G. Alpár, L. Batina, and R. Verdult, Using NFC Phones for Proving Credentials, MMB & DFT 2012, pp.317-330, 2012.
DOI : 10.1007/978-3-642-28540-0_26

G. Alpár, J. Hoepman, and J. Siljee, The Identity Crisis. Security, Privacy and Usability Issues in Identity Management, Journal of Information System Security, vol.8, issue.3, p.2013

G. Alpár and B. Jacobs, Credential Design in Attribute-Based Identity Management, TILTing Perspectives, 2013.

A. Bhargav-spantzel, J. Camenisch, T. Gross, and D. Sommer, User centricity: A taxonomy and open issues*, Journal of Computer Security, vol.15, issue.5, pp.493-527, 2007.
DOI : 10.3233/JCS-2007-15502

P. Bichsel, J. Camenisch, B. Decker, J. Lapon, V. Naessens et al., Data-Minimizing Authentication Goes Mobile, Communications and Multimedia Security, pp.55-71, 2012.
DOI : 10.1007/978-3-642-32805-3_5

S. A. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology ? Eurocrypt 2001, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

J. Camenisch and A. Lysyanskaya, A Signature Scheme with Efficient Protocols, Security in Communication Networks, pp.268-289, 2003.
DOI : 10.1007/3-540-36413-7_20

K. Cameron, Laws of identity. http://www.identityblog.com/stories, 2004.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

R. Dhamija and L. Dusseault, The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008.
DOI : 10.1109/MSP.2008.49

A. Jøsang, M. A. Zomai, and S. Suriadi, Usability and privacy in identity management architectures, Proceedings of the fifth Australasian symposium on ACSW frontiers, pp.143-152, 2007.

E. Maler and D. Reed, The Venn of Identity: Options and Issues in Federated Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.16-23, 2008.
DOI : 10.1109/MSP.2008.50

F. Morgner, D. Oepen, W. Müller, and J. Redlich, Mobile Smart Card Reader Using NFC-Enabled Smartphones, Security and Privacy in Mobile Information and Communication Systems (MobiSec), pp.24-37, 2012.
DOI : 10.1007/978-3-642-04474-8_3

W. Mostowski and P. Vullers, Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, Security and Privacy in Communication Networks ? SecureComm 2011, pp.243-260, 2011.
DOI : 10.1007/3-540-45682-1_31

H. Nissenbaum, Privacy as Contextual Integrity, Washington Law Review, vol.79, issue.1, pp.119-158, 2004.

A. Pfitzmann and K. Borcea-pfitzmann, Lifelong Privacy: Privacy and Identity Management for Life, Privacy and Identity Management for Life 5th IFIP/PrimeLife, International Summer School, pp.1-17, 2010.
DOI : 10.1007/978-3-642-14282-6_1

URL : https://hal.archives-ouvertes.fr/hal-01061067

P. Vullers and G. Alpár, Efficient Selective Disclosure on Smart Cards Using Idemix, Policies and Research in Identity Management (IDMAN), IFIP AICT 396, pp.53-67, 2013.
DOI : 10.1007/978-3-642-37282-7_5

URL : https://hal.archives-ouvertes.fr/hal-01470503