-
1
-
-
77955073791
-
Genisys
-
Symposium (July 2002), Anaheim, CA
-
D. Dyer, "Genisys," Proceedings of DARPATech 2002 Symposium (July 2002), Anaheim, CA, http://www.darpa.mil/DARPATech2002/presentations/iao- pdf/speeches/DYER.pdf.
-
(2002)
Proceedings of DARPATech
-
-
Dyer, D.1
-
2
-
-
34250708345
-
Getting the jump on fraud
-
S. Kumpf and N. Russell, "Getting the Jump on Fraud," Cellular Business 9, No.10, 24-26 (1992).
-
(1992)
Cellular Business
, vol.9
, Issue.10
, pp. 24-26
-
-
Kumpf, S.1
Russell, N.2
-
3
-
-
10444261429
-
Instant ciphertext-only cryptanalysis of GSM encrypted communications
-
Technion - Israel Institute of Technology
-
E. Barkan, E. Biham, and N. Keller, "Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communications," Computer Science Department Technical Report CS-2006-2007, Technion - Israel Institute of Technology (2006), http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2006/CS/CS- 2006-07.pdf.
-
(2006)
Computer Science Department Technical Report CS-2006-07
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
4
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Y. Frankel, A. Herzberg, P.A. Karger, H. Krawczyk, C.A. Kunzinger, and M. Yung, "Security Issues in a CDPD Wireless Network," IEEE Personal Communications 2, No.4, 16-27 (1995).
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.4
, pp. 16-27
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.A.3
Krawczyk, H.4
Kunzinger, C.A.5
Yung, M.6
-
5
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
Springer-Verlag, Berlin (August)
-
S. R. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4," Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography Lecture Notes in Computer Science Vol. 2259, Springer-Verlag, Berlin (August 2001), pp. 1-24.
-
(2001)
Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography Lecture Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
6
-
-
77955084478
-
-
Public Law No. 107-173: Enhanced Border Security and Visa Entry Reform Act of 2002, United States, 107th Congress, second session (May 14 2002)
-
Public Law No. 107-173: Enhanced Border Security and Visa Entry Reform Act of 2002, United States, 107th Congress, second session (May 14, 2002), http:// frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107-cong-public- laws&docid=f:publ173.107.pdf.
-
-
-
-
7
-
-
34250744059
-
Policy for a common identification standard for federal employees and contractors
-
The White House (August 27)
-
G. W. Bush, "Policy for a Common Identification Standard for Federal Employees and Contractors," Homeland Security Presidential Directive/Hspd-12, The White House (August 27, 2004), http://csrc.nist.gov/ drivers/documents/Presidential-Directive-Hspd-12.html.
-
(2004)
Homeland Security Presidential Directive/Hspd-12
-
-
Bush, G.W.1
-
8
-
-
34250763588
-
-
Research Report RC 23909 IBM Thomas J. Watson Research Center (March)
-
G. S. Kc and P.A. Karger, "Preventing Attacks on Machine Readable Travel Documents (MRTDs)," Research Report RC 23909, IBM Thomas J. Watson Research Center (March 2006), http://domino.research.ibm.com/library/ cyberdig.nsf/1e4115aea78b6e7c85256b360066f0d4/ 7cd740a9883615da8525713a0053766a? OpenDocument.
-
(2006)
Preventing Attacks on Machine Readable Travel Documents (MRTDs)
-
-
Kc, G.S.1
Karger, P.A.2
-
9
-
-
34250771078
-
Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
-
ACM Press, New York (July)
-
P. A. Karger, "Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program," Proceedings of the 2nd Symposium on Usable Privacy and Security, ACM Press, New York (July 2006), pp. 114-121, http://cups.cs.cmu.edu/soups/2006/proceedings/p114-karger.pdf.
-
(2006)
Proceedings of the 2nd Symposium on Usable Privacy and Security
, pp. 114-121
-
-
Karger, P.A.1
-
10
-
-
67249144231
-
The caernarvon secure embedded operating system
-
D. C. Toll, P. A. Karger, E. R. Palmer, S. K. McIntosh, and S. Weber, "The Caernarvon Secure Embedded Operating System," Operating Systems Review 42, No.1, 32-39 (2008).
-
(2008)
Operating Systems Review
, vol.42
, Issue.1
, pp. 32-39
-
-
Toll, D.C.1
Karger, P.A.2
Palmer, E.R.3
McIntosh, S.K.4
Weber, S.5
-
11
-
-
0142157011
-
Authenticating mandatory access controls and preserving privacy for a high-assurance smart card
-
Lecture Notes in Computer Science 2808, Springer-Verlag, Berlin (October)
-
H. Scherzer, R. Canetti, P. A. Karger, H. Krawczyk, T. Rabin, and D. C. Toll, "Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card," Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS 2003), Lecture Notes in Computer Science 2808, Springer- Verlag, Berlin (October 2003), pp. 181-200.
-
(2003)
Proceedings of the 8th European Symposium on Research in Computer Security (ESORICS 2003)
, pp. 181-200
-
-
Scherzer, H.1
Canetti, R.2
Karger, P.A.3
Krawczyk, H.4
Rabin, T.5
Toll, D.C.6
-
12
-
-
77955062323
-
Vehicle radiotelephony becomes a bell system practice
-
(April)
-
A. C. Peterson Jr., "Vehicle Radiotelephony Becomes a Bell System Practice," Bell Laboratories Record, 137 (April 1947).
-
(1947)
Bell Laboratories Record
, vol.137
-
-
Peterson Jr., A.C.1
-
13
-
-
77955080094
-
-
News Release, U.S. Attorney for the District of New Jersey, Newark, NJ (September 11)
-
"Cybersnare Sting-Arrests," News Release, U.S. Attorney for the District of New Jersey, Newark, NJ (September 11, 1995), http://fas.org/irp/ news/1995/nj62-txt.html.
-
(1995)
Cybersnare Sting-Arrests
-
-
-
15
-
-
0028397595
-
Authentication of mobile users
-
R. Molva, D. Samfat, and G. Tsudik, "Authentication of Mobile Users," IEEE Network 8, No.2, 26-34 (1994).
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-34
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
19
-
-
84858342316
-
-
Technical Report, International Civil Aviation Organization (May)
-
"Biometrics Deployment of Machine Readable Travel Documents Version 1.9," Technical Report, International Civil Aviation Organization (May 2003), http://web.archive.org/web/20040716085423/http://www.icao.int/mrtd/ download/documents/Biometrics+deployment+of+Machine+Readable+Travel+Documents. pdf.
-
(2003)
Biometrics Deployment of Machine Readable Travel Documents Version 1.9
-
-
-
25
-
-
34250766062
-
Tests reveal e-passport security flaw
-
(August 30)
-
J. Yoshida, "Tests Reveal e-Passport Security Flaw," Electronic Engineering Times (August 30, 2004), http:// www.eetimes.com/news/latest/ showArticle.jhtml? articleID=45400010.
-
(2004)
Electronic Engineering Times
-
-
Yoshida, J.1
-
26
-
-
33847269759
-
Picking virtual pockets using relay attacks on contactless smartcard systems
-
IEEE Computer Society, Piscataway, NJ (September)
-
Z. Kfir and A. Wool, "Picking Virtual Pockets Using Relay Attacks on Contactless Smartcard Systems," Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), IEEE Computer Society, Piscataway, NJ (September 2005), pp. 47-58, http://eprint.iacr.org/2005/052.
-
(2005)
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005)
, pp. 47-58
-
-
Kfir, Z.1
Wool, A.2
-
28
-
-
77955074776
-
Feds rethinking RFID passport
-
(April 26)
-
K. Zetter, "Feds Rethinking RFID Passport," Wired News (April 26, 2005), http://www.wired.com/news/privacy/ 0,1848,67333,00.html.
-
(2005)
Wired News
-
-
Zetter, K.1
-
29
-
-
77955078948
-
Attacks on digital passports
-
(July)
-
M. Witteman, "Attacks on Digital Passports," What the Hack (July 2005), http://wiki.whatthehack.org/index.php/Track:Attacks-on-Digital- Passports.
-
(2005)
What the Hack
-
-
Witteman, M.1
-
31
-
-
77955075795
-
Gummy and conductive silicone rubber fingers: Importance of vulnerability analysis
-
Lecture Notes in Computer Science 2501, Springer-Verlag, Berlin (December 2002)
-
T. Matsumoto, "Gummy and Conductive Silicone Rubber Fingers: Importance of Vulnerability Analysis," Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT 2002, Lecture Notes in Computer Science 2501, Springer-Verlag, Berlin (December 2002), pp. 59-65.
-
(2002)
Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT
, pp. 59-65
-
-
Matsumoto, T.1
-
32
-
-
77955075918
-
-
(Body Check: Biometric Access Protection Devices and their Programs Put to the Test), c't - Magazin fü r Computertechnik, 114, November
-
P.-M. Ziegler, L. Thalheim, and J. Krissler, "Körperkontrolle: Biometrische Zugangssicherungen auf die Probe gestellt," (Body Check: Biometric Access Protection Devices and their Programs Put to the Test), c't - Magazin fü r Computertechnik, 114, November 2002, http://www.heise.de/ kiosk/archiv/ct/2002/11/114-kiosk.
-
(2002)
Körperkontrolle: Biometrische Zugangssicherungen auf die Probe Gestellt
-
-
Ziegler, P.-M.1
Thalheim, L.2
Krissler, J.3
-
33
-
-
77955065449
-
-
Presentation to the International Civil Aviation Organization (ICAO) at the Twelfth Session of the Facilitation Division (March)
-
D.M. J. Kamdi, "The Malaysian Electronic Passport," Presentation to the International Civil Aviation Organization (ICAO) at the Twelfth Session of the Facilitation Division (March 2004), http://www.icao.int/ icao/en/ atb/fal/fal12/Presentations/Malaysia.ppt.
-
(2004)
The Malaysian Electronic Passport
-
-
Kamdi, D.M.J.1
-
34
-
-
77955075199
-
Advanced security mechanisms for machine readable travel documents - Extended access control (EAC) version 1.11
-
Federal Office for Information Security (BSI), Bonn (February 21)
-
"Advanced Security Mechanisms for Machine Readable Travel Documents - Extended Access Control (EAC) Version 1.11," Technical Guideline TR-03110, Federal Office for Information Security (BSI), Bonn (February 21, 2008), http://www.bsi.de/literat/tr/tr03110/TR-03110-v111.pdf.
-
(2008)
Technical Guideline TR-03110
-
-
-
35
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal 40, No.3, 614-634 (2001).
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
36
-
-
77955080504
-
Biometrics-how to put to use and how not at all?: How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics?
-
online proceedings (October)
-
A. Pfitzmann, "Biometrics-How to Put to Use and How Not at All?: How to Handle Security Problems of Biometrics and How to Handle Security and Privacy Problems Caused by Biometrics?" Proceedings of the Conference on Security and Privacy in Information Society (ISC 2005), online proceedings (October 2005), http://dud.inf.tu-dresden.de/literatur/Duesseldorf2005.10. 27Biometrics.pdf.
-
(2005)
Proceedings of the Conference on Security and Privacy in Information Society (ISC 2005)
-
-
Pfitzmann, A.1
-
37
-
-
35248816546
-
SIGMA: The 'SIGn-and-Mac' approach to authenticated diffie-hellman and its use in the IKE protocols
-
Lecture Notes in Computer Science 2729, Springer-Verlag, Berlin (August)
-
H. Krawczyk, "SIGMA: The 'SIGn-and-Mac' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols," Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003), Lecture Notes in Computer Science 2729, Springer-Verlag, Berlin (August 2003), pp. 400-425.
-
(2003)
Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003)
, pp. 400-425
-
-
Krawczyk, H.1
-
38
-
-
0004115841
-
-
Request for Comments 2409, The Internet Society Network Working Group (November), ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt
-
D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," Request for Comments 2409, The Internet Society Network Working Group (November 1998), ftp://ftp.rfc-editor.org/in-notes/rfc2409.txt.
-
(1998)
The Internet Key Exchange (IKE)
-
-
Harkins, D.1
Carrel, D.2
-
39
-
-
84869635960
-
Security analysis of IKE's signature-based key-exchange protocol
-
Lecture Notes in Computer Science 2442, Springer-Verlag, Berlin
-
R. Canetti and H. Krawczyk, "Security Analysis of IKE's Signature-Based Key-Exchange Protocol," Proceedings of the 22nd Annual International Conference on Advances in Cryptology (CRYPTO 2002), Lecture Notes in Computer Science 2442, Springer-Verlag, Berlin (2002), pp. 143-161.
-
(2002)
Proceedings of the 22nd Annual International Conference on Advances in Cryptology (CRYPTO 2002)
, pp. 143-161
-
-
Canetti, R.1
Krawczyk, H.2
-
41
-
-
77955064123
-
-
Presentation at BlackHat Asia 2008, Briefings (October)
-
J. van Beek, "ePassports Reloaded," Presentation at BlackHat Asia 2008 Briefings (October 2008), http://blackhat.com/presentations/bh-jp-08/ bh-jp-08-vanBeek/ BlackHat-Japan-08-Van-Beek-ePassports.pdf.
-
(2008)
EPassports Reloaded
-
-
Van Beek, J.1
-
42
-
-
77955069205
-
-
International Civil Aviation Organization (October 31)
-
"PKD Procedures for the ICAO Public Key Directory (ICAO PKD), Version 2.0," International Civil Aviation Organization (October 31, 2006), http://www2.icao.int/en/MRTD/Downloads/PKD%20Documents/PKD-Procedures-Final- Version.pdf.
-
(2006)
PKD Procedures for the ICAO Public Key Directory (ICAO PKD), Version 2.0
-
-
-
43
-
-
77955075509
-
-
International Civil Aviation Organization (April1)
-
"PKD Regulations for the ICAO Public Key Directory (ICAO PKD)," International Civil Aviation Organization (April1, 2007), http://www2.icao.int/ en/MRTD/Downloads/PKD%20Documents/PKD-Regultions-Final-Version.pdf.
-
(2007)
PKD Regulations for the ICAO Public Key Directory (ICAO PKD)
-
-
-
44
-
-
77955061885
-
-
ICAO PKD Update, International Civil Aviation Organization, Technical Advisory Group on Machine Readable Travel Documents (April 22)
-
"ICAO PKD Update," International Civil Aviation Organization, Technical Advisory Group on Machine Readable Travel Documents (April 22, 2008), http://www.icao.int/icao/en/atb/meetings/2008/TagMRTD18/TagMrtd18-ip04.pdf.
-
(2008)
-
-
-
45
-
-
77955072033
-
Elvis has left the border: EPassport faking guide unleashed
-
(September 30)
-
J. Lettice, "Elvis Has Left the Border: ePassport Faking Guide Unleashed," The Register (September 30, 2008), http://www.theregister.co. uk/2008/09/30/epassport-hack-description/.
-
(2008)
The Register
-
-
Lettice, J.1
-
47
-
-
29744436477
-
-
National Institute of Standards and Technology (NIST), FIPS PUB 201, Federal Information Processing Standards (February 25)
-
"Personal Identity Verification (PIV) of Federal Employees and Contractors," National Institute of Standards and Technology (NIST), FIPS PUB 201, Federal Information Processing Standards (February 25, 2005), http://web.archive.org/web/20050404114420/http://csrc.ncsl.nist.gov/ publications/fips/fips201/FIPS-201-022505.pdf.
-
(2005)
Personal Identity Verification (PIV) of Federal Employees and Contractors
-
-
-
48
-
-
77955912574
-
-
Special Publication 800-73-82, National Institute of Standards and Technology (September)
-
R. Chandramouli, J. F. Dray, H. Ferraiolo, S. B. Guthery, W. MacGregor, and K. Mehta, "Interfaces for Personal Identity Verification-Part 1: End-Point PIV Card Application, Namespace, Data Model and Representation," Special Publication 800-73-82, National Institute of Standards and Technology (September 2008), http://csrc.nist.gov/publications/nistpubs/800-73-2/sp800-73- 2-part1-datamodel-final.pdf.
-
(2008)
Interfaces for Personal Identity Verification-Part 1: End-Point PIV Card Application, Namespace, Data Model and Representation
-
-
Chandramouli, R.1
Dray, J.F.2
Ferraiolo, H.3
Guthery, S.B.4
MacGregor, W.5
Mehta, K.6
-
50
-
-
77955062322
-
-
Government Smart Card Interagency Advisory Board, Physical Access Interagency Interoperability Working Group (July 30)
-
"Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems, Version 2.2," Government Smart Card Interagency Advisory Board, Physical Access Interagency Interoperability Working Group (July 30, 2004), http://www.smart.gov/information/TIG-SCEPACS-v2.2.pdf.
-
(2004)
Technical Implementation Guidance: Smart Card Enabled Physical Access Control Systems, Version 2.2
-
-
-
51
-
-
77955069809
-
-
Document SEIWG-012, U.S. Department of Defense, Security Enterprise Integration Working Group (SEIWG), Washington, D.C.(February 28)
-
"Prime Item Product Function Specification for Magnetic Stripe Credentials (MSC)," Document SEIWG-012, U.S. Department of Defense, Security Enterprise Integration Working Group (SEIWG), Washington, D.C.(February 28, 1994).
-
(1994)
Prime Item Product Function Specification for Magnetic Stripe Credentials (MSC)
-
-
-
52
-
-
77955068704
-
-
Federal Information Processing Standard FIPS PUB 201, National Institute of Standards and Technology (November 8)
-
"Personal Identity Verification (PIV) for Federal Employees and Contractors: Public Draft Version 1.0," Federal Information Processing Standard FIPS PUB 201, National Institute of Standards and Technology (November 8, 2004), http://web.archive.org/web/ 20041112042821/http://csrc.nist.gov/ publications/drafts/draft-FIPS-201-110804-public1.pdf.
-
(2004)
Personal Identity Verification (PIV) for Federal Employees and Contractors: Public Draft Version 1.0
-
-
-
53
-
-
77955073487
-
-
Thomas J. Watson Research Center Research Report RC23871, IBM Corporation (January)
-
P. A. Karger, "FIPS PUB 201 Security and Privacy Recommendations," Thomas J. Watson Research Center Research Report RC23871, IBM Corporation (January, 2005), http://domino.watson.ibm.com/library/CyberDig. nsf/1e4115aea78b6e7c85256b360066f0d4/0bb070e69e4f41518525711000536e73? OpenDocument.
-
(2005)
FIPS PUB 201 Security and Privacy Recommendations
-
-
Karger, P.A.1
-
60
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
Lecture Notes in Computer Science 1895, Springer-Verlag, Berlin (October)
-
G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll, "Verification of a Formal Security Model for Multiapplicative Smart Cards," Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), Lecture Notes in Computer Science 1895, Springer-Verlag, Berlin (October 2000), pp. 17-36.
-
(2000)
Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000)
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
61
-
-
0011326587
-
-
International Organization for Standardization, ISO/IEC 15408-1, 15408-2, and 15408-15413
-
"Information Technology-Security Techniques-Evaluation Criteria for IT Security-Parts 1, 2, and 3," International Organization for Standardization, ISO/IEC 15408-1, 15408-2, and 15408-15413 (1999).
-
(1999)
Information Technology-Security Techniques-Evaluation Criteria for IT Security-Parts 1, 2, and 3
-
-
-
62
-
-
0003400251
-
-
Technical Report MTR-2997, Rev. 1, The MITRE Corporation, HQ Electronic Systems Division (March)
-
D. E. Bell and L. J. La Padula, "Secure Computer System: Unified Exposition and Multics Interpretation," Technical Report MTR-2997, Rev. 1, The MITRE Corporation, HQ Electronic Systems Division (March 1976), http://csrc.nist.gov/publications/history/bell76.pdf.
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
La Padula, L.J.2
-
63
-
-
0003400255
-
-
Technical Report MTR-3153, The MITRE Corporation, HQ Electronic Systems Division (April)
-
K. J. Biba, "Integrity Considerations for Secure Computer Systems," Technical Report MTR-3153, The MITRE Corporation, HQ Electronic Systems Division (April 1977).
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
64
-
-
77952286492
-
-
Research Report RC 21673, IBM Research Division, Thomas J. Watson Research Center, (February 22)
-
P. A. Karger, "Multi-Organizational Mandatory Access Controls for Commercial Applications," Research Report RC 21673, IBM Research Division, Thomas J. Watson Research Center, (February 22, 2000) http://domino.watson.ibm. com/library/CyberDig.nsf/1e4115aea78b6e7c85256b360066f0d4/ 3071057a742ec56285256897006c5307?OpenDocument.
-
(2000)
Multi-Organizational Mandatory Access Controls for Commercial Applications
-
-
Karger, P.A.1
|