scopus 로고
    • Elvis has left the border: EPassport faking guide unleashed
    • (September 30)
    • J. Lettice, "Elvis Has Left the Border: ePassport Faking Guide Unleashed," The Register (September 30, 2008), http://www.theregister.co. uk/2008/09/30/epassport-hack-description/.
    • (2008) The Register
    • Lettice, J.1
  • 47
    • 29744436477 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), FIPS PUB 201, Federal Information Processing Standards (February 25)
    • "Personal Identity Verification (PIV) of Federal Employees and Contractors," National Institute of Standards and Technology (NIST), FIPS PUB 201, Federal Information Processing Standards (February 25, 2005), http://web.archive.org/web/20050404114420/http://csrc.ncsl.nist.gov/ publications/fips/fips201/FIPS-201-022505.pdf.
    • (2005) Personal Identity Verification (PIV) of Federal Employees and Contractors
  • 50
    • 77955062322 scopus 로고    scopus 로고
    • Government Smart Card Interagency Advisory Board, Physical Access Interagency Interoperability Working Group (July 30)
    • "Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems, Version 2.2," Government Smart Card Interagency Advisory Board, Physical Access Interagency Interoperability Working Group (July 30, 2004), http://www.smart.gov/information/TIG-SCEPACS-v2.2.pdf.
    • (2004) Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems, Version 2.2
  • 51
    • 77955069809 scopus 로고
    • Document SEIWG-012, U.S. Department of Defense, Security Enterprise Integration Working Group (SEIWG), Washington, D.C.(February 28)
    • "Prime Item Product Function Specification for Magnetic Stripe Credentials (MSC)," Document SEIWG-012, U.S. Department of Defense, Security Enterprise Integration Working Group (SEIWG), Washington, D.C.(February 28, 1994).
    • (1994) Prime Item Product Function Specification for Magnetic Stripe Credentials (MSC)
  • 52
    • 77955068704 scopus 로고    scopus 로고
    • Federal Information Processing Standard FIPS PUB 201, National Institute of Standards and Technology (November 8)
    • "Personal Identity Verification (PIV) for Federal Employees and Contractors: Public Draft Version 1.0," Federal Information Processing Standard FIPS PUB 201, National Institute of Standards and Technology (November 8, 2004), http://web.archive.org/web/ 20041112042821/http://csrc.nist.gov/ publications/drafts/draft-FIPS-201-110804-public1.pdf.
    • (2004) Personal Identity Verification (PIV) for Federal Employees and Contractors: Public Draft Version 1.0
  • 53
    • 77955073487 scopus 로고    scopus 로고
    • Thomas J. Watson Research Center Research Report RC23871, IBM Corporation (January)
    • P. A. Karger, "FIPS PUB 201 Security and Privacy Recommendations," Thomas J. Watson Research Center Research Report RC23871, IBM Corporation (January, 2005), http://domino.watson.ibm.com/library/CyberDig. nsf/1e4115aea78b6e7c85256b360066f0d4/0bb070e69e4f41518525711000536e73? OpenDocument.
    • (2005) FIPS PUB 201 Security and Privacy Recommendations
    • Karger, P.A.1
  • 62
  • 63
    • 0003400255 scopus 로고
    • Technical Report MTR-3153, The MITRE Corporation, HQ Electronic Systems Division (April)
    • K. J. Biba, "Integrity Considerations for Secure Computer Systems," Technical Report MTR-3153, The MITRE Corporation, HQ Electronic Systems Division (April 1977).
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K.J.1
  • 64
    • 77952286492 scopus 로고    scopus 로고
    • Research Report RC 21673, IBM Research Division, Thomas J. Watson Research Center, (February 22)
    • P. A. Karger, "Multi-Organizational Mandatory Access Controls for Commercial Applications," Research Report RC 21673, IBM Research Division, Thomas J. Watson Research Center, (February 22, 2000) http://domino.watson.ibm. com/library/CyberDig.nsf/1e4115aea78b6e7c85256b360066f0d4/ 3071057a742ec56285256897006c5307?OpenDocument.
    • (2000) Multi-Organizational Mandatory Access Controls for Commercial Applications
    • Karger, P.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.