Ceremony Design and Analysis. Cryptology ePrint Archive, Report, vol.399, 2007. ,
Entity Authentication and Trust Validation in PKI Using Petname Systems, Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS), pp.302-334, 2013. ,
DOI : 10.4018/978-1-4666-4030-6.ch013
Offpad: Offline personal authenticating device ? implementations and applications, 2016. ,
Trust Extortion on the Internet, 7th Workshop on Security and Trust Management (STM), pp.6-21, 2012. ,
DOI : 10.1007/978-3-642-29963-6_2
Security Usability Principles for Vulnerability Analysis and Risk Assessment, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.269-278, 2007. ,
DOI : 10.1109/ACSAC.2007.14
Local user-centric identity management, Journal of Trust Management, vol.19, issue.4, pp.1-28 ,
DOI : 10.6028/NIST.SP.800-63-2
Extended HTTP Digest Access Authentication, 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN), pp.83-96, 2013. ,
DOI : 10.1007/978-3-642-37282-7_7
URL : https://hal.archives-ouvertes.fr/hal-01470505
The OffPAD: Requirements and Usage, 7th Network and System Security (NSS), 2013. ,
DOI : 10.1007/978-3-642-38631-2_7
URL : https://hal.archives-ouvertes.fr/hal-01004214