Privacy Architectures: Reasoning about Data Minimisation and Integrity, Security and Trust Management ? STM'14, pp.17-32, 2014. ,
DOI : 10.1007/978-3-319-11851-2_2
URL : https://hal.archives-ouvertes.fr/hal-01054758
Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004. ,
DOI : 10.1145/1030083.1030106
URL : http://hovav.net/dist/preteripsistic.ps
Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures, Formal Methods ? FM'15, pp.90-107, 2015. ,
DOI : 10.1007/978-3-319-19249-9_7
URL : https://hal.archives-ouvertes.fr/hal-01247110
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication, International Workshop on Security ? IWSEC'08, pp.219-230, 2008. ,
DOI : 10.1007/978-3-540-25976-3_15
URL : https://hal.archives-ouvertes.fr/inria-00419151
Implementing group signature schemes with smart cards, Smart Card Research and Advanced Application ? CARDIS'02, pp.1-10, 2002. ,
European Parliament legislative resolution of 12 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. General Data Protection Regulation, Ordinary legislative procedure: first reading, 2014. ,
A Computationally Efficient Fingerprint Matching Algorithm for Implementation on Smartcards, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007. ,
DOI : 10.1109/BTAS.2007.4401959
Dealing with logical omniscience, Conference on Theoretical Aspects of Rationality and Knowledge TARK'07, pp.169-176, 2007. ,
An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Techn, vol.14, issue.1, pp.4-20, 2004. ,
International standard iso/iec 24787:2010, information technology ? identification cards ? on-card biometric comparison, 2010. ,
Deductive Algorithmic Knowledge, Journal of Logic and Computation, vol.16, issue.2, pp.287-309, 2006. ,
DOI : 10.1093/logcom/exi078
URL : http://arxiv.org/pdf/cs/0405038
How to Leak a Secret, Advances in Cryptology ? ASIACRYPT'01, pp.552-565, 2001. ,
DOI : 10.1007/3-540-45682-1_32
Privacy by design: On the conformance between protocols and architectures, Foundations and Practice of Security ? FPS'14, pp.65-81, 2015. ,