anastasis

Credential backup and recovery protocol and service
Log | Files | Refs | Submodules | README | LICENSE

bibliothek.bib (14092B)


      1 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
      2 %% File : thesis.bib
      3 %% Date : Saturday Sep 15 15:54:56 2018
      4 %% Author : Dominik Meister, Dennis Neufeld 
      5 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
      6 %% Description : Sample bibliography file
      7 %% WARNING : To be used with biblatex and biber, this file should be
      8 %%           UTF-8 encoded
      9 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
     10 %% Usage :
     11 %%  1) add the lines in the preamble of your document:
     12 %%    \usepackage[backend=biber, style=ieee]{biblatex}
     13 %%    \addbibresource{template.bib}
     14 %%                  
     15 %% 2) Compile the document at least once (preferably with lualatex), e.g.
     16 %%    lualatex template.tex
     17 %%
     18 %% 3) Run the command "biber" on your document, e.g.
     19 %%    biber template
     20 %%
     21 %% 4) Compile the document twice with lualatex
     22 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
     23 
     24 @online{global_data_index,
     25 	title        = {Global Data Protection Index 2018 – Key Findings},
     26 	organization = {Dell EMC.},
     27 	year	     = 2018,	
     28 	urldate      = {2020-03-07},
     29 	url          = {https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)},
     30 }
     31 @online{gnu_taler,
     32 	title        = {GNU Taler: Features},
     33 	organization = {Taler Systems SA},
     34 	year	     = 2020,	
     35 	urldate      = {2020-06-02},
     36 	url          = {https://taler.net/en/features.html},
     37 }
     38 @online{postgresql,
     39 	title        = {PostgreSQL: The World's Most Advanced Open Source Relational Database},
     40 	organization = {The PostgreSQL Global Development Group},
     41 	year	     = 2020,	
     42 	urldate      = {2020-06-02},
     43 	url          = {https://www.postgresql.org/},
     44 }
     45 @online{libmicrohttpd,
     46 	title        = {GNU Libmicrohttpd},
     47 	organization = {GNU project},
     48 	year	     = 2020,	
     49 	urldate      = {2020-06-02},
     50 	url          = {https://www.gnu.org/software/libmicrohttpd/?},
     51 }
     52 @online{gnu_project,
     53 	title        = {What is GNU?},
     54 	organization = {GNU project},
     55 	year	     = 2020,	
     56 	urldate      = {2020-06-02},
     57 	url          = {https://www.gnu.org/},
     58 }
     59 @online{libcurl,
     60 	title        = {libcurl - the multiprotocol file transfer library },
     61 	organization = {Curl},
     62 	year	     = 2020,	
     63 	urldate      = {2020-06-02},
     64 	url          = {https://curl.haxx.se/libcurl/},
     65 }
     66 @online{ccc_merkel,
     67 	title	     = {CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck},
     68 	author	     = {Stefan Krempl},	
     69 	organization = {heise online}, 
     70 	year	     = 2014,
     71 	urldate	     = {2020-03-07},
     72 	url	     = {https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html},
     73 }	
     74 @online{millions_lost,
     75 	title	     = {Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password},
     76 	author	     = {Anthony Cuthbertson},
     77 	organization = {INDEPENDENT},
     78 	year	     = 2019,
     79 	urldate	     = {2020-03-07},
     80 	url	     = {https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html},
     81 }
     82 @online{forgot_my_pin,
     83 	title	     = {I Forgot My PIN’: An Epic Tale of Losing \$30,000 in Bitcoin},
     84 	author	     = {Mark Frauenfelder},
     85 	organization = {WIRED},
     86 	year	     = 2017,
     87 	urldate	     = {2020-03-07},
     88 	url	     = {https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/},
     89 }	
     90 @inproceedings{pedersen_sharing_0,
     91   title={Non-interactive and information-theoretic secure verifiable secret sharing},
     92   author={Pedersen, Torben Pryds},
     93   booktitle={Annual international cryptology conference},
     94   pages={129--140},
     95   year=1991,
     96   organization={Springer},
     97   chapter={0},
     98 }
     99 @inproceedings{pedersen_sharing_5.2,
    100   title={Non-interactive and information-theoretic secure verifiable secret sharing},
    101   author={Pedersen, Torben Pryds},
    102   booktitle={Annual international cryptology conference},
    103   pages={129--140},
    104   year=1991,
    105   organization={Springer},
    106   chapter={5.2},
    107 }
    108 @article{shamir_sharing,
    109   title={How to share a secret},
    110   author={Shamir, Adi},
    111   journal={Communications of the ACM},
    112   volume={22},
    113   number={11},
    114   pages={612--613},
    115   year=1979,
    116   publisher={ACm New York, NY, USA},
    117 }
    118 @inproceedings{feldman_sharing,
    119   title={A practical scheme for non-interactive verifiable secret sharing},
    120   author={Feldman, Paul},
    121   booktitle={28th Annual Symposium on Foundations of Computer Science (sfcs 1987)},
    122   pages={427--438},
    123   year=1987,
    124   organization={IEEE},
    125 }
    126 @article{authentication_methods_review,
    127   title = {A Review on Authentication Methods},
    128   author = {Syed Idrus, Syed Zulkarnain and Cherrier, Estelle and Rosenberger, Christophe and Schwartzmann, Jean-Jacques},
    129   url = {https://hal.archives-ouvertes.fr/hal-00912435},
    130   journal = {Australian Journal of Basic and Applied Sciences},
    131   volume = {7},
    132   number = {5},
    133   pages = {95-107},
    134   year = 2013,
    135 }
    136 @book{rieck_detection,
    137   title={Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings},
    138   author={Rieck, Konrad and Stewin, Patrick and Seifert, Jean-Pierre},
    139   volume={7967},
    140   year=2013,
    141   publisher={Springer}
    142 }
    143 @article{biometric_auth,
    144   title={Privacy-preserving biometric authentication: challenges and directions},
    145   author={Pagnin, Elena and Mitrokotsa, Aikaterini},
    146   journal={Security and Communication Networks},
    147   volume={2017},
    148   year=2017,
    149   publisher={Hindawi}
    150 }
    151 @article{multifactor_authentication,
    152   title={Multi-factor authentication: A survey},
    153   author={Ometov, Aleksandr and Bezzateev, Sergey and Makitalo, Niko and Andreev, Sergey and Mikkonen, Tommi and Koucheryavy, Yevgeni},
    154   journal={Cryptography},
    155   volume={2},
    156   number={1},
    157   pages={1},
    158   year=2018,
    159   publisher={Multidisciplinary Digital Publishing Institute}
    160 }
    161 @book{midata,
    162   title={Applied Approach to Privacy and Security for the Internet of Things},
    163   author={Parag Chatterjee, Emmanuel Benoist and Asoke Nath},
    164   year={in print},
    165   publisher={IGI Global}
    166 }
    167 @Inbook{Preneel1999,
    168   author={Preneel, Bart},
    169   editor={Damg{\aa}rd, Ivan Bjerre},
    170   title={The State of Cryptographic Hash Functions},
    171   bookTitle={Lectures on Data Security: Modern Cryptology in Theory and Practice},
    172   year=1999,
    173   publisher={Springer Berlin Heidelberg},
    174   address={Berlin, Heidelberg},
    175   pages={158},
    176   abstract={This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.},
    177   isbn={978-3-540-48969-6},
    178   doi={10.1007/3-540-48969-X_8},
    179   url={https://doi.org/10.1007/3-540-48969-X_8}
    180 }
    181 @article{SG2012,
    182   title={Cryptographic hash functions: a review},
    183   author={Sobti, Rajeev and Geetha, G},
    184   journal={International Journal of Computer Science Issues (IJCSI)},
    185   volume={9},
    186   number={2},
    187   pages={462},
    188   year=2012,
    189   publisher={International Journal of Computer Science Issues (IJCSI)}
    190 }
    191 @article{BCK1996,
    192   title={Message authentication using hash functions: The HMAC construction},
    193   author={Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo},
    194   journal={RSA Laboratories’ CryptoBytes},
    195   volume={2},
    196   number={1},
    197   pages={12--15},
    198   year=1996
    199 }
    200 @inproceedings{krawczyk2010,
    201   title={Cryptographic extraction and key derivation: The HKDF scheme},
    202   author={Krawczyk, Hugo},
    203   booktitle={Annual Cryptology Conference},
    204   pages={631--648},
    205   year={2010},
    206   organization={Springer}
    207 }
    208 @inproceedings{BDK2016,
    209   title={Argon2: new generation of memory-hard functions for password hashing and other applications},
    210   author={Biryukov, Alex and Dinu, Daniel and Khovratovich, Dmitry},
    211   booktitle={2016 IEEE European Symposium on Security and Privacy (EuroS\&P)},
    212   pages={292--302},
    213   year={2016},
    214   organization={IEEE}
    215 }
    216 @book{trimberger2012,
    217   title={Field-programmable gate array technology},
    218   author={Trimberger, Stephen M},
    219   year={2012},
    220   publisher={Springer Science \& Business Media}
    221 }
    222 @misc{madurawe2006,
    223   title={Alterable application specific integrated circuit (ASIC)},
    224   author={Madurawe, Raminda Udaya},
    225   year={2006},
    226   month=6,
    227   publisher={Google Patents},
    228   note={US Patent 7,064,579}
    229 }
    230 @article{stamp2003,
    231   title={Once upon a time-memory tradeoff},
    232   author={Stamp, Mark},
    233   journal={San Jose State University, Department of Computer Science},
    234   year={2003}
    235 }
    236 @article{vadhan2012,
    237   title={Pseudorandomness},
    238   author={Vadhan, Salil P and others},
    239   journal={Foundations and Trends{\textregistered} in Theoretical Computer Science},
    240   volume={7},
    241   number={1--3},
    242   pages={1--336},
    243   year={2012},
    244   publisher={Now Publishers, Inc.}
    245 }
    246 @inproceedings{nielsen2002,
    247   title={A threshold pseudorandom function construction and its applications},
    248   author={Nielsen, Jesper Buus},
    249   booktitle={Annual International Cryptology Conference},
    250   pages={401--416},
    251   year={2002},
    252   organization={Springer}
    253 }
    254 @article{GGM1986,
    255   author = {Goldreich, Oded and Goldwasser, Shafi and Micali, Silvio},
    256   title = {How to Construct Random Functions},
    257   year = {1986},
    258   issue_date = {Oct. 1986},
    259   publisher = {Association for Computing Machinery},
    260   address = {New York, NY, USA},
    261   volume = {33},
    262   number = {4},
    263   issn = {0004-5411},
    264   url = {https://doi.org/10.1145/6490.6503},
    265   doi = {10.1145/6490.6503},
    266   journal = {J. ACM},
    267   month = aug,
    268   pages = {792–807},
    269   numpages = {16}
    270 }
    271 @article{RK2011,
    272   title={Designing an algorithm with high Avalanche Effect},
    273   author={Ramanujam, Sriram and Karuppiah, Marimuthu},
    274   journal={IJCSNS International Journal of Computer Science and Network Security},
    275   volume={11},
    276   number={1},
    277   pages={106--111},
    278   year={2011}
    279 }
    280 @inproceedings{GJW2011,
    281   title={SHA-512/256},
    282   author={Gueron, Shay and Johnson, Simon and Walker, Jesse},
    283   booktitle={2011 Eighth International Conference on Information Technology: New Generations},
    284   pages={354--358},
    285   year={2011},
    286   organization={IEEE}
    287 }
    288 @article{just2004,
    289   title={Designing and evaluating challenge-question systems},
    290   author={Just, Mike},
    291   journal={IEEE Security \& Privacy},
    292   volume={2},
    293   number={5},
    294   pages={32--39},
    295   year={2004},
    296   publisher={IEEE}
    297 }
    298 @inproceedings{MBSS2013,
    299   title={SMS-based one-time passwords: attacks and defense},
    300   author={Mulliner, Collin and Borgaonkar, Ravishankar and Stewin, Patrick and Seifert, Jean-Pierre},
    301   booktitle={International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment},
    302   pages={150--159},
    303   year={2013},
    304   organization={Springer}
    305 }
    306 @article{pohlmann2017,
    307   title={Wenn der Softbot menschliche Identit{\"a}t best{\"a}tigt. Videoident-Verfahren II: Die Technik},
    308   author={Pohlmann, Norbert and Frintrop, Jan-Hendrik and Widdermann, Rick and Ziegler, Tim},
    309   year={2017}
    310 }
    311 @book{garfinkel1995,
    312   title={PGP: pretty good privacy},
    313   author={Garfinkel, Simson},
    314   year={1995},
    315   publisher={" O'Reilly Media, Inc."}
    316 }
    317 @inproceedings{LLLW*2017,
    318   title={An efficient method to enhance Bitcoin wallet security},
    319   author={Liu, Yi and Li, Ruilin and Liu, Xingtong and Wang, Jian and Zhang, Lei and Tang, Chaojing and Kang, Hongyan},
    320   booktitle={2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)},
    321   pages={26--29},
    322   year={2017},
    323   organization={IEEE}
    324 }
    325 @online{emailauthowasp,
    326 	title        = {Forgot Password Cheat Sheet},
    327 	organization = {OWASP Foundation},
    328 	year	     = 2020,	
    329 	urldate      = {2020-06-05},
    330 	url          = {https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html},
    331 }
    332 @online{pepdoc,
    333 	title        = {Welcome to p≡p Documentation!},
    334 	organization = {pEp Security SA},
    335 	year	     = 2020,	
    336 	urldate      = {2020-06-06},
    337 	url          = {https://www.pep.security/docs/},
    338 }
    339 @online{coinbase,
    340 	title        = {Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet},
    341 	organization = {Coinbase},
    342 	year	     = 2020,	
    343 	urldate      = {2020-06-06},
    344 	url          = {https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc},
    345 }
    346 @online{bitcoin-keys,
    347 	title        = {BIP 32 - Hierarchical Deterministic Wallets},
    348 	organization = {Bitcoin},
    349 	year	     = 2020,	
    350 	urldate      = {2020-06-06},
    351 	url          = {https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png},
    352 }
    353 @online{bitlocker,
    354 	title        = {BitLocker},
    355 	organization = {Microsoft},
    356 	year	     = 2020,	
    357 	urldate      = {2020-06-06},
    358 	url          = {https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview},
    359 }
    360 @article{bajikar2002,
    361   title={Trusted platform module (tpm) based security on notebook pcs-white paper},
    362   author={Bajikar, Sundeep},
    363   journal={Mobile Platforms Group Intel Corporation},
    364   volume={1},
    365   pages={20},
    366   year={2002}
    367 }
    368 @article{marlinspike2011,
    369   title={SSL and the future of authenticity},
    370   author={Marlinspike, Moxie},
    371   journal={Black Hat USA},
    372   volume={6},
    373   year={2011}
    374 }
    375 @article{jerome2015,
    376   title={AHV-Nummer als einheitlicher, organisations{\"u}bergreifender Personenidentifikator},
    377   author={J{\'e}r{\^o}me, Brugger and Angelina, BFH Dungga and Esther, BFH Hefti and ZH, Kt},
    378   year={2015},
    379   organization={BFH}
    380 }
    381 @inproceedings{caronni2000,
    382   title={Walking the web of trust},
    383   author={Caronni, Germano},
    384   booktitle={Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)},
    385   pages={153--158},
    386   year={2000},
    387   organization={IEEE}
    388 }
    389 @article{heron2009,
    390   title={Advanced encryption standard (AES)},
    391   author={Heron, Simon},
    392   journal={Network Security},
    393   volume={2009},
    394   number={12},
    395   pages={8--12},
    396   year={2009},
    397   publisher={Elsevier}
    398 }
    399 @inproceedings{josefsson2017,
    400   title={Edwards-curve digital signature algorithm (EdDSA)},
    401   author={Josefsson, Simon and Liusvaara, Ilari},
    402   booktitle={Internet Research Task Force, Crypto Forum Research Group, RFC},
    403   volume={8032},
    404   year={2017}
    405 }
    406 
    407