Mobile trusted computing, Proceedings of the IEEE, vol.102, issue.8, pp.1189-1206, 2014. ,
Identity-based encryption from the weil pairing, Advances in Cryptology, Proceedings of CRYPTO 2001, vol.2139, pp.213-229, 2001. ,
Trusted mobile computing: An overview of existing solutions, Future Generation Computer Systems, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02383449
Ibake: Identity-based authenticated key exchange, 2012. ,
Identity-based encryption with conventional public-key infrastructure, jon@ pgp. com. Linaro And STMicroelectronics, 2005. ,
,
Unique Radio Innovation for the 21st Century, chapter Security Primitive Classification of RFID Attacks, pp.39-63, 2011. ,
Classifying RFID attacks and defenses, Systems Frontiers, vol.12, issue.5, pp.491-505, 2010. ,
Breaking mifare desfire mf3icd40: Power analysis and templates in the real world, International Workshop on Cryptographic Hardware and Embedded Systems, pp.207-222, 2011. ,
Identity-based cryptosystems and signature schemes, Advances in Cryptology, Proceedings of CRYPTO '84, vol.196, pp.47-53, 1984. ,