References
- BSI TR-03130, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03130/tr-03130.html
- BSI, "Innovations for an eID Ar- chitecture in Germany", http://www. bsi.bund.de, 2011.
- A. Poller, U. Waldmann, S. Vowe, S. Turpe, "Electronic Identity Cards for User Authentication - Promise and Practice", IEEE Security & Privacy, 10(1), pp.46-54, Feb 2012. https://doi.org/10.1109/MSP.2011.148
- H. Zwingelberg, M. Hansen. "Privacy Protection Goals and their implications for eID systems", Privacy and Identity Management for Life, Springer Berlin Heidelberg, 375, pp. 245-260, Sep. 2011.
- J. Essbach, "An approach to a decentral mobile payment system using nfc and the germaneid-card", Wireless Systems (IDAACS-SWS), IEEE 1st International Symposium on, pp. 67-71, Sep 2012.
- M. Margraf, "The new german id card." ISSE 2010 Securing Electronic Business Processes. pp. 367-373, Nov. 2010.
- T. Messerges, E. Dabbish, R. Sloan, "Examining smart-card security under the threat of power analysis attacks", IEEE Transactions on Computers, 51(5), pp. 541-552, May 2002. https://doi.org/10.1109/TC.2002.1004593
- B. Zwattendorfer, D. S., "Privacy -preserving realization of the stork framework in the public cloud", Security and Cryptography, 2013 International Conference on. IEEE, pp. 1-8, Jul 2013.
- C. Cuijpers, J. Schroers. "eIDAS as guideline for the development of a pan European eID framework in FutureID", Open Identity Summit, 237, pp.23-28, Jan 2014.
- H. Leitold, "Challenges of eID interoperability: The STORK project", Privacy and Identity Management for Life. Springer Berlin Heidelberg, 352, pp.144-150, Aug. 2010.
- S. Arora, "National e-ID card schemes: A European overview", Information Security Technical Report, 13(2) pp.46-53, 2008. https://doi.org/10.1016/j.istr.2008.08.002
- Volker Reible, Andre Braunmandl. "The eID Function of the nPA within the European STORK Infrastructure.", ISSE 2010 Securing Electronic Business Processes. pp.392-398, 2010.
- Sebastian Feld, Norbert Pohlmann. "Security analysis of OpenID, followed by a reference implementation of an nPA-based OpenID provider.", ISSE 2010 Securing Electronic Business Processes, pp. 13-25, 2010.