Using NFC Phones for Proving Credentials, MMB & DFT 2012, pp.317-330, 2012. ,
DOI : 10.1007/978-3-642-28540-0_26
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management, Journal of Information System Security, vol.8, issue.3, p.2013 ,
Credential Design in Attribute-Based Identity Management, TILTing Perspectives, 2013. ,
User centricity: A taxonomy and open issues*, Journal of Computer Security, vol.15, issue.5, pp.493-527, 2007. ,
DOI : 10.3233/JCS-2007-15502
Data-Minimizing Authentication Goes Mobile, Communications and Multimedia Security, pp.55-71, 2012. ,
DOI : 10.1007/978-3-642-32805-3_5
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000. ,
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology ? Eurocrypt 2001, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
A Signature Scheme with Efficient Protocols, Security in Communication Networks, pp.268-289, 2003. ,
DOI : 10.1007/3-540-36413-7_20
Laws of identity. http://www.identityblog.com/stories, 2004. ,
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
The Seven Flaws of Identity Management: Usability and Security Challenges, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.24-29, 2008. ,
DOI : 10.1109/MSP.2008.49
Usability and privacy in identity management architectures, Proceedings of the fifth Australasian symposium on ACSW frontiers, pp.143-152, 2007. ,
The Venn of Identity: Options and Issues in Federated Identity Management, IEEE Security & Privacy Magazine, vol.6, issue.2, pp.16-23, 2008. ,
DOI : 10.1109/MSP.2008.50
Mobile Smart Card Reader Using NFC-Enabled Smartphones, Security and Privacy in Mobile Information and Communication Systems (MobiSec), pp.24-37, 2012. ,
DOI : 10.1007/978-3-642-04474-8_3
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, Security and Privacy in Communication Networks ? SecureComm 2011, pp.243-260, 2011. ,
DOI : 10.1007/3-540-45682-1_31
Privacy as Contextual Integrity, Washington Law Review, vol.79, issue.1, pp.119-158, 2004. ,
Lifelong Privacy: Privacy and Identity Management for Life, Privacy and Identity Management for Life 5th IFIP/PrimeLife, International Summer School, pp.1-17, 2010. ,
DOI : 10.1007/978-3-642-14282-6_1
URL : https://hal.archives-ouvertes.fr/hal-01061067
Efficient Selective Disclosure on Smart Cards Using Idemix, Policies and Research in Identity Management (IDMAN), IFIP AICT 396, pp.53-67, 2013. ,
DOI : 10.1007/978-3-642-37282-7_5
URL : https://hal.archives-ouvertes.fr/hal-01470503