Sicherheitsmechanismen für kontaktlose chips im deutschen elektronischen personalausweis . Datenschutz und Datensicherheit -DuD, 2008. ,
DOI : 10.1007/s11623-008-0026-7
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002. ,
DOI : 10.1145/586110.586114
The 7 laws of identity. The Identity Weblog, 2006. ,
Foundations of security analysis and design v. chapter Federated Identity Management, pp.96-120, 2009. ,
Mobile security card se 1.0: A secure flash solution. http://www.gide .com/gd media/media, 2010. ,
Tor: The secondgeneration onion router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
Secure, Consumer-Friendly Web Authentication and Payments with a Phone, Conference on Mobile Computing, Applications, and Services (MobiCASE'10), 2010. ,
DOI : 10.1007/11889663_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.222.3952
An introduction to cardspace ,
Porki: Portable credentials via proxy certificates in web environments, Public Key Infrastructure, 2010. ,
DOI : 10.1007/978-3-642-22633-5_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.9058
Single sign-on for the internet: a security story, 2007. ,
Measuring the user s anonymity when disclosing personal properties, MetriSec. IEEE, 2010. ,
DOI : 10.1145/1853919.1853922
URL : https://lirias.kuleuven.be/bitstream/123456789/286148/1/Verslype_MetriSec2010.pdf
User-centric identity management using trusted modules, Public Key Infrastructure, 2010. ,
DOI : 10.1016/j.mcm.2012.06.010
URL : https://lirias.kuleuven.be/bitstream/123456789/285363/3/EuroPKI10.pdf
A Smart Card Based Solution for User-Centric Identity Management, PrimeLife International Summer School, pp.2-6, 2010. ,
DOI : 10.1007/978-3-642-20769-3_14
URL : https://lirias.kuleuven.be/bitstream/123456789/272347/1/main.pdf