Electronic passports - from secure specifications to secure implementations

被引:4
|
作者
Liersch, Ingo [1 ]
机构
[1] Giesecke and Devrient GmbH, Prinzregentenstrasse 159, 81607 Munich, Germany
来源
Information Security Technical Report | 2009年 / 14卷 / 02期
关键词
D O I
10.1016/j.istr.2009.06.005
中图分类号
学科分类号
摘要
引用
收藏
页码:96 / 100
相关论文
共 50 条
  • [1] Proved generation of implementations from computationally secure protocol specifications
    Cade, David
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 331 - 402
  • [2] Proved Generation of Implementations from Computationally Secure Protocol Specifications
    Cade, David
    Blanchet, Bruno
    PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 63 - 82
  • [3] Strategies and System Implementations for Secure Electronic Written Exams
    Gervasi, Osvaldo
    Perri, Damiano
    Simonetti, Marco
    IEEE ACCESS, 2022, 10 : 20559 - 20570
  • [4] Refinement Types for Secure Implementations
    Bengtson, Jesper
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Maffeis, Sergio
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2011, 33 (02):
  • [5] Secure Implementations for the Internet of Things
    Schmidt, Joern-Marc
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 2 - 2
  • [6] Refinement types for secure implementations
    Bengtson, Jesper
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Maffeis, Sergio
    CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, : 17 - +
  • [7] Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain
    Sanwald S.
    Kaneti L.
    Stöttinger M.
    Böhner M.
    SAE International Journal of Transportation Cybersecurity and Privacy, 2020, 2 (02):
  • [8] Efficient and secure source authentication with packet passports
    Liu, Xin
    Yang, Xiaowei
    Wetherall, David
    Anderson, Thomas
    USENIX ASSOCIATION PROCEEDINGS OF THE 2ND WORKSHOP ON STEPS TO REDUCING UNWANTED TRAFFIC ON THE INTERNET, 2006, : 7 - +
  • [9] Noninterference specifications for secure systems
    Nelson L.
    Bornholt J.
    Krishnamurthy A.
    Torlak E.
    Wang X.
    Operating Systems Review (ACM), 2020, 54 (01): : 31 - 39
  • [10] DESIGNING SECURE COMMUNICATION PROTOCOLS FROM TRUST SPECIFICATIONS
    PAPADIMITRIOU, CH
    RANGAN, V
    SIDERI, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 560 : 360 - 368