P. Bichsel, J. Camenisch, B. Decker, J. Lapon, V. Naessens et al., Data-Minimizing Authentication Goes Mobile, Communications and Multimedia Security, pp.55-71, 2012.
DOI : 10.1007/978-3-642-32805-3_5

P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, Anonymous credentials on a standard java card, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.600-610, 2009.
DOI : 10.1145/1653662.1653734

F. F. Brasser, S. Bugiel, A. Filyanov, A. Sadeghi, and S. Schulz, Softer smartcards -usable cryptographic tokens with secure execution, In Financial Cryptography, vol.7397, pp.329-343, 2012.

E. Brickell, J. Camenisch, and L. Chen, Direct anonymous attestation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.132-145, 2004.
DOI : 10.1145/1030083.1030103

D. Cock, K. Wouters, and B. Preneel, Introduction to the belgian eid card, Public Key Infrastructure, pp.1-13, 2004.

J. Lapon, M. Kohlweiss, B. Decker, and V. Naessens, Analysis of Revocation Strategies for Anonymous Idemix Credentials, Communications and Multimedia Security, pp.3-17, 2011.
DOI : 10.1007/978-3-642-24712-5_1

J. Mccune, Y. Li, N. Qu, Z. Zhou, A. Datta et al., TrustVisor: Efficient TCB Reduction and Attestation, 2010 IEEE Symposium on Security and Privacy, pp.143-158, 2010.
DOI : 10.1109/SP.2010.17

J. M. Mccune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, Flicker, ACM SIGOPS Operating Systems Review, vol.42, issue.4, pp.315-328, 2008.
DOI : 10.1145/1357010.1352625

W. Mostowski and P. Vullers, Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, Security and Privacy in Communication Networks, pp.243-260, 2012.
DOI : 10.1007/3-540-45682-1_31

I. Naumann and G. Hogben, Privacy features of European eID card specifications, Network Security, vol.2008, issue.8, 2009.
DOI : 10.1016/S1353-4858(08)70097-7

J. Vossaert, J. Lapon, B. Decker, and V. Naessens, User-centric identity management using trusted modules, Public Key Infrastructures, Services and Applications, pp.155-170, 2011.

J. Vossaert, J. Lapon, B. Decker, and V. Naessens, Client-Side Biometric Verification Based on Trusted Computing, Communications and Multimedia Security, pp.34-49, 2013.
DOI : 10.1007/978-3-642-40779-6_3

URL : https://hal.archives-ouvertes.fr/hal-01492832

P. Vullers and G. Alpár, Efficient Selective Disclosure on Smart Cards Using Idemix, Policies and Research in Identity Management, pp.53-67, 2013.
DOI : 10.1007/978-3-642-37282-7_5

URL : https://hal.archives-ouvertes.fr/hal-01470503