N. Asokan, J. Ekberg, K. Kostiainen, A. Rajan, C. V. Rozas et al., Mobile trusted computing, Proceedings of the IEEE, vol.102, issue.8, pp.1189-1206, 2014.

D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, Advances in Cryptology, Proceedings of CRYPTO 2001, vol.2139, pp.213-229, 2001.

M. A. Bouazzouni, E. Conchon, and F. Peyrard, Trusted mobile computing: An overview of existing solutions, Future Generation Computer Systems, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02383449

V. Cakulev and G. Sundaram, Ibake: Identity-based authenticated key exchange, 2012.

J. Callas, Identity-based encryption with conventional public-key infrastructure, jon@ pgp. com. Linaro And STMicroelectronics, 2005.

. Op and . Page,

A. Mitrokotsa, M. Beye, and P. Peris-lopez, Unique Radio Innovation for the 21st Century, chapter Security Primitive Classification of RFID Attacks, pp.39-63, 2011.

A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, Classifying RFID attacks and defenses, Systems Frontiers, vol.12, issue.5, pp.491-505, 2010.

D. Oswald and C. Paar, Breaking mifare desfire mf3icd40: Power analysis and templates in the real world, International Workshop on Cryptographic Hardware and Embedded Systems, pp.207-222, 2011.

A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology, Proceedings of CRYPTO '84, vol.196, pp.47-53, 1984.