Ceremony Design and Analysis. Cryptology ePrint Archive, Report, vol.399, 2007. ,
Entity Authentication and Trust Validation in PKI Using Petname Systems, Theory and Practice of Cryptography Solutions for Secure Information Systems (CRYPSIS), pp.302-334, 2013. ,
DOI : 10.4018/978-1-4666-4030-6.ch013
Trust Extortion on the Internet, 7th Workshop on Security and Trust Management (STM), pp.6-21, 2012. ,
DOI : 10.1007/978-3-642-29963-6_2
Security Usability Principles for Vulnerability Analysis and Risk Assessment, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.269-278, 2007. ,
DOI : 10.1109/ACSAC.2007.14
Local user-centric identity management, Journal of Trust Management, vol.19, issue.4, pp.1-28 ,
DOI : 10.6028/NIST.SP.800-63-2
Extended HTTP Digest Access Authentication, 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN), pp.83-96, 2013. ,
DOI : 10.1007/978-3-642-37282-7_7
URL : https://hal.archives-ouvertes.fr/hal-01470505
Offpad: Offline personal authenticating device ? implementations and applications, 2016. ,
The OffPAD: Requirements and Usage, Network and System Security (NSS), pp.80-93, 2013. ,
DOI : 10.1007/978-3-642-38631-2_7
URL : https://hal.archives-ouvertes.fr/hal-01004214
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Financial Cryptography and Data Security, pp.88-103, 2007. ,
DOI : 10.1007/978-3-540-77366-5_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.3533
the blue pill, Proceedings of the 2008 workshop on New security paradigms, NSPW '08, pp.127-133, 2009. ,
DOI : 10.1145/1595676.1595695
Pico: No More Passwords!, International Workshop on Security Protocols, pp.49-81, 2011. ,
DOI : 10.1109/MPRV.2007.76