About Machine-Readable Travel Documents

作者: S Vaudenay , M Vuagnoux

DOI: 10.1088/1742-6596/77/1/012006

关键词:

摘要: Passports are documents that help immigration officers to identify people. In order strongly authenticate their data and automatically people, they now equipped with RFID chips. These contain private information, biometrics, a digital signature by issuing authorities. Although substantially increase security at the border controls, also come new privacy issues. this paper, we survey existing protocols weaknesses.

参考文章(30)
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, Detecting rogue devices in bluetooth networks using radio frequency fingerprinting Communications and Computer Networks. pp. 108- 113 ,(2006)
Yvo Desmedt, Moti Yung, Weaknesses of undeniable signature schemes theory and application of cryptographic techniques. pp. 205- 220 ,(1991) , 10.1007/3-540-46416-6_19
Mikko Lehtonen, Florian Michahelles, Thorsten Staake, Elgar Fleisch, Strengthening the Security of Machine Readable Documents by Combining RFID and Optical Memory Devices Springer, Paris. pp. 77- 92 ,(2006) , 10.1007/978-2-287-47610-5_6
Victor Boyko, Philip MacKenzie, Sarvar Patel, Provably secure password-authenticated key exchange using Diffie-Hellman theory and application of cryptographic techniques. pp. 156- 171 ,(2000) , 10.1007/3-540-45539-6_12
A. Juels, D. Molnar, D. Wagner, Security and Privacy Issues in E-passports international workshop on security. pp. 74- 88 ,(2005) , 10.1109/SECURECOMM.2005.59
Benoît Calmels, Sébastien Canard, Marc Girault, Hervé Sibert, Low-Cost Cryptography for Privacy in RFID Systems Smart Card Research and Advanced Applications. pp. 237- 251 ,(2006) , 10.1007/11733447_17
Marc Girault, David Lefranc, Public Key Authentication with One (Online) Single Addition Lecture Notes in Computer Science. pp. 413- 427 ,(2004) , 10.1007/978-3-540-28632-5_30
Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi, E-passport: the global traceability or how to feel like a UPS package workshop on information security applications. pp. 391- 404 ,(2006) , 10.1007/978-3-540-71093-6_30
Serge Vaudenay, On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography Information Security and Cryptology. ,vol. 3822, pp. 1- 9 ,(2005) , 10.1007/11599548_1
Steven Rudich, The Use of Interaction in Public Cryptosystems. international cryptology conference. pp. 242- 251 ,(1991) , 10.1007/3-540-46766-1_19