메뉴 건너뛰기




Volumn , Issue , 2012, Pages 383-392

A privacy preserving application acquisition protocol

Author keywords

Application Installation Protocol; CasperFDR; Privacy Preservation; Smart Cards; User Centric Smart Card Ownership Model

Indexed keywords

ACQUISITION PROCESS; ACQUISITION PROTOCOLS; APPLICATION PROVIDERS; APPLICATION SCENARIO; CASPERFDR; CHANNEL PROTOCOLS; DYNAMIC ENVIRONMENTS; FORMAL ANALYSIS; OWNERSHIP MODEL; PRIVACY PRESERVATION; PRIVACY PRESERVING; SECURE CHANNELS; SERVICE MANAGERS; SMART CARD INDUSTRY; USER-CENTRIC;

EID: 84868107460     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.47     Document Type: Conference Paper
Times cited : (13)

References (45)
  • 4
    • 68349148025 scopus 로고    scopus 로고
    • Multiapplication Smart Card: Towards an Open Smart Card?
    • D. Sauveron, "Multiapplication Smart Card: Towards an Open Smart Card?" Inf. Secur. Tech. Rep., vol. 14, no. 2, pp. 70-78, 2009.
    • (2009) Inf. Secur. Tech. Rep. , vol.14 , Issue.2 , pp. 70-78
    • Sauveron, D.1
  • 5
    • 77954790153 scopus 로고    scopus 로고
    • GSM Association, White Paper Version 1.0
    • "Mobile NFC Services," GSM Association, White Paper Version 1.0, 2007.
    • (2007) Mobile NFC Services
  • 6
    • 84868127810 scopus 로고    scopus 로고
    • Anonymous
    • Anonymous.
  • 9
    • 79951802088 scopus 로고    scopus 로고
    • Trusted Computing Group Std., Rev. July
    • Trusted Module Specification 1.2, Trusted Computing Group Std., Rev. 103, July 2007.
    • (2007) Trusted Module Specification 1.2 , pp. 103
  • 14
    • 0036505541 scopus 로고    scopus 로고
    • Authentication Protocols for Mobile Network Environment Value-Added Services
    • IEEE, March
    • G. Horn, K. M. Martin, and C. J. Mitchell, "Authentication Protocols for Mobile Network Environment Value-Added Services," in IEEE Transactions on Vehicular Technology, vol. 51. IEEE, March 2002, pp. 383-392.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 18
    • 84868137041 scopus 로고    scopus 로고
    • MAOSCO, Tech. Rep. MAO-DOC-TEC-008 v2.21, [Online]. Available
    • "Multos: Guide to Loading and Deleting Applications," MAOSCO, Tech. Rep. MAO-DOC-TEC-008 v2.21, 2006. [Online]. Available: http://www.multos.com/downloads/technical/glda.pdf
    • (2006) Multos: Guide to Loading and Deleting Applications
  • 21
    • 0028272762 scopus 로고
    • Privacy and Authentication for Wireless Local Area Networks
    • First Quarter
    • A. Aziz and W. Diffie, "Privacy And Authentication For Wireless Local Area Networks," IEEE Personal Communications, vol. 1, pp. 25-31, First Quarter 1994.
    • (1994) IEEE Personal Communications , vol.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 22
    • 84958780603 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • Computer Security - ESORICS 98, ser. J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds. Springer Berlin / Heidelberg, 10.1007/BFb0055870
    • G. Horn and B. Preneel, "Authentication and payment in future mobile systems," in Computer Security - ESORICS 98, ser. Lecture Notes in Computer Science, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds. Springer Berlin / Heidelberg, 1998, vol. 1485, pp. 277-293, 10.1007/BFb0055870.
    • (1998) Lecture Notes in Computer Science , vol.1485 , pp. 277-293
    • Horn, G.1    Preneel, B.2
  • 24
    • 84902511616 scopus 로고    scopus 로고
    • A Secure Channel Protocol for Multi-application Smart Cards based on Public Key Cryptography
    • D. Chadwick and B. Prennel, Eds. Springer, September
    • K. Markantonakis and K. Mayes, "A Secure Channel Protocol for Multi-application Smart Cards based on Public Key Cryptography," in CMS 2004 - Eight IFIP TC-6-11 Conference on Communications and Multimedia Security, D. Chadwick and B. Prennel, Eds. Springer, September 2004, pp. 79-96.
    • (2004) CMS 2004 - Eight IFIP TC-6-11 Conference on Communications and Multimedia Security , pp. 79-96
    • Markantonakis, K.1    Mayes, K.2
  • 25
    • 33745772810 scopus 로고    scopus 로고
    • Design, Installation and Execution of a Security Agent for Mobile Stations
    • Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS, ser. J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds., Tarragona, Spain: Springer, April
    • W. G. Sirett, J. A. MacDonald, K. Mayes, and C. Markantonakis, "Design, Installation and Execution of a Security Agent for Mobile Stations," in Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS, ser. LNCS, J. Domingo-Ferrer, J. Posegga, and D. Schreckling, Eds., vol. 3928. Tarragona, Spain: Springer, April 2006, pp. 1-15.
    • (2006) LNCS , vol.3928 , pp. 1-15
    • Sirett, W.G.1    MacDonald, J.A.2    Mayes, K.3    Markantonakis, C.4
  • 27
    • 0032069870 scopus 로고    scopus 로고
    • Key control in key agreement protocols
    • May
    • C. Mitchell, M. Ward, and P. Wilson, "Key control in key agreement protocols," Electronics Letters, vol. 34, no. 10, pp. 980-981, May 1998.
    • (1998) Electronics Letters , vol.34 , Issue.10 , pp. 980-981
    • Mitchell, C.1    Ward, M.2    Wilson, P.3
  • 29
    • 52249121443 scopus 로고    scopus 로고
    • Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?
    • D. Sauveron and P. Dusart, "Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?" Future Generation Communication and Networking, vol. 2, pp. 423-428, 2007.
    • (2007) Future Generation Communication and Networking , vol.2 , pp. 423-428
    • Sauveron, D.1    Dusart, P.2
  • 30
    • 0004093038 scopus 로고    scopus 로고
    • New York, NY, USA: John Wiley & Sons, Inc.
    • W. Rankl and W. Effing, Smart Card Handbook. New York, NY, USA: John Wiley & Sons, Inc., 2003.
    • (2003) Smart Card Handbook
    • Rankl, W.1    Effing, W.2
  • 32
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • Berkeley, CA, USA: USENIX Association, [Online]. Available
    • R. Kennell and L. H. Jamieson, "Establishing the genuinity of remote computer systems," in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12. Berkeley, CA, USA: USENIX Association, 2003, pp. 21-21. [Online]. Available: http://portal.acm.org/citation.cfm?id=1251353. 1251374
    • (2003) Proceedings of the 12th Conference on USENIX Security Symposium , vol.12 , pp. 21-21
    • Kennell, R.1    Jamieson, L.H.2
  • 34
    • 77649257869 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) Std., June
    • FIPS 186-3 : Digital Signature Standard (DSS), Online, National Institute of Standards and Technology (NIST) Std., June 2009.
    • (2009) FIPS 186-3: Digital Signature Standard (DSS), Online
  • 36
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • January [Online]. Available
    • G. Lowe, "Casper: a compiler for the analysis of security protocols," J. Comput. Secur., vol. 6, pp. 53-84, January 1998. [Online]. Available: http://dl.acm.org/citation.cfm?id=353677.353680
    • (1998) J. Comput. Secur. , vol.6 , pp. 53-84
    • Lowe, G.1
  • 44
    • 4043135942 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) Std.
    • FIPS 180-2: Secure Hash Standard (SHS), National Institute of Standards and Technology (NIST) Std., 2002.
    • (2002) FIPS 180-2: Secure Hash Standard (SHS)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.