1 |
BSI TR-03130, https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03130/tr-03130.html
|
2 |
BSI, "Innovations for an eID Ar- chitecture in Germany", http://www. bsi.bund.de, 2011.
|
3 |
A. Poller, U. Waldmann, S. Vowe, S. Turpe, "Electronic Identity Cards for User Authentication - Promise and Practice", IEEE Security & Privacy, 10(1), pp.46-54, Feb 2012.
DOI
|
4 |
H. Zwingelberg, M. Hansen. "Privacy Protection Goals and their implications for eID systems", Privacy and Identity Management for Life, Springer Berlin Heidelberg, 375, pp. 245-260, Sep. 2011.
|
5 |
J. Essbach, "An approach to a decentral mobile payment system using nfc and the germaneid-card", Wireless Systems (IDAACS-SWS), IEEE 1st International Symposium on, pp. 67-71, Sep 2012.
|
6 |
M. Margraf, "The new german id card." ISSE 2010 Securing Electronic Business Processes. pp. 367-373, Nov. 2010.
|
7 |
T. Messerges, E. Dabbish, R. Sloan, "Examining smart-card security under the threat of power analysis attacks", IEEE Transactions on Computers, 51(5), pp. 541-552, May 2002.
DOI
|
8 |
B. Zwattendorfer, D. S., "Privacy -preserving realization of the stork framework in the public cloud", Security and Cryptography, 2013 International Conference on. IEEE, pp. 1-8, Jul 2013.
|
9 |
C. Cuijpers, J. Schroers. "eIDAS as guideline for the development of a pan European eID framework in FutureID", Open Identity Summit, 237, pp.23-28, Jan 2014.
|
10 |
H. Leitold, "Challenges of eID interoperability: The STORK project", Privacy and Identity Management for Life. Springer Berlin Heidelberg, 352, pp.144-150, Aug. 2010.
|
11 |
S. Arora, "National e-ID card schemes: A European overview", Information Security Technical Report, 13(2) pp.46-53, 2008.
DOI
|
12 |
Volker Reible, Andre Braunmandl. "The eID Function of the nPA within the European STORK Infrastructure.", ISSE 2010 Securing Electronic Business Processes. pp.392-398, 2010.
|
13 |
Sebastian Feld, Norbert Pohlmann. "Security analysis of OpenID, followed by a reference implementation of an nPA-based OpenID provider.", ISSE 2010 Securing Electronic Business Processes, pp. 13-25, 2010.
|