Security Engineering: A Guide to Building Dependable distributed Systems, 2001. ,
Towards secure IFF: preventing mafia fraud attacks, MILCOM 2002. Proceedings, pp.1139-1144, 2002. ,
DOI : 10.1109/MILCOM.2002.1179638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.4282
Some Open Issues and New Directions in Group Signatures, Proceedings of Financial Cryptography'99, pp.196-211, 1999. ,
DOI : 10.1007/3-540-48390-X_15
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing, proceedings of Security in Pervasive Computing SPC'03, 2003. ,
DOI : 10.1007/978-3-540-39881-3_17
Personal servers as digital keys, the Second IEEE Annual Conference on Pervasive Computing and Communications (PerCom'04), pp.319-328, 2004. ,
Distance-bounding proof of knowledge protocols to avoid terrorist fraud attacks, 2004. ,
Secure implementation of identification systems, Journal of Cryptology, vol.4, issue.3, pp.175-183, 1991. ,
Distance-bounding protocols (extended abstract), [pdf ], Proceedings of EUROCRYPT 93, pp.23-27 ,
Can we take this off-line? how to deal with credentials in federations without global connectivity, 2004. ,
The keynote trust-management system version 2, Network Working Group, 1999. ,
DOI : 10.17487/rfc2704
The role of trust management in distributed systems security, [pdf ], Secure Internet Programming, pp.185-210, 1999. ,
Decentralized trust management , [pdf ], Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
GPS-less low-cost outdoor localization for very small devices, IEEE Personal Communications, vol.7, issue.5, pp.28-34, 2000. ,
DOI : 10.1109/98.878533
Secure mobile business applications ? framework, architecture and implementation, 2004. ,
The challenges and opportunities of integrating the physical world and networked systems ,
Establishing trust with privacy, 2004. ,
One-time capabilities for authorizations without trust, Proceedings of the second IEEE conference on Pervasive Computing and Communications (PerCom'04), pp.351-355, 2004. ,
Combining history-based trust establishment with distance-bounding protocols, 2004. ,
History-based signature or how to trust anonymous documents, Proceedings of the Second Conference on Trust Management volume 2995 of LNCS, pp.78-92 ,
The challenges to invisible computing, Computer, vol.33, issue.11, pp.123-125, 2000. ,
DOI : 10.1109/2.881699
RADAR: an in-building RF-based user location and tracking system, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.775-784, 2000. ,
DOI : 10.1109/INFCOM.2000.832252
Fast server-aided rsa signatures secure against active attacks, proceedings of CRYPTO'95, pp.57-69, 1995. ,
Authentication in ubiquitous computing, 2002. ,
Background signature for sensor networks, 2003. ,
Embedding distance-bounding protocols within intuitive interactions, Proceedings of Conference on Security in Pervasive Computing (SPC'2003), volume 2802 of LNCS, pp.143-156 ,
Protecting applications and devices in nomadic business environments, Proceedings of 3rd Conference on Security and Network Architectures (SAR'04), pp.243-252, 2004. ,
Rethinking public key infrastructures and digital certificates: Building in privacy, 2000. ,
A technical overview of digital credentials, 2002. ,
Enabling mobile commerce through pervasive communications with ubiquitous rf tags, Proceedings of IEEE Wireless Communications and Networking Conference (WCNC'03), pp.2041-2046, 2003. ,
Trust and Authorization in Pervasive B2E Scenarios, Proceedings of the 6th Information Security Conference (ISC'03), volume 2851 of LNCS, pp.295-309 ,
DOI : 10.1007/10958513_23
Untraceable secret credentials: trust establishment with privacy, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, pp.122-126, 2004. ,
DOI : 10.1109/PERCOMW.2004.1276917
Talking to strangers: Authentication in adhoc wireless networks, Symposium on Network and Distributed Systems Security (NDSS '02), 2002. ,
The JavaSeal mobile agent kernel, [pdf ], First International Symposium on Agent Systems and Applications (ASA'99)/Third International Symposium on Mobile Agents (MA'99), 1999. ,
Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes, Advances in Cryptology -Asiacrypt, pp.331-345, 1976. ,
Creating web representations for places, Proceedings of Handheld and Ubiquitous Computing: Second International Symposium, p.114, 1927. ,
Untraceable electronic cash (extended abstract ), [pdf ], Advances in Cryptology ? CRYPTO '88 Proceedings, pp.319-327, 1989. ,
How to Achieve a McEliece-Based Digital Signature Scheme, Advances in Cryptology -ASIACRYPT 2001, pp.157-174, 2001. ,
DOI : 10.1007/3-540-45682-1_10
URL : https://hal.archives-ouvertes.fr/inria-00072511
Private information retrieval, IEEE Symposium on Foundations of Computer Science, pp.41-50, 1995. ,
Authentication for Pervasive Computing, Proceedings of the First International Conference on Security in Pervasive Computing, 2003. ,
DOI : 10.1007/978-3-540-39881-3_12
Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing, vol.2, issue.3, pp.52-61, 2003. ,
DOI : 10.1109/MPRV.2003.1228527
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586114
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.4, issue.2, 1981. ,
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Lecture Notes in Computer Science, 2001. ,
DOI : 10.1007/3-540-44987-6_7
Securing context-aware applications using environment roles, Proceedings of the Sixth ACM Symposium on Access control models and technologies, 2001. ,
A group signature scheme based on an rsavariant, Preliminary version in ASIACRYPT'98, pp.160-174, 1998. ,
Generalized role-based access control for securing future applications, 23rd National Information Systems Security Conference, 2000. ,
Zero-interaction authentication, [pdf ], Proceedings of Conference on Mobile Computing and Networking (MobiCom), 2002. ,
DOI : 10.1145/570646.570647
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.7013
Blind Signatures for Untraceable Payments, Advances in Cryptology, Proceedings of Crypto 82, pp.199-203, 1982. ,
DOI : 10.1007/978-1-4757-0602-4_18
Efficient group signature schemes for large groups, Advances in Cryptology ? CRYPTO '97 Proceedings, pp.410-424, 1997. ,
DOI : 10.1007/BFb0052252
A taxonomy of obfuscating transformations, 1996. ,
An introduction to the java ring, 1998. ,
The ponder specification language, Workshop on Policies for Distributed Systems and Networks (Policy2001), 2001. ,
Reasoning About Trust: A Formal Logical Framework, Proceedings of Second International Conference on Trust Management, pp.291-303, 2004. ,
DOI : 10.1007/978-3-540-24747-0_22
Major security problems with the 'unforgeable' (feige)-atshamir proofs of identity and how to overcome them, Proceedings of SecuriCom '88, 1988. ,
A Reputation System to Increase MIX-Net Reliability, Proceedings of the 4th International Workshop on Information Hiding, pp.126-141, 2001. ,
DOI : 10.1007/3-540-45496-9_10
Location-based authentication: Grounding cyberspace for better security, Computer Fraud and Security, 1996. ,
DOI : 10.1016/S1361-3723(97)82613-9
On-line/off-line digital signatures, Journal of Cryptology, vol.26, issue.6, pp.35-67, 1996. ,
DOI : 10.1007/BF02254791
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1677
Dynamic trust models for ubiquitous computing environments, Workshop on Security in Ubiquitous Computing at UBICOMP'2002, 2002. ,
Trusting collaboration in global computing, Proceedings of the First International Conference on trust management, 2003. ,
Single term off-line coins, Advances in Cryptology? EUROCRYPT '93, pp.318-328, 1994. ,
Secure, reliable, transacted web services: Architecture and composition, 2003. ,
Locating tiny sensors in time and space: a case study, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2002. ,
DOI : 10.1109/ICCD.2002.1106773
The very, very personal is the political, [pdf ]. The New York Times Magazine, 2004. ,
Real-world implementation of the location stack: the universal location framework, Proceedings DARPA Information Survivability Conference and Exposition MCSA-03, pp.122-128, 2003. ,
DOI : 10.1109/MCSA.2003.1240773
Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2, [pdf ], USENIX Symposium on Internet Technologies and Systems, pp.103-112, 1997. ,
A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, 2000. ,
DOI : 10.1109/COMST.2000.5340804
How to prove where you are, Proceedings of the 5th ACM conference on Computer and communications security , CCS '98, pp.142-149, 1998. ,
DOI : 10.1145/288090.288121
Location systems for ubiquitous computing, Computer, vol.34, issue.8, 2001. ,
DOI : 10.1109/2.940014
The anatomy of a context-aware application, Mobile Computing and Networking, pp.59-68, 1999. ,
Smart-its friends: A technique for users to easily establish connections between smart artefacts, Proceedings of UbiComp, 2001. ,
Packet leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1976-1986, 2003. ,
DOI : 10.1109/INFCOM.2003.1209219
Trust-based filtering for augmented reality, Proceedings of the First International Conference on Trust Management, volume 2692, 2003. ,
Tangible bits, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '97, pp.234-241, 1997. ,
DOI : 10.1145/258549.258715
Analysing the Relationship between Risk and Trust, Proceedings of Second International Conference on Trust Management, pp.135-145, 2004. ,
DOI : 10.1007/978-3-540-24747-0_11
The Art of the Metaobject Protocol, 1991. ,
Trust-based security in pervasive computing environments, Computer, vol.34, issue.12, pp.154-157, 2001. ,
DOI : 10.1109/2.970591
A framework for distributed trust management, Workshop on Autonomy, Delegation and Control, 2001. ,
Personal locator services emerge, IEEE Spectrum, vol.37, issue.2, 2000. ,
DOI : 10.1109/6.819928
Multicamera multi-person tracking for easyliving, IEEE Workshop on Visual Surveillance, 2000. ,
Next century challenges, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking , MobiCom '99, pp.271-278, 1999. ,
DOI : 10.1145/313451.313558
A Course in Number Theory and Cryptography, 1994. ,
A Privacy-Enhanced Peer-to-Peer Reputation System, Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, pp.206-215, 2003. ,
DOI : 10.1007/978-3-540-45229-4_21
Validating and Securing Spontaneous Associations between Wireless Devices, Proceedings 6th Information Security Conference (ISC03), pp.44-53, 2003. ,
DOI : 10.1007/10958513_4
Context authentication using constrained channels, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp.14-21, 2002. ,
DOI : 10.1109/MCSA.2002.1017481
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7590
Extending tamper-proof hardware security to untrusted execution environments, Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS'02 ,
Mobile code security, ISY- PAR 2000, 2000. ,
Group blind digital signatures: A scalable solution to electronic cash, Financial Cryptography, pp.184-197, 1998. ,
DOI : 10.1007/BFb0055483
The virtual world gets physical: perspectives on personalization, IEEE Internet Computing, vol.5, issue.6, pp.48-53, 2001. ,
DOI : 10.1109/4236.968831
A public-key cryptosystem based on algebraic coding theory, 1978. ,
Multi-round passive attacks on server-aided RSA protocols, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.102-107, 2000. ,
DOI : 10.1145/352600.352616
Efficient certificate revocation Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, IFIP - Communication and Multimedia Security Conference, 1996. ,
A Distributed Access Control Model for Java, 6th European Symposium on Research in Computer Security (ESORICS), number 1895, pp.291-308, 2000. ,
DOI : 10.1007/10722599_18
A flexible , privacy-preserving authentication framework for ubiquitous computing environments, International Workshop on Smart Appliances and Wearable Computing, 2002. ,
IBM's Linux watch, the challenge of miniaturization, Computer, vol.35, issue.1, pp.33-41, 2002. ,
DOI : 10.1109/2.976917
Safe, untrusted agents using proof-carrying code, Lecture Notes in Computer Science, p.1419, 1998. ,
Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature, Information Security and Privacy, Proceedings of ACISP'99, 1999. ,
DOI : 10.1007/3-540-48970-3_10
The smart floor, CHI '00 extended abstracts on Human factors in computing systems , CHI '00, 2000. ,
DOI : 10.1145/633292.633453
Capability card: An attribute certificate in xml, Expired Internet Draft, 1998. ,
Efficient batch signature generation using tree structures, International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC'99), pp.70-77, 1999. ,
The cricket locationsupport system, Mobile Computing and Networking, pp.32-43, 2000. ,
Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Designing Privacy Enhancing Technologies ? International Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2000. ,
DOI : 10.1007/3-540-44702-4_1
Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, 2001. ,
DOI : 10.1007/3-540-44702-4_1
SPINS: security protocols for sensor netowrks, Mobile Computing and Networking, pp.189-199, 2001. ,
Group blind digital signatures: Theory and applications, 1999. ,
A Reputation-Based Approach to Preserving Privacy in Web Services, 4th VLDB Workshop on Technologies for E-Services (TES'03), pp.91-103, 2003. ,
DOI : 10.1007/978-3-540-39406-8_8
Service advertisement and discovery: enabling universal device cooperation, IEEE Internet Computing, vol.4, issue.5, pp.18-26, 2000. ,
Can we eliminate certificate revocation lists?, proceedings of the Conference on Financial Cryptography, pp.178-183, 1998. ,
DOI : 10.1007/BFb0055482
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.4807
Fostering a symbiotic handheld environment, Computer, vol.36, issue.9, pp.56-65, 2003. ,
DOI : 10.1109/MC.2003.1231195
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols Workshop, pp.172-194, 1999. ,
DOI : 10.1007/10720107_24
Assertion Markup Language (SAML 1.0) OASIS standard, 2002. ,
Pervasive computing: Vision and challenges, IEEE Personal Communications, vol.8, issue.4, pp.10-17, 2001. ,
Role-based access control models, IEEE Computer, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
Efficient identification and signatures for smart cards, Advances in Cryptology -CRYPTO'89 Proceedings, pp.239-252, 1989. ,
The context toolkit, Proceedings of the SIGCHI conference on Human factors in computing systems the CHI is the limit, CHI '99, pp.434-441, 1999. ,
DOI : 10.1145/302979.303126
Trust for ubiquitous, transparent collaboration, Proceedings of the First IEEE International Conference on Pervasive Computing and CommunicationsPerCom'03), pp.153-160, 2003. ,
DOI : 10.1023/b:wine.0000044030.65959.91
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3865
End-to-end trust starts with recognition, [pdf ], Proceedings of Conference on Security in Pervasive Computing (SPC'2003), 2003. ,
Protocols for Secure Electronic Commerce, 2000. ,
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, 2000. ,
Secure verification of location claims, Proceedings of the 2003 ACM workshop on Wireless security , WiSe '03, 2003. ,
DOI : 10.1145/941311.941313
On Software Protection via Function Hiding, Lecture Notes in Computer Science, vol.1525, pp.111-123, 1998. ,
DOI : 10.1007/3-540-49380-8_9
The resurrecting duckling -what next?, Security Protocols Workshop, pp.204-214, 2000. ,
Security for Ubiquitous Computing, 2002. ,
What the heck is a zero-knowledge proof of knowledge, anyway, and what does it mean?, 2002. ,
Non-interactive cryptocomputing for nc1, 40th Annual Symposium on Foundations of Computer Science 99, pp.554-566, 1999. ,
Software reliability via run-time result-checking, Journal of the ACM, vol.44, issue.6, pp.826-849, 1997. ,
DOI : 10.1145/268999.269003
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.820
Security and trust issues in ubiquitous environments - the business-to-employee dimension, 2004 International Symposium on Applications and the Internet Workshops. 2004 Workshops., 2004. ,
DOI : 10.1109/SAINTW.2004.1268723
The computer for the twenty-first century, Scientific American, pp.94-100, 1991. ,
Proving the location of tamper-resistant devices ,
The active badge location system, ACM Transactions on Information Systems, vol.10, issue.1, pp.91-102, 1992. ,
DOI : 10.1145/128756.128759
URL : https://hal.archives-ouvertes.fr/hal-00699850
A Sanctuary for Mobile Agents, Secure Internet Programming, pp.261-273, 1999. ,
DOI : 10.1007/3-540-48749-2_12
Alice peut choisir de prouver qu'elle est majeure (? age=31 ans ? ? age?18 ans) Des codages plus subtils peuventêtre peuventêtre proposés. Par exemple, Alice peut recevoir le certificat suivant : [14|04|32, 15|10|2004, 43|62|65, 007|04|70] prouvant qu'elle se trouvait dans les bâtiments de l'institut EurécomEurécomà deux heures de l'après midi le 15 octobre, 2004. ,
checksum " par bloc qui permet de le montrer ou de le cacher mais n'autorise pas sa modification. Le codage de la localisation peutêtrepeutêtre plus structuré en utilisant une hiérarchie du type pays ,
Le second besoin concernant les certificats est d'´ eviter leur traçabilité tout en assurant qu'ils ne puissent pasêtrepasêtre transférés d'une personnè a une autre. Pour prouver la possession d'un certificat sans le montrer, nous utilisons les " preuves de connaissance " (proof of knowledge) et les " signatures basées sur des preuves de connaissance ,
A la fin de ce protocole, P a prouvéprouvéà V qu'il conna??tconna??t un secret x sans avoir révélé d'information sur ce secret. Par exemple, PK[? : y = g ? ] est la preuve de la connaissance du logarithme discret de y en base g, BR02] Authentication in ubiquitous computing L. Bussard and Y. Roudier. Workshop on Security in Ubiquitous Computing at UBI- COMP'02, 2002. ,
Extending tamper-proof hardware security to untrusted execution environ- ments, Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS'02) -USENIX, pp.111-124, 2002. ,
Workshop on Ubiquitous Services and Networking in at SAINT'04, 2004. ,
Untraceable secret credentials: Trust establishment with privacy L Credentials with secret attributes, Proceedings of the Workshop on Pervasive Computing and Communications Security (PerSec'04) at PerCom'04, pp.122-126, 2004. ,
History-Based Signature or How to Trust Anonymous Documents, Proceedings of the Second Conference on Trust Management, pp.78-92, 2004. ,
DOI : 10.1007/978-3-540-24747-0_7
WiTness and student projects: pragmatic way to protect pieces of code and environmnents (Appendix E), Proceedings of 3rd Conference on Security and Network Architectures, pp.243-252, 2004. ,
Combining history-based trust establishment with distance-bounding proto- cols L Not published, how to merge distance-bounding protocols and unlinkable credentials, 2004. ,
Can we take this off-line? how to deal with credentials in federations without global A shorter version has been submitted for publication in, 2004. ,
Secure Mobile Business Applications ? Framework Architecture ,