-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.bib
427 lines (378 loc) · 13.8 KB
/
main.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
% *** Book ***
@book{Elenkov2015,
abstract = {There are nearly a billion Android devices in use today, and every one is a potential security breach. Love it or hate it, the security of Android-based devices is of major concern to users and developers alike. In "Android Security Internals," author Nikolay Elenkov delves into Android components and subsystems to give you a very deep and complete understanding of the security internals of Android devices. Elenkov's coverage of security topics ranges from package and user management to the details of cryptographic providers and credential storage. "Android Security Internals" is destined to be one book that that all security-minded Android developers will have to have on their bookshelves.},
author = {Elenkov, Nikolay},
mendeley-groups = {ETF/Logit,ETF/Logit/Books},
title = {{Android Security Internals: An in-depth guide to Android's security architecture}},
year = {2014},
publisher={No Starch Press}
}
@book{Igoe2014,
author = {Igoe, Tom and Coleman, Don and Jepson, Brian},
doi = {10.1017/CBO9781107415324.004},
eprint = {arXiv:1011.1669v3},
isbn = {9781449372064},
issn = {1098-6596},
mendeley-groups = {ETF/Logit,ETF/Logit/Books},
pages = {1--245},
pmid = {25246403},
title = {{Beginning NFC: near field communication with Arduino, Android, and Phonegap}},
year = {2014},
publisher={O'Reilly Media, Inc.}
}
@book{Searle1995,
title={The construction of social reality},
author={Searle, John R and Willis, S and others},
year={1995},
publisher={Simon and Schuster}
}
@book{coskunAndroid,
place={Chichester, West Sussex},
title={{Professional NFC application development for Android}},
publisher={Wiley},
author={Coskun, Vedat and Ok, Kerem and Ozdenizci, Busra},
year={2013}
}
@book{coskunNFC,
title={{Near field communication (NFC): From theory to practice}},
author={Coskun, Vedat and Ok, Kerem and Ozdenizci, Busra},
year={2011},
publisher={Wiley}
}
@book{bruces,
place={Cambridge},
title={Shaping things},
publisher={The MIT Press},
author={Sterling, Bruce and Wild, Lorraine},
year={2005}
}
@book{davis2012game,
title={Game theory: A nontechnical introduction},
author={Davis, Morton D},
year={2012},
publisher={Courier Corporation}
}
% *
@book{antonopoulos2014mastering,
title={Mastering Bitcoin: unlocking digital cryptocurrencies},
author={Antonopoulos, Andreas M},
year={2014},
publisher={" O'Reilly Media, Inc."}
}
@book{ferguson2011cryptography,
title={Cryptography engineering: design principles and practical applications},
author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi},
year={2011},
publisher={John Wiley \& Sons}
}
@book{singh2000code,
title={The code book: the science of secrecy from ancient Egypt to quantum cryptography},
author={Singh, Simon},
year={2000},
publisher={Anchor}
}
@book{buchmann2013introduction,
title={Introduction to public key infrastructures},
author={Buchmann, Johannes A and Karatsiolis, Evangelos and Wiesmaier, Alexander},
year={2013},
publisher={Springer Science \& Business Media}
}
@book{katz1996handbook,
title={Handbook of applied cryptography},
author={Katz, Jonathan and Menezes, Alfred J and Van Oorschot, Paul C and Vanstone, Scott A},
year={1996},
publisher={CRC Press}
}
% *** Article ***
@article{Cahill2003,
abstract = {The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.},
author = {Cahill, Vinny and Gray, Elizabeth and Seigneur, Jean Marc and Jensen, Christian D. and Chen, Yong and Shand, Brian and Dimmock, Nathan and Twigg, Andy and Bacon, Jean and English, Colin and Wagealla, Waleed and Terzis, Sotirios and Nixon, Paddy and {Di Marzo Serugendo}, Giovanna and Bryce, Ciar{\'{a}}n and Carbone, Marco and Krukow, Karl and Nielsen, Mogens},
doi = {10.1109/MPRV.2003.1228527},
isbn = {1536-1268},
issn = {15361268},
journal = {IEEE Pervasive Computing},
mendeley-groups = {ETF/Logit},
number = {3},
pages = {52--61},
title = {{Using trust for secure collaboration in uncertain environments}},
volume = {2},
year = {2003}
}
@article{rivest1978method,
title={A method for obtaining digital signatures and public-key cryptosystems},
author={Rivest, Ronald L and Shamir, Adi and Adleman, Leonard},
journal={Communications of the ACM},
volume={21},
number={2},
pages={120--126},
year={1978},
publisher={ACM}
}
@article{knuth1984literate,
title={Literate programming},
author={Knuth, Donald Ervin},
journal={The Computer Journal},
volume={27},
number={2},
pages={97--111},
year={1984},
publisher={Oxford University Press}
}
@article{nash1953two,
title={Two-person cooperative games},
author={Nash, John},
journal={Econometrica: Journal of the Econometric Society},
pages={128--140},
year={1953},
publisher={JSTOR}
}
@article{lamport1982byzantine,
title={The Byzantine generals problem},
author={Lamport, Leslie and Shostak, Robert and Pease, Marshall},
journal={ACM Transactions on Programming Languages and Systems (TOPLAS)},
volume={4},
number={3},
pages={382--401},
year={1982},
publisher={ACM}
}
@article{lamport2001paxos,
title={Paxos made simple},
author={Lamport, Leslie and others},
journal={ACM Sigact News},
volume={32},
number={4},
pages={18--25},
year={2001}
}
@article{soon2008qr,
title={{QR code}},
author={Soon, Tan Jin},
journal={Synthesis Journal},
volume={2008},
pages={59--78},
year={2008}
}
@article{merkle1978secure,
title={Secure communications over insecure channels},
author={Merkle, Ralph C},
journal={Communications of the ACM},
volume={21},
number={4},
pages={294--299},
year={1978},
publisher={ACM}
}
@article{diffie1976new,
title={New directions in cryptography},
author={Diffie, Whitfield and Hellman, Martin},
journal={IEEE transactions on Information Theory},
volume={22},
number={6},
pages={644--654},
year={1976},
publisher={IEEE}
}
% *** Web ***
@misc{assembly1948universal,
title={Universal declaration of human rights},
author={{UN General Assembly}},
journal={UN General Assembly},
year={1948}
}
@misc{kaliski2003twirl,
title={{TWIRL and RSA key size}},
author={Kaliski, Burt},
year={2003},
publisher={May}
}
@misc{wleaks,
title={{NSA files decoded: Edward Snowden's surveillance revelations explained}},
url={https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded},
journal={The Guardian},
author={MacAskill, Ewen},
year={2013},
note={Pristupano: 2019-02-08}
}
@misc{tindef,
url={https://e2e.ti.com/support/wireless-connectivity/other-wireless/f/667/p/486317/1778299?pi320995=3},
title={{TRF7970 reading NDEF HCE}},
journal={Texas Instruments E2E Community},
author={Ojeil, Youssef},
year={2016},
note={Pristupano: 2018-11-14}
}
@misc{nominatim,
url={https://wiki.openstreetmap.org/wiki/Nominatim},
journal={Nominatim},
author={{OpenStreetMaps}},
title={{Nominatim geocoding}},
year={2018},
note={Pristupano: 2018-09-14}
}
@misc{elenkov_2012,
title={Accessing the embedded secure element in Android 4.x},
url={https://nelenkov.blogspot.com/2012/08/accessing-embedded-secure-element-in.html},
journal={nelenkov.blogspot.com},
author={Elenkov, Nikolay},
year={2012},
note={Pristupano: 2018-09-14}
}
@misc{androidhce_2018,
url={https://developer.android.com/guide/topics/connectivity/nfc/hce},
journal={Android Developers},
author={{Google}},
title={Host-based card emulation overview},
year={2018},
note={Pristupano: 2018-09-14}
}
@misc{randomoracle_2014,
url={https://randomoracle.wordpress.com/2014/08/12/fakeid-android-nfc-stack-and-google-wallet-part-i/},
title={{FakeID, Android NFC stack and Google Wallet}},
author={{C. Paya}},
year={2014},
note={Pristupano: 2018-09-14}
}
@misc{geoa,
url={https://developer.android.com/guide/topics/location/strategies},
title={{Location strategies}},
journal={Android Developers},
author={{Google}},
year={2018},
note={Pristupano: 2018-09-14}
}
@misc{droidstats,
title={Android Statistics Dashboard},
author={Google},
url={https://developer.android.com/about/dashboards/},
note={Pristupano: 2017-09-01}
},
@misc{nfcforecast,
url={https://nfcworld.com/2014/02/12/327790/two-three-phones-come-nfc-2018/},
title={{NFC World - Adoption Forecast}},
author={Clark, Sarah},
year={2014},
note={Pristupano: 2017-09-11}
}
@misc{gdpr,
author = {EU},
booktitle = {Official Journal of the European Union},
mendeley-groups = {ETF/Logit},
number = {4.5.2016},
pages = {88},
title = {{Uredba (EU) 2016/679 Europskog parlamenta i Vije{\'{c}}a od 27. travnja 2016. o za{\v{s}}titi pojedinaca u vezi s obradom osobnih podataka i o slobodnom kretanju takvih podataka te o stavljanju izvan snage Direktive 95/46/EZ (Op{\'{c}}a uredba o za{\v{s}}titi podataka)}},
url = {http://data.europa.eu/eli/reg/2016/679/oj},
volume = {L 119},
year = {2016}
}
% *** Tech Report ***
@techreport{cheneau2009ecc,
title={{ECC public key and signature support in Cryptographically Generated Addresses (CGA) and in the Secure Neighbor Discovery (SEND)}},
author={Cheneau, T and Laurent, M and Shen, S and Vanderveen, M},
year={2009},
publisher={IETF Draft},
institution = {IETF},
url = {https://tools.ietf.org/id/draft-cheneau-csi-ecc-sig-agility-01.html}
}
@techreport{dierks2008transport,
title={{The transport layer security (TLS) protocol version 1.2}},
author={Dierks, Tim},
howpublished = {Internet Requests for Comments},
type = {RFC},
number = 5246,
year={2008},
publisher = {RFC Editor},
institution = {RFC Editor},
url = {https://www.ietf.org/rfc/rfc5246.txt}
}
@techreport{iso2013iso,
type = {Standard},
title={27001: 2013 Information security management},
author={ISO/IEC},
journal={Information Technology-Security Techniques-Information Security Management Systems-Requirements},
year={2013},
publisher={International Organization for Standardization},
institution = {International Organization for Standardization}
}
@techreport{x509,
type = {Standard},
title={{X.509 - The Directory: Public-key and attribute certificate frameworks}},
author={ITU-T},
url={https://www.itu.int/rec/T-REC-X.509-201610-I/en},
year={2016},
publisher={International Telecommunication Union},
institution = {International Telecommunication Union}
}
@techreport{atmelecc,
title = {{RSA vs ECC Comparison for Embedded Systems}},
author = {Maletsky, Kerry},
year = {2015},
institution = {Atmel Corporation},
}
@techreport{NTAG216,
abstract = {NTAG213, NTAG215 and NTAG216 have been developed by NXP Semiconductors as standard NFC tag ICs to be used in mass market applications such as retail, gaming and consumer electronics, in combination with NFC devices or NFC compliant Proximity Coupling Devices. NTAG213, NTAG215 and NTAG216 (from now on, generally called NTAG21x) are designed to fully comply to NFC Forum Type 2 Tag (Ref. 2) and ISO/IEC14443 Type A (Ref. 1) specifications. Target applications include Out-of-Home and print media smart advertisement, SoLoMo applications, product authentication, NFC shelf labels, mobile companion tags. Target use cases include Out-of-Home smart advertisement, product authentication, mobile companion tags, Bluetooth or Wi-Fi pairing, electronic shelf labels and business cards. NTAG21x memory can also be segmented to implement multiple applications at the same time. Thanks to the high input capacitance, NTAG21x tag ICs are particularly tailored for applications requiring small footprints, without compromise on performance. Small NFC tags can be more easily embedded into e.g. product labels or electronic devices. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers.},
author = {{NXP Semiconductors}},
mendeley-groups = {ETF/Logit/Standardi},
number = {October},
pages = {1--30},
title = {{NTAG213/215/216 NFC Forum Type 2 Tag}},
url = {https://www.nxp.com/docs/en/data-sheet/NTAG213_215_216.pdf},
year = {2011},
institution={NXP Semiconductors}
}
@techreport{NFCTag2,
type = {Standard},
author = {{NFC Forum}},
institution = {NFC Forum},
isbn = {7818768955},
mendeley-groups = {ETF/Logit/Standardi},
pages = {40},
title = {{Type 2 Tag Operation Specification}},
url = {http://apps4android.org/nfc-specifications/NFCForum-TS-Type-4-Tag_2.0.pdf},
year = {2011}
}
@techreport{NFCProtocol,
type = {Standard},
author = {{NFC Forum}},
institution = {NFC Forum},
mendeley-groups = {ETF/Logit/Standardi},
title = {{NFC Digital Protocol Technical Specification}},
url = {http://www.nfc-forum.org/specs/},
year = {2010}
}
@techreport{ISO14443,
type = {Standard},
key = {ISO 14443:1-4},
year = {2018},
title = {{ISO/IEC 14443-1:2018(en) 1-4 - Cards and security devices for personal identification}},
volume = {4},
address = {Geneva, CH},
institution = {International Organization for Standardization},
author={{ISO/IEC}}
}
@techreport{NDEF,
type = {Standard},
author = {{NFC Forum}},
institution = {NFC Forum},
mendeley-groups = {ETF/Logit/Standardi},
pages = {69},
title = {{NFC Data Exchange Format (NDEF)}},
year = {2006}
}
% *** Proceedings ***
@inproceedings{locproof,
title={Who, When, and Where? Location Proof Assertion for Mobile Devices},
author={Khan, Rasib and Zawoad, Shams and Haque, Md Munirul and Hasan, Ragib},
booktitle={IFIP Annual Conference on Data and Applications Security and Privacy},
pages={146-162},
year={2014},
organization={Springer}
}
@inproceedings{castro1999practical,
title={Practical Byzantine fault tolerance},
author={Castro, Miguel and Liskov, Barbara and others},
booktitle={OSDI},
volume={99},
pages={173--186},
year={1999}
}