bibliothek.bib (14092B)
1 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 2 %% File : thesis.bib 3 %% Date : Saturday Sep 15 15:54:56 2018 4 %% Author : Dominik Meister, Dennis Neufeld 5 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 6 %% Description : Sample bibliography file 7 %% WARNING : To be used with biblatex and biber, this file should be 8 %% UTF-8 encoded 9 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 10 %% Usage : 11 %% 1) add the lines in the preamble of your document: 12 %% \usepackage[backend=biber, style=ieee]{biblatex} 13 %% \addbibresource{template.bib} 14 %% 15 %% 2) Compile the document at least once (preferably with lualatex), e.g. 16 %% lualatex template.tex 17 %% 18 %% 3) Run the command "biber" on your document, e.g. 19 %% biber template 20 %% 21 %% 4) Compile the document twice with lualatex 22 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 23 24 @online{global_data_index, 25 title = {Global Data Protection Index 2018 – Key Findings}, 26 organization = {Dell EMC.}, 27 year = 2018, 28 urldate = {2020-03-07}, 29 url = {https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)}, 30 } 31 @online{gnu_taler, 32 title = {GNU Taler: Features}, 33 organization = {Taler Systems SA}, 34 year = 2020, 35 urldate = {2020-06-02}, 36 url = {https://taler.net/en/features.html}, 37 } 38 @online{postgresql, 39 title = {PostgreSQL: The World's Most Advanced Open Source Relational Database}, 40 organization = {The PostgreSQL Global Development Group}, 41 year = 2020, 42 urldate = {2020-06-02}, 43 url = {https://www.postgresql.org/}, 44 } 45 @online{libmicrohttpd, 46 title = {GNU Libmicrohttpd}, 47 organization = {GNU project}, 48 year = 2020, 49 urldate = {2020-06-02}, 50 url = {https://www.gnu.org/software/libmicrohttpd/?}, 51 } 52 @online{gnu_project, 53 title = {What is GNU?}, 54 organization = {GNU project}, 55 year = 2020, 56 urldate = {2020-06-02}, 57 url = {https://www.gnu.org/}, 58 } 59 @online{libcurl, 60 title = {libcurl - the multiprotocol file transfer library }, 61 organization = {Curl}, 62 year = 2020, 63 urldate = {2020-06-02}, 64 url = {https://curl.haxx.se/libcurl/}, 65 } 66 @online{ccc_merkel, 67 title = {CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck}, 68 author = {Stefan Krempl}, 69 organization = {heise online}, 70 year = 2014, 71 urldate = {2020-03-07}, 72 url = {https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html}, 73 } 74 @online{millions_lost, 75 title = {Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password}, 76 author = {Anthony Cuthbertson}, 77 organization = {INDEPENDENT}, 78 year = 2019, 79 urldate = {2020-03-07}, 80 url = {https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html}, 81 } 82 @online{forgot_my_pin, 83 title = {I Forgot My PIN’: An Epic Tale of Losing \$30,000 in Bitcoin}, 84 author = {Mark Frauenfelder}, 85 organization = {WIRED}, 86 year = 2017, 87 urldate = {2020-03-07}, 88 url = {https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/}, 89 } 90 @inproceedings{pedersen_sharing_0, 91 title={Non-interactive and information-theoretic secure verifiable secret sharing}, 92 author={Pedersen, Torben Pryds}, 93 booktitle={Annual international cryptology conference}, 94 pages={129--140}, 95 year=1991, 96 organization={Springer}, 97 chapter={0}, 98 } 99 @inproceedings{pedersen_sharing_5.2, 100 title={Non-interactive and information-theoretic secure verifiable secret sharing}, 101 author={Pedersen, Torben Pryds}, 102 booktitle={Annual international cryptology conference}, 103 pages={129--140}, 104 year=1991, 105 organization={Springer}, 106 chapter={5.2}, 107 } 108 @article{shamir_sharing, 109 title={How to share a secret}, 110 author={Shamir, Adi}, 111 journal={Communications of the ACM}, 112 volume={22}, 113 number={11}, 114 pages={612--613}, 115 year=1979, 116 publisher={ACm New York, NY, USA}, 117 } 118 @inproceedings{feldman_sharing, 119 title={A practical scheme for non-interactive verifiable secret sharing}, 120 author={Feldman, Paul}, 121 booktitle={28th Annual Symposium on Foundations of Computer Science (sfcs 1987)}, 122 pages={427--438}, 123 year=1987, 124 organization={IEEE}, 125 } 126 @article{authentication_methods_review, 127 title = {A Review on Authentication Methods}, 128 author = {Syed Idrus, Syed Zulkarnain and Cherrier, Estelle and Rosenberger, Christophe and Schwartzmann, Jean-Jacques}, 129 url = {https://hal.archives-ouvertes.fr/hal-00912435}, 130 journal = {Australian Journal of Basic and Applied Sciences}, 131 volume = {7}, 132 number = {5}, 133 pages = {95-107}, 134 year = 2013, 135 } 136 @book{rieck_detection, 137 title={Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings}, 138 author={Rieck, Konrad and Stewin, Patrick and Seifert, Jean-Pierre}, 139 volume={7967}, 140 year=2013, 141 publisher={Springer} 142 } 143 @article{biometric_auth, 144 title={Privacy-preserving biometric authentication: challenges and directions}, 145 author={Pagnin, Elena and Mitrokotsa, Aikaterini}, 146 journal={Security and Communication Networks}, 147 volume={2017}, 148 year=2017, 149 publisher={Hindawi} 150 } 151 @article{multifactor_authentication, 152 title={Multi-factor authentication: A survey}, 153 author={Ometov, Aleksandr and Bezzateev, Sergey and Makitalo, Niko and Andreev, Sergey and Mikkonen, Tommi and Koucheryavy, Yevgeni}, 154 journal={Cryptography}, 155 volume={2}, 156 number={1}, 157 pages={1}, 158 year=2018, 159 publisher={Multidisciplinary Digital Publishing Institute} 160 } 161 @book{midata, 162 title={Applied Approach to Privacy and Security for the Internet of Things}, 163 author={Parag Chatterjee, Emmanuel Benoist and Asoke Nath}, 164 year={in print}, 165 publisher={IGI Global} 166 } 167 @Inbook{Preneel1999, 168 author={Preneel, Bart}, 169 editor={Damg{\aa}rd, Ivan Bjerre}, 170 title={The State of Cryptographic Hash Functions}, 171 bookTitle={Lectures on Data Security: Modern Cryptology in Theory and Practice}, 172 year=1999, 173 publisher={Springer Berlin Heidelberg}, 174 address={Berlin, Heidelberg}, 175 pages={158}, 176 abstract={This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.}, 177 isbn={978-3-540-48969-6}, 178 doi={10.1007/3-540-48969-X_8}, 179 url={https://doi.org/10.1007/3-540-48969-X_8} 180 } 181 @article{SG2012, 182 title={Cryptographic hash functions: a review}, 183 author={Sobti, Rajeev and Geetha, G}, 184 journal={International Journal of Computer Science Issues (IJCSI)}, 185 volume={9}, 186 number={2}, 187 pages={462}, 188 year=2012, 189 publisher={International Journal of Computer Science Issues (IJCSI)} 190 } 191 @article{BCK1996, 192 title={Message authentication using hash functions: The HMAC construction}, 193 author={Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo}, 194 journal={RSA Laboratories’ CryptoBytes}, 195 volume={2}, 196 number={1}, 197 pages={12--15}, 198 year=1996 199 } 200 @inproceedings{krawczyk2010, 201 title={Cryptographic extraction and key derivation: The HKDF scheme}, 202 author={Krawczyk, Hugo}, 203 booktitle={Annual Cryptology Conference}, 204 pages={631--648}, 205 year={2010}, 206 organization={Springer} 207 } 208 @inproceedings{BDK2016, 209 title={Argon2: new generation of memory-hard functions for password hashing and other applications}, 210 author={Biryukov, Alex and Dinu, Daniel and Khovratovich, Dmitry}, 211 booktitle={2016 IEEE European Symposium on Security and Privacy (EuroS\&P)}, 212 pages={292--302}, 213 year={2016}, 214 organization={IEEE} 215 } 216 @book{trimberger2012, 217 title={Field-programmable gate array technology}, 218 author={Trimberger, Stephen M}, 219 year={2012}, 220 publisher={Springer Science \& Business Media} 221 } 222 @misc{madurawe2006, 223 title={Alterable application specific integrated circuit (ASIC)}, 224 author={Madurawe, Raminda Udaya}, 225 year={2006}, 226 month=6, 227 publisher={Google Patents}, 228 note={US Patent 7,064,579} 229 } 230 @article{stamp2003, 231 title={Once upon a time-memory tradeoff}, 232 author={Stamp, Mark}, 233 journal={San Jose State University, Department of Computer Science}, 234 year={2003} 235 } 236 @article{vadhan2012, 237 title={Pseudorandomness}, 238 author={Vadhan, Salil P and others}, 239 journal={Foundations and Trends{\textregistered} in Theoretical Computer Science}, 240 volume={7}, 241 number={1--3}, 242 pages={1--336}, 243 year={2012}, 244 publisher={Now Publishers, Inc.} 245 } 246 @inproceedings{nielsen2002, 247 title={A threshold pseudorandom function construction and its applications}, 248 author={Nielsen, Jesper Buus}, 249 booktitle={Annual International Cryptology Conference}, 250 pages={401--416}, 251 year={2002}, 252 organization={Springer} 253 } 254 @article{GGM1986, 255 author = {Goldreich, Oded and Goldwasser, Shafi and Micali, Silvio}, 256 title = {How to Construct Random Functions}, 257 year = {1986}, 258 issue_date = {Oct. 1986}, 259 publisher = {Association for Computing Machinery}, 260 address = {New York, NY, USA}, 261 volume = {33}, 262 number = {4}, 263 issn = {0004-5411}, 264 url = {https://doi.org/10.1145/6490.6503}, 265 doi = {10.1145/6490.6503}, 266 journal = {J. ACM}, 267 month = aug, 268 pages = {792–807}, 269 numpages = {16} 270 } 271 @article{RK2011, 272 title={Designing an algorithm with high Avalanche Effect}, 273 author={Ramanujam, Sriram and Karuppiah, Marimuthu}, 274 journal={IJCSNS International Journal of Computer Science and Network Security}, 275 volume={11}, 276 number={1}, 277 pages={106--111}, 278 year={2011} 279 } 280 @inproceedings{GJW2011, 281 title={SHA-512/256}, 282 author={Gueron, Shay and Johnson, Simon and Walker, Jesse}, 283 booktitle={2011 Eighth International Conference on Information Technology: New Generations}, 284 pages={354--358}, 285 year={2011}, 286 organization={IEEE} 287 } 288 @article{just2004, 289 title={Designing and evaluating challenge-question systems}, 290 author={Just, Mike}, 291 journal={IEEE Security \& Privacy}, 292 volume={2}, 293 number={5}, 294 pages={32--39}, 295 year={2004}, 296 publisher={IEEE} 297 } 298 @inproceedings{MBSS2013, 299 title={SMS-based one-time passwords: attacks and defense}, 300 author={Mulliner, Collin and Borgaonkar, Ravishankar and Stewin, Patrick and Seifert, Jean-Pierre}, 301 booktitle={International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment}, 302 pages={150--159}, 303 year={2013}, 304 organization={Springer} 305 } 306 @article{pohlmann2017, 307 title={Wenn der Softbot menschliche Identit{\"a}t best{\"a}tigt. Videoident-Verfahren II: Die Technik}, 308 author={Pohlmann, Norbert and Frintrop, Jan-Hendrik and Widdermann, Rick and Ziegler, Tim}, 309 year={2017} 310 } 311 @book{garfinkel1995, 312 title={PGP: pretty good privacy}, 313 author={Garfinkel, Simson}, 314 year={1995}, 315 publisher={" O'Reilly Media, Inc."} 316 } 317 @inproceedings{LLLW*2017, 318 title={An efficient method to enhance Bitcoin wallet security}, 319 author={Liu, Yi and Li, Ruilin and Liu, Xingtong and Wang, Jian and Zhang, Lei and Tang, Chaojing and Kang, Hongyan}, 320 booktitle={2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)}, 321 pages={26--29}, 322 year={2017}, 323 organization={IEEE} 324 } 325 @online{emailauthowasp, 326 title = {Forgot Password Cheat Sheet}, 327 organization = {OWASP Foundation}, 328 year = 2020, 329 urldate = {2020-06-05}, 330 url = {https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html}, 331 } 332 @online{pepdoc, 333 title = {Welcome to p≡p Documentation!}, 334 organization = {pEp Security SA}, 335 year = 2020, 336 urldate = {2020-06-06}, 337 url = {https://www.pep.security/docs/}, 338 } 339 @online{coinbase, 340 title = {Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet}, 341 organization = {Coinbase}, 342 year = 2020, 343 urldate = {2020-06-06}, 344 url = {https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc}, 345 } 346 @online{bitcoin-keys, 347 title = {BIP 32 - Hierarchical Deterministic Wallets}, 348 organization = {Bitcoin}, 349 year = 2020, 350 urldate = {2020-06-06}, 351 url = {https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png}, 352 } 353 @online{bitlocker, 354 title = {BitLocker}, 355 organization = {Microsoft}, 356 year = 2020, 357 urldate = {2020-06-06}, 358 url = {https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview}, 359 } 360 @article{bajikar2002, 361 title={Trusted platform module (tpm) based security on notebook pcs-white paper}, 362 author={Bajikar, Sundeep}, 363 journal={Mobile Platforms Group Intel Corporation}, 364 volume={1}, 365 pages={20}, 366 year={2002} 367 } 368 @article{marlinspike2011, 369 title={SSL and the future of authenticity}, 370 author={Marlinspike, Moxie}, 371 journal={Black Hat USA}, 372 volume={6}, 373 year={2011} 374 } 375 @article{jerome2015, 376 title={AHV-Nummer als einheitlicher, organisations{\"u}bergreifender Personenidentifikator}, 377 author={J{\'e}r{\^o}me, Brugger and Angelina, BFH Dungga and Esther, BFH Hefti and ZH, Kt}, 378 year={2015}, 379 organization={BFH} 380 } 381 @inproceedings{caronni2000, 382 title={Walking the web of trust}, 383 author={Caronni, Germano}, 384 booktitle={Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)}, 385 pages={153--158}, 386 year={2000}, 387 organization={IEEE} 388 } 389 @article{heron2009, 390 title={Advanced encryption standard (AES)}, 391 author={Heron, Simon}, 392 journal={Network Security}, 393 volume={2009}, 394 number={12}, 395 pages={8--12}, 396 year={2009}, 397 publisher={Elsevier} 398 } 399 @inproceedings{josefsson2017, 400 title={Edwards-curve digital signature algorithm (EdDSA)}, 401 author={Josefsson, Simon and Liusvaara, Ilari}, 402 booktitle={Internet Research Task Force, Crypto Forum Research Group, RFC}, 403 volume={8032}, 404 year={2017} 405 } 406 407