1 |
J. Hoepman, E. Hubbers, B. Jacobs, M. Oostdijk, and R.W. Schreur, "Crossing Borders: Security and Privacy Issues of the European e-Passport," In Proceedings of CoRR, 2008.
|
2 |
V. Pasupathinathan, J. Pieprzyk, and H. Wang, "An On-Line Secure E-Passport Protocol," in Proceedings of ISPEC, pp. 14-28, 2008.
|
3 |
B.A.M. Schouten and B. Jacobs, "Biometrics and their use in e-passports," Proceedings of Image Vision Comput., pp. 305-312, 2009.
|
4 |
B.A.M. Schouten and B. Jacobs, "Biometrics and their use in e-passports," Proceedings of Image Vision Comput., pp. 305-312, 2009.
|
5 |
V. Auletta, C. Blundo, A.D. Caro, E.D. Cristofaro, G. Persiano, and I. Visconti, "Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports," In Proceedings of Financial Cryptography Workshops, pp. 94-104, 2010.
|
6 |
Ari Juels, David Molnar, and David Wagner, "Security and Privacy Issues in E-passports," Security and Privacy for Emerging Areas in Communications Networks, pp. 74-88, Mar. 2005.
|
7 |
Y. Liu, T. Kasper, K. Lemke-Rust, and C. Paar, "E-Passport: Cracking Basic Access Control Keys," Proceedings of OTM Conferences, pp. 1531-1547, 2007.
|
8 |
Serge Vaudenay, "E-Passport Threats," IEEE Security & Privacy. pp .61-64, 2007.
|
9 |
D. Lekkas and D. Gritzalis, "e-Passports as a means towards the first world-wide Public Key Infrastructure," In Proceedings of EuroPKI, pp. 34-48, 2007.
|
10 |
Marci Meingast, Jennifer King and Deirdre K. Mulligan, "Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond," JCM, pp. 36-48, 2007.
|