1 | | "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Universal Subscriber Identity Module (USIM) application", Release 11, 2012. |
2 | | "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Remote APDU Structure for (U)SIM Toolkit applications", Release 10, 2012. |
3 | | "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications", Release 10, 2012. |
4 | | "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; UICC-terminal interface; Physical and logical characteristics", Release 10, 2011. |
5 | | "3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Universal Subscriber Identity Module (USIM) Application Toolkit (USAT)", Release 11, 2012. |
6 | | "GlobalPlatform Card Confidential Card Content Management Card Specification v2.2-Amendment A", 2011. |
7 | | "GlobalPlatform Card Contactless Services Card Specification v2.2-Amendment C", 2012. |
8 | | "GlobalPlatform Card Remote Application Management over HTTP Card Specification v2.2-Amendment B", 2012. |
9 | | "GlobalPlatform Card Security Upgrade for Card Content Management Card Specification v 2.2-Amendment E", 2011. |
10 | | "GlobalPlatform Card Specification", Version 2.2.1, 2011. |
11 | | "GlobalPlatform Card Technology Secure Channel Protocol 03 Card Specification v 2.2-Amendment D", 2009. |
12 | | "GlobalPlatform Device Secure Element Remote Application Management", May 2011. |
13 | | "GlobalPlatform Device Technology Secure Element Access Control", Version 1.0, May 2012. |
14 | | "GlobalPlatform Device Technology TEE System Architecture", Dec. 2011. |
15 | | "GlobalPlatform Key Management System", Functional Requirements, Nov. 2003. |
16 | | "GlobalPlatform System Messaging Specification for Management of Mobile-NFC Services", Feb. 2011. |
17 | | "Over-The-Air Platform Security Review", Mandiant Intelligent Information Security, 6 pgs., Aug. 17, 2010. |
18 |
| Farhat, Farshid, Somayeh Salimi, and Ahmad Salahi. "Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup" IACR Cryptology ePrint Archive 2011 (2011): 45. |
19 | | "Reprogrammable SIMs: Technology, Evolution and Implications", csmg, Sep. 25, 2012. |
20 |
| "Secure Authentication for Mobile Internet Services"-Sim Alliance, Dec. 2011 http://simalliance.org/wp-content/uploads/2015/03/12-01-01-WP-SIMallianceSecureAuthentication-EN-V1.1.pdf. |
21 | | "Smart Cards; Card Application Tookit (CAT)", Release 11, 2012. |
22 | | "Smart Cards; ETSI numbering system for telecommunication application providers", Release 11, 2011. |
23 | | "Smart Cards; Machine to Machine UICC; Physical and logical characteristics", Release 9, 2011. |
24 | | "Smart Cards; Remote APDU structure for UICC based applications", Release 11, 2012. |
25 | | "Smart Cards; Secured packet structure for UICC based applications", Release 11, 2012. |
26 | | "Smart Cards; Security mechanisms for UICC based Applications-Functional requirements", Release 8, 2008. |
27 | | "Smart Cards; UICC Application Programming Interface (UICC API) for Java Card(TM)", Release 9, 2012. |
28 | | "Smart Cards; UICC Application Programming Interface (UICC API) for Java Card™", Release 9, 2012. |
29 | | "Smart Cards; UICC-Terminal Interface; Physical and logical characteristics", Release 10, 2011, 179 pages. |
30 | | "The OTA Platform in the World of LTE", 14 pgs., Jan. 2011. |
31 | | "Universal Mobile Telecommunications System (UMTS); UICC-terminal interface; Physical and logical characteristics", Release 10, 2011. |
32 | | Chen, "An efficient end-to-end security mechanism for IP multimedia subsystem", Computer Communications, 2008, vol. 31.18, pp. 4259-4268. |
33 | | Dodson, Ben et al., "Snap2Pass: Consumer-Friendly Challenge-Response Authentication with a Phone", http://prpl.stanford.edu/papers/soups10j.pdf, Apr. 30, 2010. |
34 | | Global Platform, "Secure Element Remote Application Management", Version 1.0, May 2011. |
35 | | Imhontu, et al., "A survey on near field communication in mobile phones & PDAs", Dissertation Halmstad University, 2010. http://hh.diva-portal.org/smash/get/diva2:385433/FULLTEXT01. |
36 | | Kim, Jong-Min et al., "A Study of Coupons issuance System Considering of User Convenience Based on NFC", 3rd International Conference on Computer Science and Information Technology (ICCSIT'2013) Jan. 4-5, 2013 Bali (Indonesia). http://psrcentre.org/images/extraimages/113118.pdf. |
37 | | Kounelis, Ioannis et al., "Secure Middleware for Mobile Phones and UICC Applications", Mobile Wireless Middleware, Operating Systems, and Applications, Springer Berlin Heidelberg, 2012, 143-152. |
38 | | Kounelis, Ioannis et al., "Security of service requests for cloud based m-commerce", MIPRO, 2012 Proceedings of the 35th International Convention, IEEE, 2012. |
39 | | Meyerstein, et al., "Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications", InterDigital Communications Corporation LLC, First International ICST Conference: MobiSec 2009, Security and Privacy in Mobile Information and Communication Systems, p. 214-225, Jun. 3-5, 2009. |
40 | | Nagalakshmi, et al., "Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature Keys", Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011, pp. 376, 381. |
41 | | Zhang, et al., "Cryptographic Key Agreement Protocol Simulation", Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, 2010, pp. 418, 419. |
Comments
Post a Comment