-
2
-
-
79951834998
-
A survey of system security in contactless electronic passports
-
Feb. Available: (Access Date: 4 May, 2012)
-
S.A. Anshuman, "A survey of system security in contactless electronic passports," J. of Comput. Security, vol. 19, no. 1, Feb. 2011, pp. 203-226. Available: http://iospress.metapress.com/content/8402gr10203t4236/. (Access Date: 4 May, 2012)
-
(2011)
J. of Comput. Security
, vol.19
, Issue.1
, pp. 203-226
-
-
Anshuman, S.A.1
-
3
-
-
77955608212
-
Biometric passports (ePassports)
-
A. Atanasiu, and M.I. Mihailescu, "Biometric passports (ePassports)," in 8th IEEE Int. Conf. on Commun. (COMM), Bucharest, Romania, 2010, pp. 443-446.
-
8th IEEE Int. Conf. on Commun. (COMM), Bucharest, Romania, 2010
, pp. 443-446
-
-
Atanasiu, A.1
Mihailescu, M.I.2
-
4
-
-
77956168943
-
Increasing privacy threats in the cyberspace: The case of Italian e-passports
-
Springer Berlin, Heidelberg
-
V. Auletta et al., "Increasing privacy threats in the cyberspace: The case of Italian e-passports," in Financial Cryptography and Data Security, vol. 6054, Springer Berlin, Heidelberg, 2010, pp. 94-104.
-
(2010)
Financial Cryptography and Data Security
, vol.6054
, pp. 94-104
-
-
Auletta, V.1
-
5
-
-
54249156664
-
E-passport: Securing international contacts with contactless chips
-
Springer Berlin, Heidelberg
-
G. Avoine, K. Kalach, and J. Quisquater, "E-passport: securing international contacts with contactless chips," in Financial Cryptography and Data Security, vol. 5143, Springer Berlin, Heidelberg, 2008, pp. 141-155.
-
(2008)
Financial Cryptography and Data Security
, vol.5143
, pp. 141-155
-
-
Avoine, G.1
Kalach, K.2
Quisquater, J.3
-
6
-
-
57049171408
-
Improved security notions and protocols for non-transferable identification
-
Springer Berlin, Heidelberg
-
C. Blundo et al., "Improved security notions and protocols for non-transferable identification," in Computer Security ESORICS'08, vol. 5283, Springer Berlin, Heidelberg, 2008, pp. 364-378.
-
(2008)
Computer Security ESORICS'08
, vol.5283
, pp. 364-378
-
-
Blundo, C.1
-
7
-
-
77950305081
-
Fakeproof e-passport is cloned in minutes
-
August 06. Available: (Access Date: 4 May, 2012)
-
S. Boggan, (2008, August 06). Fakeproof e-passport is cloned in minutes. The Times. Available: http://www.thetimes.co.uk/tto/news/. (Access Date: 4 May, 2012)
-
(2008)
The Times
-
-
Boggan, S.1
-
8
-
-
84867151096
-
-
The German Federal Office of Information Security BSI, Tech. Guidelines, TR-03110-3, Mar.
-
"Advanced security mechanisms for machine readable travel documents: EAC, PACE, and RI. v2.10," The German Federal Office of Information Security BSI, Tech. Guidelines, TR-03110-3, Mar. 2012.
-
(2012)
Advanced Security Mechanisms for Machine Readable Travel Documents: EAC, PACE, and RI. V2.10
-
-
-
9
-
-
38049173955
-
E-passport: The global traceability or how to feel like a UPS package
-
Springer Berlin, Heidelberg
-
D. Carluccio et al., "E-passport: the global traceability or how to feel like a UPS package," in Inform. Security Applicat., vol. 4298, Springer Berlin, Heidelberg, 2007, pp. 391-404.
-
(2007)
Inform. Security Applicat.
, vol.4298
, pp. 391-404
-
-
Carluccio, D.1
-
10
-
-
84867157773
-
-
Bonn-Aachen Int. Center for Inform. Technology, Nov. Available: (Access Date: 4 May, 2012)
-
J. Chapman, "Determining the security enhancement of biometrics in epassports," in Bonn-Aachen Int. Center for Inform. Technology, Nov. 2009. Available: http://cosec.bit.uni-bonn.de/fileadmin/user-upload/teaching/09ws/ 09ws-sem/biometry-ws09-chapman.pdf. (Access Date: 4 May, 2012)
-
(2009)
Determining the Security Enhancement of Biometrics in Epassports
-
-
Chapman, J.1
-
11
-
-
77955313332
-
Traceability attack against e-passports
-
Springer Berlin, Heidelberg
-
T. Chothia, and V.A. Smirnov, "Traceability attack against e-passports," in Financial Cryptography and Data Security, vol. 6052, Springer Berlin, Heidelberg, 2010, pp. 20-34.
-
(2010)
Financial Cryptography and Data Security
, vol.6052
, pp. 20-34
-
-
Chothia, T.1
Smirnov, V.A.2
-
12
-
-
84867170940
-
Supplemental access control (PACE v2): Security analysis of PACE integrated mapping
-
Available: (Access Date: 4 May, 2012)
-
J. Coron, et al., "Supplemental access control (PACE v2): security analysis of PACE integrated mapping," in Cryptology eprint archive report 2011/058, 2009. Available: http://eprint.iacr.org/2011/058.pdf. (Access Date: 4 May, 2012)
-
(2009)
Cryptology Eprint Archive Report 2011/058
-
-
Coron, J.1
-
13
-
-
84867180132
-
Israel cloned 1000s of UK passports and used airport security as mossad front
-
Mar 31, Available: (Access Date: 4 May, 2012)
-
"Israel cloned 1000s of UK passports and used airport security as mossad front," European Union Times, Mar 31, 2010, Available: http://www.eutimes.net/2010/03/israel-cloned-1000s-of-uk-passports-used- airportsecurity-as-mossad-front/. (Access Date: 4 May, 2012)
-
(2010)
European Union Times
-
-
-
14
-
-
77952652488
-
The electronic passport and the future of government-issued RFID-based identification
-
G. M. Ezovski, and S.E. Watkins, "The electronic passport and the future of government-issued RFID-based identification," in IEEE International Conference on RFID, 2007, pp. 15-22.
-
IEEE International Conference on RFID, 2007
, pp. 15-22
-
-
Ezovski, G.M.1
Watkins, S.E.2
-
15
-
-
79952256795
-
Secure and scalable RFID authentication protocol
-
Springer Berlin, Heidelberg
-
A. Fernandez-Mir, J. Castella-Roca, and A. Viejo, "Secure and scalable RFID authentication protocol," in Data Privacy Manage. and Autonomous and Spontaneous Security, vol. 6514, Springer Berlin, Heidelberg, 2011. pp. 231-243.
-
(2011)
Data Privacy Manage. and Autonomous and Spontaneous Security
, vol.6514
, pp. 231-243
-
-
Fernandez-Mir, A.1
Castella-Roca, J.2
Viejo, A.3
-
17
-
-
79952958289
-
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
-
G.P. Hancke, "Practical eavesdropping and skimming attacks on high-frequency RFID tokens," J. of Computer Security (RFID Sec'10 Asia), vol. 19, no. 2. 2011.
-
(2011)
J. of Computer Security (RFID Sec'10 Asia)
, vol.19
, Issue.2
-
-
Hancke, G.P.1
-
18
-
-
84867180134
-
Moving to the third generation of electronic passports
-
Available: (Access Date: 4 May, 2012)
-
V. Heino, "Moving to the third generation of electronic passports," the Silicon Trust Gemalto, 2011. Available: http://www.securitydocumentworld.com/client-files/moving-to-the-third- generation-of-electronic-passports-october-20111.pdf. (Access Date: 4 May, 2012)
-
(2011)
The Silicon Trust Gemalto
-
-
Heino, V.1
-
19
-
-
81455146058
-
A note on the relay attacks on E-passports: The case of Czech E-passports
-
Available: (Access Date: 4 May, 2012)
-
M. Hlavac, and T. Rosa, "A note on the relay attacks on E-passports: The case of Czech E-passports," Cryptology eprint archive report 2007/244, 2007. Available: http://eprint.iacr.org/2007/244.pdf. (Access Date: 4 May, 2012)
-
(2007)
Cryptology Eprint Archive Report 2007/244
-
-
Hlavac, M.1
Rosa, T.2
-
20
-
-
70350583038
-
Known plaintext only attack on RSA-CRT with Montgomery multiplication
-
Springer Berlin, Heidelberg
-
M. Hlavac, "Known plaintext only attack on RSA-CRT with Montgomery multiplication," in Cryptographic Hardware and Embedded Systems, vol. 5747, Springer Berlin, Heidelberg, 2009, pp. 128-140.
-
(2009)
Cryptographic Hardware and Embedded Systems
, vol.5747
, pp. 128-140
-
-
Hlavac, M.1
-
21
-
-
33845240394
-
Crossing borders: Security and privacy issues of the European e-Passport
-
Springer Berlin, Heidelberg
-
J. Hoepman et al., "Crossing borders: Security and privacy issues of the European e-Passport," in Advances in Information and Computer Security, vol. 4266, Springer Berlin, Heidelberg, 2006, pp. 152-167.
-
(2006)
Advances in Information and Computer Security
, vol.4266
, pp. 152-167
-
-
Hoepman, J.1
-
22
-
-
38049074796
-
Power and EM attacks on passive 13.56 MHz RFID devices
-
Springer Berlin, Heidelberg
-
M. Hutter, S. Mangard, and M. Feldhofer, "Power and EM attacks on passive 13.56 MHz RFID devices," in Cryptographic Hardware and Embedded Systems, vol. 4727, Springer Berlin, Heidelberg, 2007, pp. 320-333.
-
(2007)
Cryptographic Hardware and Embedded Systems
, vol.4727
, pp. 320-333
-
-
Hutter, M.1
Mangard, S.2
Feldhofer, M.3
-
24
-
-
0742290133
-
An introduction to biometric recognition
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," in IEEE Trans. on Circuits and Systems for Video Technology, vol.14, no. 1, 2004, pp. 4-20.
-
(2004)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
25
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels, "RFID security and privacy: a research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 381-394.
-
(2006)
IEEE J. Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
26
-
-
33847249519
-
Security and privacy issues in E-passports
-
A. Juels, D. Molnar, and D. Wagner, "Security and privacy issues in E-passports," in Proc. Anonymous Security and Privacy for Emerging Areas in Communications Networks, 2005, pp. 74-88.
-
Proc. Anonymous Security and Privacy for Emerging Areas in Communications Networks, 2005
, pp. 74-88
-
-
Juels, A.1
Molnar, D.2
Wagner, D.3
-
27
-
-
84878780763
-
Security and privacy issues in machine readable travel documents
-
Available: (Access Date: 4 May, 2012)
-
P.A. Karger et al., "Security and privacy issues in machine readable travel documents," IBM Research Report, TR RC 23575 (W0504-003), , 2005. Available: http://domino.watson.ibm.com/library/CyberDig.nsf/papers/ 751B6341BFB9015485256FDB005DB216/$File/RC23575.pdf. (Access Date: 4 May, 2012)
-
(2005)
IBM Research Report, TR RC 23575 (W0504-003)
-
-
Karger, P.A.1
-
28
-
-
84867177738
-
-
Available: (Access Date: 4 May, 2012)
-
A. Laurie, "RF idiot", Available: http://rfidiot.org/. (Access Date: 4 May, 2012)
-
RF Idiot
-
-
Laurie, A.1
-
29
-
-
37849033268
-
E-passports as a means towards the first world-wide public key infrastructure
-
Springer Berlin, Heidelberg
-
D. Lekkas, and D. Gritzalis, "E-passports as a means towards the first world-wide public key infrastructure," in Public Key Infrastructure, vol. 4582, Springer Berlin, Heidelberg 2007, pp. 34-48.
-
(2007)
Public Key Infrastructure
, vol.4582
, pp. 34-48
-
-
Lekkas, D.1
Gritzalis, D.2
-
30
-
-
84867157777
-
Code highlights E-passport eavesdropping risk: What RFIDIOt chipped my passport?
-
Available: (Access Date: 4 May, 2012)
-
J. Leyden, "Code highlights E-passport eavesdropping risk: What RFIDIOt chipped my passport?," The Register, 2006. Available: http://www.theregister.co.uk/2006/10/31/rfid-e-passport-attack/. (Access Date: 4 May, 2012)
-
(2006)
The Register
-
-
Leyden, J.1
-
31
-
-
84867180135
-
RFID hack attack: E-passport cloning risks exposed
-
Available: (Access Date: 4 May, 2012)
-
J. Leyden, "RFID hack attack: E-passport cloning risks exposed,", The Register, 2006. Available: http://www.theregister.co.uk/ 2006/08/04/epassport-hack-attack/. (Access Date: 4 May, 2012)
-
(2006)
The Register
-
-
Leyden, J.1
-
32
-
-
68349150582
-
Electronic passports - From secure specifications to secure implementations
-
I. Liersch, "Electronic passports - from secure specifications to secure implementations," in Inform. Security Tech. Rep., vol.14, no.2, 2009, pp. 96-100.
-
(2009)
Inform. Security Tech. Rep.
, vol.14
, Issue.2
, pp. 96-100
-
-
Liersch, I.1
-
33
-
-
38349006182
-
E-passport: Cracking basic access control keys
-
Springer Berlin, Heidelberg
-
Y. Liu et al., "E-passport: cracking basic access control keys," On the Move to Meaningful Internet Systems, vol. 4804, Springer Berlin, Heidelberg, 2007, pp. 1531-1547.
-
(2007)
On the Move to Meaningful Internet Systems
, vol.4804
, pp. 1531-1547
-
-
Liu, Y.1
-
34
-
-
70350155239
-
An RFID attacker behavior taxonomy
-
L. Mirowski, J. Hartnett, and R, Williams, "An RFID attacker behavior taxonomy," IEEE Pervasive Computing, vol.8, no.4, 2009, pp. 79-84.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.4
, pp. 79-84
-
-
Mirowski, L.1
Hartnett, J.2
Williams, R.3
-
35
-
-
67650336836
-
Security mechanisms and access control infrastructure for E-passport and general purpose e-documents
-
P. Najera, F. Moyano, and J. Lopez, "Security mechanisms and access control infrastructure for E-passport and general purpose e-documents," J. Universal Computer Science, vol.15, no. 5, 2009, pp. 970-991.
-
(2009)
J. Universal Computer Science
, vol.15
, Issue.5
, pp. 970-991
-
-
Najera, P.1
Moyano, F.2
Lopez, J.3
-
36
-
-
84867170444
-
A Survey on the evolution of cryptographic protocols in ePassports
-
Available: (Access Date: 4 May, 2012)
-
R. Nithyanand, "A Survey on the evolution of cryptographic protocols in ePassports," Cryptology eprint archive 2009/200, 2009. Available: http://eprint.iacr.org/2009/200.pdf. (Access Date: 4 May, 2012)
-
(2009)
Cryptology Eprint Archive 2009/200
-
-
Nithyanand, R.1
-
37
-
-
41549094864
-
An on-line secure E-passport protocol
-
Springer Berlin / Heidelberg
-
V. Pasupathinathan, J. Pieprzyk, and H. Wang, "An on-line secure E-passport protocol," in Information Security Practice and Experience, vol. 4991, Springer Berlin / Heidelberg, 2008, pp. 14-28.
-
(2008)
Information Security Practice and Experience
, vol.4991
, pp. 14-28
-
-
Pasupathinathan, V.1
Pieprzyk, J.2
Wang, H.3
-
39
-
-
84867157775
-
-
Passport Division, Consular Affairs Bureau, Ministry of Foreign Affairs of Japan, Available: (Access Date: 4 May, 2012)
-
"Protection profile for ePassport IC with active authentication," Passport Division, Consular Affairs Bureau, Ministry of Foreign Affairs of Japan, 2010. Available: http://www.commoncriteriaportal.org/ files/ppfiles/c0247-epp.pdf. (Access Date: 4 May, 2012)
-
(2010)
Protection Profile for EPassport IC with Active Authentication
-
-
-
41
-
-
84867180136
-
EPassport privacy attack
-
Apr. Available: (Access Date: 4 May, 2012)
-
H. Robroch, "ePassport privacy attack," Cards Asia Singapore, Apr. 2006. Available: http://www.riscure.com/archive/200604-CardsAsiaSing- ePassport-Privacy.pdf. (Access Date: 4 May, 2012)
-
(2006)
Cards Asia Singapore
-
-
Robroch, H.1
-
42
-
-
42549157259
-
A framework for assessing RFID system security and privacy risks
-
P.A. Rotter, "A framework for assessing RFID system security and privacy risks," IEEE Pervasive Computing, vol.7, no.2, 2008, pp. 70-77.
-
(2008)
IEEE Pervasive Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Rotter, P.A.1
-
43
-
-
84867180139
-
How to clone and modify E-passports
-
Sep. Available: (Access Date: 4 May, 2012)
-
B. Schneier, "How to clone and modify E-passports," Schneier on Security, Sep. 2008. Available: http://www.schneier.com/blog/archives/2008/09/ how-to-clone-an.html. (Access Date: 4 May, 2012)
-
(2008)
Schneier on Security
-
-
Schneier, B.1
-
44
-
-
84867157780
-
RFID cards and Man-in-the-Middle Attacks
-
Apr. Available: (Access Date: 4 May, 2012)
-
B. Schneier, "RFID cards and Man-in-the-Middle Attacks," Schneier on Security, Apr. 2006. Available: http://www.schneier.com/blog/ archives/2006/04/rfid-cards-and.html. (Access Date: 4 May, 2012)
-
(2006)
Schneier on Security
-
-
Schneier, B.1
-
47
-
-
84867157778
-
-
The ICAO Secretary General, International Civil Aviation Organization
-
The ICAO Secretary General, "Specifications for electronically Enabled MRTDs with biometric identification capability, Doc 9303, Machine Readable Travel Documents (MRTDs)," International Civil Aviation Organization, Part 3, Vol. 2, 2008.
-
(2008)
Specifications for Electronically Enabled MRTDs with Biometric Identification Capability, Doc 9303, Machine Readable Travel Documents (MRTDs)
, vol.2
, Issue.PART 3
-
-
-
48
-
-
84867144884
-
-
The ICAO Secretary General, ISO/IEC JTC1 SC17 WG3/TF1 for ICAO-NTWG," Ver. 10, May
-
The ICAO Secretary General, "Supplement to Doc 9303, Machine Readable Travel Documents," ISO/IEC JTC1 SC17 WG3/TF1 for ICAO-NTWG," Ver. 10, May 2011.
-
(2011)
Supplement to Doc 9303, Machine Readable Travel Documents
-
-
-
50
-
-
84867174779
-
-
UK, Feb. Available: (Access Date: 4 May, 2012)
-
L. Thomson, "Hacker clones passports in drive-by RFID heist," V3 UK, Feb. 2009. Available: http://www.v3.co.uk/v3-uk/news/1953428/ hackerclones-passports-drive-rfid-heist. (Access Date: 4 May, 2012)
-
(2009)
Hacker Clones Passports in Drive-by RFID Heist
-
-
Thomson, L.1
-
51
-
-
84867174778
-
Password authenticated key agreement for contactless smart cards
-
Available: (Access Date: 4 May, 2012)
-
M. Ullmann et al., "Password authenticated key agreement for contactless smart cards," Workshop on RFID Security, 2008. Available: http://events.iaik.tugraz.at/RFIDSec08/Papers/Publication/14%20-%20Ullmann%20- %20PW%20Authenticated%20Key%20Agreement%20-%20Paper.pdf. (Access Date: 4 May, 2012)
-
Workshop on RFID Security, 2008
-
-
Ullmann, M.1
-
52
-
-
84871181622
-
Formal security analysis of Australian and E. U. E-passport implementation
-
Australia
-
P. Vijayakrishnan, J. Pieprzyk, and H. Wang, "Formal security analysis of Australian and E. U. E-passport implementation," in Proc. 6th Australasian conf. on inform. security, vol. 81, Australia, 2008, pp. 75-82.
-
(2008)
Proc. 6th Australasian Conf. on Inform. Security
, vol.81
, pp. 75-82
-
-
Vijayakrishnan, P.1
Pieprzyk, J.2
Wang, H.3
|