How to Attack Two-Factor Authentication Internet Banking, Financial Cryptography and Data Security, pp.322-328, 2013. ,
DOI : 10.1007/978-3-642-39884-1_27
Innovative technology for CPU based attestation and sealing, 2 nd Int. Workshop on Hardware and Architectural Support for Security and Privacy, 2013. ,
Security vulnerabilities in DNS and DNSSEC, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.335-342, 2007. ,
DOI : 10.1109/ARES.2007.139
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, 2015. ,
DOI : 10.1007/978-1-4302-6584-9
A security evaluation of DNSSEC with NSEC3, Network and Distributed System Security Symposium (NDSS) ,
A Computationally Sound Mechanized Prover for Security Protocols, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.193-207, 2008. ,
DOI : 10.1109/TDSC.2007.1005
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
DOI : 10.3233/JCS-2009-0339
TruWalletM: Secure Web Authentication on Mobile Platforms, Int. Conf. on Trusted Systems, pp.219-236, 2010. ,
DOI : 10.1145/242896.242897
Automated Verification of Dynamic Root of Trust Protocols, 6 th Int. Conf. on Principles of Security and Trust, pp.95-116, 2017. ,
DOI : 10.1109/CSF.2012.25
FADEWICH: Fast Deauthentication Over the Wireless Channel, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp.1-13, 2017. ,
DOI : 10.1109/ICDCS.2017.296
User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of Man-Machine Studies, vol.38, issue.3, pp.475-487, 1993. ,
DOI : 10.1006/imms.1993.1022
The Transport Layer Security (TLS) Protocol Version 1.2, RFC, vol.5246, 2008. ,
DOI : 10.17487/rfc5246
Trasnport Layer Security (TLS) Renegotiation Indication Extension, RFC, vol.5746, 2010. ,
Influence of Data Granularity on Smart Meter Privacy, IEEE Transactions on Smart Grid, vol.6, issue.2, pp.930-939, 2015. ,
DOI : 10.1109/TSG.2014.2376613
Entity Authentication & Trust Validation in PKI using Petname Systems, Theory and Practice of Cryptography Solutions for Secure Information Systems, pp.302-334, 2013. ,
An Extension to HTTP : Digest Access Authentication, 1997. ,
DOI : 10.17487/rfc2069
Secure sockets layer proxy architecture, US Patent, vol.7, p.149892, 2006. ,
Design Patterns: Elements of Reusable Object-Oriented Software, 1994. ,
Password management strategies for online accounts, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.44-55, 2006. ,
DOI : 10.1145/1143120.1143127
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.6196
Local user-centric identity management, Journal of Trust Management, vol.19, issue.4, pp.1-28 ,
DOI : 10.6028/NIST.SP.800-63-2
Extended HTTP Digest Access Authentication, Policies and Research in Identity Management (IDMAN), pp.83-96, 2013. ,
DOI : 10.1007/978-3-642-37282-7_7
URL : https://hal.archives-ouvertes.fr/hal-01470505
On the Security of the TLS Protocol: A Systematic Analysis, 33rd Annual Advances in Cryptology, pp.429-448, 2013. ,
DOI : 10.1007/978-3-642-40041-4_24
An Usability Study of Continuous Biometrics Authentication, 3rd International Conference on Advances in Biometrics, pp.828-837, 2009. ,
DOI : 10.1109/THS.2008.4534505
the blue pill, Proceedings of the 2008 workshop on New security paradigms, NSPW '08, pp.127-133, 2009. ,
DOI : 10.1145/1595676.1595695
Internet Security under Attack: The Undermining of Digital Certificates, Computer, vol.44, issue.12, pp.17-20, 2011. ,
DOI : 10.1109/MC.2011.367
SSL splitting: Securely serving data from untrusted caches, Computer Networks, vol.48, issue.5, pp.763-779, 2005. ,
DOI : 10.1016/j.comnet.2005.01.006
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.3705
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Financial Cryptography and Data Security, pp.88-103, 2007. ,
DOI : 10.1007/978-3-540-77366-5_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.3533
Do not snoop my habits: preserving privacy in the smart grid, IEEE Communications Magazine, vol.50, issue.5, pp.166-172, 2012. ,
DOI : 10.1109/MCOM.2012.6194398
Enabling automatic password change in password managers through crowdsourcing ,
Innovative instructions and software model for isolated execution, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, 2013. ,
DOI : 10.1145/2487726.2488368
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks, International Journal of Information Security and Privacy, vol.2, issue.3, pp.71-83, 2008. ,
DOI : 10.4018/jisp.2008070106
DEMO, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1847-1849, 2016. ,
DOI : 10.1007/978-3-642-37282-7_7
URL : https://hal.archives-ouvertes.fr/hal-01589899
Usable authentication with an offline trusted device proxy architecture (long version), 2016. ,
Automated analysis of cryptographic protocols using Murphi, IEEE Symposium on Security and Privacy, pp.141-151, 1997. ,
Prohibiting RC4 Cipher Suites, RFC RFC Editor, vol.7465, 2015. ,
DOI : 10.17487/rfc7465
Keyloggers, IEEE Technology and Society Magazine, vol.28, issue.3, pp.10-17, 2009. ,
DOI : 10.1109/MTS.2009.934159
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
Securing the End-points of the Signal Protocol using Intel SGX based Containers In 5 th Workshop on Hot Issues in Security Principles and Trust Available at https://sec, pp.40-47, 2017. ,
An Analysis of TLS Handshake Proxying, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.279-286, 2015. ,
DOI : 10.1109/Trustcom.2015.385
Continuous Authentication Using Biometrics: Data, Models, and Metrics, 2011. ,
DOI : 10.4018/978-1-61350-129-0
The OffPAD: Requirements and usage, Network and System Security, pp.80-93, 2013. ,
Interventions to Break and Create Consumer Habits, Journal of Public Policy & Marketing, vol.25, issue.1, pp.90-103, 2006. ,
DOI : 10.1509/jppm.25.1.90
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.1938