A. Plateaux, P. Lacharme, V. Coquet, S. Vernois, K. Murty et al., An e-payment Architecture Ensuring a High Level of Privacy Protection, 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 2013.
DOI : 10.1007/978-3-642-14577-3_27

URL : https://hal.archives-ouvertes.fr/hal-01001929

A. Plateaux, P. Lacharme, K. Murty, and C. Rosenberger, Online user's registration respecting privacy, 2013 World Congress on Computer and Information Technology (WCCIT), 2013.
DOI : 10.1109/WCCIT.2013.6618718

A. Plateaux, V. Coquet, S. Vernois, P. Lacharme, C. Rosenberger et al., A Privacy Preserving E-Payment Architecture, Financial Cryptography and Data Security (FC) -Session POSTER, 2013.

J. Vincent, V. Alimi, A. Plateaux, C. Gaber, and M. Pasquet, A Mobile Payment Evaluation Based on a Digital Identity Representation, Collaboration Technologies and Systems (CTS), 2012.

A. Plateaux, P. Lacharme, V. Coquet, S. Vernois, G. Frey et al., Protection de la vie privée dans les modèles de paiement en ligne, 8ième Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI), 2013.

P. Lacharme, K. Murty, and C. Rosenberger, Minimisation des données de e-santé, A. Plateaux, 4ième Atelier Protection de la Vie Privée (APVP), 2013.

A. Plateaux, P. Lacharme, and C. Rosenberger, Protection de la vie privée dans le système de paiement 3D-Secure, 4ième Atelier Protection de la Vie Privée (APVP), 2013.

. A. Dépôt-de-brevet-1, V. Plateaux, P. Coquet, S. Lacharme, C. Vernois et al., E-payment architecture preserving the privacy, p.4097

D. Dodson and W. Polk, Privacy and identity management for europe [cité p. 10, 21, 59] [3] Information technology ? security techniques ? entity authentication ? part 1 : General Information security : Electronic authentication guideline Securing electronic medical records using biometric authentication, Bibliographie [1] Les transactions Électroniques sécurisées Audio-and Video-Based Biometric Person Authentication, pp.1110-1119, 2004.

. Assemblée-nationale, . Sénat, and . Loi, [cité p. 12] [8] Cnil : Commission nationale informatique et libertés, Lois Informatiques et Libertés, Janvier, issue.6, pp.78-95, 1978.

L. Parlement-européen, ce du parlement europeen et du conseil du 31 mars 2004 relative à la coordination des procédures de passation des marchés publics de travaux, de fournitures et de services, Journal officiel de l'Union européenne FR, vol.18114, issue.134, pp.50-64, 2004.

S. L. Corone, école privée, prestataire de services. Le Monde, Economie(560 mots), p.14, 2007.

J. Vincent, Gestion d'identité en contexte télécom, pp.15-59, 2013.

. Décret-numéro, pris pour l'application de la loi numéro 78-17 du 6 janvier 1978 relative à l'informatique, aux fichiers et aux libertés, modifiée par la loi numéro, p.15, 1309.

. Partie-législative, Livre iii des crimes et délits contre les bien : Titre ii des autres atteintes aux biens : Chapitre iii des atteintes aux systèmes de traitement automatisé de données, p.15

M. Microsoft, The stride threat model, p.15, 2005.

D. Mina, Privacy Preserving Content Protection, p.15, 2010.

L. Lopucki, Human Identification Theory and the Identity Theft Problem, SSRN Electronic Journal, vol.80, pp.89-134, 2001.
DOI : 10.2139/ssrn.263213

S. Bellovin, Defending against sequence number attacks, p.16, 1996.
DOI : 10.17487/rfc1948

N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell, Client-side defense against web-based identity theft, Proc. NDSS, p.17, 2004.

R. Pries, W. Yu, X. Fu, and W. Zhao, A New Replay Attack Against Anonymous Communication Networks, 2008 IEEE International Conference on Communications, pp.1578-1582, 2008.
DOI : 10.1109/ICC.2008.305

T. Aura, Strategies against replay attacks, Proceedings 10th Computer Security Foundations Workshop, pp.59-68, 1997.
DOI : 10.1109/CSFW.1997.596787

A. Srivastava and A. Eustace, Atom : A system for building customized program analysis tools, Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation, pp.196-205, 1994.

S. Idrus, E. Cherrier, C. Rosenberger, and P. Bours, A preliminary study of a new soft biometric finger recognition for keystroke dynamics, 9th Summer School for Advanced Studies on Biometrics for Secure Authentication : Understanding Man Machine Interactions in Forensics and Security Applications, p.18, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00789370

I. Mann, Hacking the human : social engineering techniques and security countermeasures, p.18, 2008.

K. Mitnick and W. Simon, The art of deception : Controlling the human element of security, p.18, 2003.

H. Hasle, Y. Kristiansen, K. Kintel, and E. Snekkenes, Measuring resistance to social engineering. Information Security Practice and Experience, pp.132-143, 2005.
DOI : 10.1007/978-3-540-31979-5_12

M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song, Dynamic spyware analysis, USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, pp.1-14, 2007.

S. Saroiu, S. Gribble, and H. Levy, Measurement and analysis of spywave in a university environment, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, pp.11-18, 2004.

R. Romain, Contributions à la dynamique de frappe au clavier : multibiométrie, biométrie douce et mise à jour de la référence, p.18, 2012.

W. Burr, D. Dodson, and W. Polk, Electronic authentication guideline : Recommendations of the National Institute of Standards and Technology, p.19, 2006.

R. Anderson, A security policy model for clinical information systems, Proceedings 1996 IEEE Symposium on Security and Privacy, p.19, 1996.
DOI : 10.1109/SECPRI.1996.502667

B. Schneier, Protecting privacy and liberty, Nature, vol.413, issue.6858, pp.773-792, 2001.
DOI : 10.1038/35101663

A. Allen, Constitutional law and privacy. A companion to philosophy of law and legal theory, pp.139-155, 1996.
DOI : 10.1002/9781444320114.ch8

Y. Deswarte and S. Gambs, Towards a privacy-preserving national identity card. Data Privacy Management and Autonomous Spontaneous Security, pp.48-64, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00411838

A. Pfitzmann and M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management -a consolidated proposal for terminology, 2008.

K. Cameron, The laws of identity

N. Fips, Announcing the advanced encryption standard (aes) Information Technology Laboratory, National Institute of Standards and Technology, pp.22-29, 2001.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.30-52, 2002.
DOI : 10.1145/586110.586114

A. Nationale, . Sénat, and . Loi, pour la confiance dans l'économie numérique, p.29, 2004.

P. Fips, 46-3, data encryption standard (des) National Institute for Standards and Technology, p.29, 1999.

. Nist, National institute of standarts and technology, p.29

J. Daemen and V. Rijmen, The design of Rijndael : AES?the advanced encryption standard, p.29, 2002.
DOI : 10.1007/978-3-662-04722-4

M. Dworkin, Recommendation for block cipher modes of operation : Methods and techniques, p.30, 2001.
DOI : 10.6028/NIST.SP.800-38a

M. Dworkin, Special publication 800-38b : Recommendation for block cipher modes of operation : The cmac mode for authentication, p.30, 2005.

G. Bertoni, J. Daemen, M. Peeters, and G. Van-assche, Keccak sponge function family main document. Submission to NIST, p.30, 2009.

R. Rivest, A. Shamir, and L. Adleman, Cryptographic communications system and method, US Patent, vol.4405, pp.829-860, 1983.

K. Aoki, J. Franke, T. Kleinjung, A. Lenstra, and D. Osvik, A kilobit special number field sieve factorization Advances in Cryptology?ASIACRYPT, pp.1-12, 2007.

M. Fellows and N. Koblitz, Combinatorial cryptosystems galore. Finite Fields : Theory, Applications, and Algorithms, pp.51-61
DOI : 10.1090/conm/168/01688

B. Buchberger and F. Winkler, Gröbner bases and applications, p.31, 1998.

S. Pohlig and M. Hellman, An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. Information Theory, IEEE Transactions on, vol.24, issue.1, pp.106-110, 1978.

V. Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology, p.85
DOI : 10.1007/3-540-39799-X_31

N. Koblitz, Elliptic curve cryptosystems Mathematics of computation, pp.203-209, 1987.

J. Stern, La cryptologie : des messages secrets aux transactions sécurisées, p.32, 2008.

P. Rogawayy, Optimal asymmetric encryption how to encrypt with rsa, p.32, 1995.

M. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.

E. Caprioli, Ecrit et preuve électroniques dans la loi n 2000-230 du 13 mars, p.33, 2000.

I. De-lamberterie and J. Blanchette, Le décret du 30 mars 2001 relatif à la signature électronique : lecture critique, technique et juridique, JCP Entreprise et Affaires, pp.30-56, 2001.

P. Gallagher and C. Director, Fips pub 186-3 federal information processing standards publication digital signature standard (dss), p.34, 2009.

C. Schnorr, Efficient identification and signatures for smart cards, Advances in Cryptology- Crypto'89 Proceedings, pp.239-252, 1990.

K. Nyberg and R. , Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, pp.61-81, 1996.

M. Abe and T. Okamoto, A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, Advances in Cryptology-ASIACRYPT'99, pp.378-389, 2004.
DOI : 10.1007/978-3-540-48000-6_30

R. Mukkamamla and M. Halappanavar, Ecpv : Efficient certificate path validation in publickey infrastructure, Proceedings of 17th IFIP WG11, p.34

J. Jonsson, Public-key cryptography standards (pkcs)# 1 : Rsa cryptography specification version 2, p.34, 2003.
DOI : 10.17487/rfc3447

L. Kohnfelder, Towards a practical public-key cryptosystem, p.35, 1978.

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proofsystems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, pp.291-304, 1985.

D. Chaum, Zero-knowledge undeniable signatures, Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.458-464, 1991.
DOI : 10.1007/3-540-46877-3_41

. Iso, 98-5 information technology ? security techniques ? entity authentication ? part 5 : Mechanisms using zero-knowledge techniques, p.36, 2009.

U. Feige, A. Fiat, and A. Shamir, Zero-knowledge proofs of identity, Journal of Cryptology, vol.3, issue.2, pp.77-94, 1988.
DOI : 10.1007/BF02351717

A. Shamir and A. Fiat, Method, apparatus and article for identification and signature, US Patent, vol.4748, pp.668-705, 1988.

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology-Crypto'86, pp.186-194, 1987.
DOI : 10.1007/3-540-47721-7_12

O. Goldreich, S. Micali, and A. Wigderson, Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM, vol.38, issue.3, pp.690-728, 1991.
DOI : 10.1145/116825.116852

C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991.
DOI : 10.1007/BF00196725

URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf

R. Cramer, I. Damgard, and B. Schoenmakers, Proof of partial knowledge and simplified designe of witness hiding protocols, CRYPTO'94, p.38, 1994.

E. Hufschmitt, Signatures pour l'anonymat fondées sur les couplages et applications, pp.38-42, 2007.

E. Brickell, D. Chaum, I. Damgård, and J. Van-de-graaf, Gradual and verifiable release of a secret, Advances in Cryptology-CRYPTO'87, pp.156-166, 2006.

A. Chan, Y. Frankel, and Y. Tsiounis, Easy come ??? Easy go divisible cash, Advances in Cryptology-EUROCRYPT'98, pp.561-575, 1998.
DOI : 10.1007/BFb0054154

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.6247

F. Boudot, Efficient Proofs that a Committed Number Lies in an Interval, Advances in Cryptology-EUROCRYPT 2000, pp.431-444, 2000.
DOI : 10.1007/3-540-45539-6_31

F. Boudot, B. Schoenmakers, and J. Traore, A fair and efficient solution to the socialist millionaires??? problem, Discrete Applied Mathematics, vol.111, issue.1-2, pp.23-36, 2001.
DOI : 10.1016/S0166-218X(00)00342-5

D. Chaum, Blind Signatures for Untraceable Payments, Advances in Cryptology : Proceedings of Crypto, pp.199-203, 1983.
DOI : 10.1007/978-1-4757-0602-4_18

C. Schnorr, Security of blind discrete log signatures against interactive attacks. Information and Communications Security, pp.1-12, 2001.

D. Pointcheval and J. Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000.
DOI : 10.1007/s001450010003

J. Pailles, Mobile transactions : trust and privacy aspects, C&ESAR 2008. Orange Labs, Orange FT Group, p.41, 2008.

D. Chaum and E. Van-heyst, Group Signatures, Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, pp.257-265, 1991.
DOI : 10.1007/3-540-46416-6_22

J. Camenisch and M. Stadler, Efficient group signature schemes for large groups Advances in Cryptology-CRYPTO'97, pp.410-424, 1997.

D. Chaum, Blind Signatures for Untraceable Payments, Crypto, pp.199-203, 1982.
DOI : 10.1007/978-1-4757-0602-4_18

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology-EUROCRYPT 2001, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

S. Brands and C. Paquin, U-prove cryptographic specification v1. 0, pp.43-59, 2010.

C. Paquin, U-prove technology overview v1, pp.43-59, 2011.

S. A. Brands, Rethinking Public Key Infrastructures and digital certificates : builgind in privacy, p.43, 2000.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, Advances in Cryptology-EUROCRYPT'98, pp.127-144, 1998.
DOI : 10.1007/BFb0054122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006.
DOI : 10.1145/1127345.1127346

A. Jain, K. Nandakumar, and A. Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.113-159, 2008.
DOI : 10.1109/TIFS.2007.908165

N. Ratha, J. Connell, and R. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.
DOI : 10.1147/sj.403.0614

B. Teoh and C. Ngo, Cancellable biometerics featuring with tokenised random number, Pattern Recognition Letters, vol.26, issue.10, pp.1454-1460, 2005.
DOI : 10.1016/j.patrec.2004.11.021

A. Nagar, K. Nandakumar, and A. Jain, Biometric template transformation : A security analysis, Media Forensics and Security, p.46, 2010.

N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007.
DOI : 10.1109/TPAMI.2007.1004

Y. Kim, A. Teoh, and K. Toh, A performance driven methodology for cancelable face templates generation, Pattern Recognition, vol.43, issue.7, pp.2544-2559, 2010.
DOI : 10.1016/j.patcog.2010.02.001

A. Teoh, D. Ngo, and A. Goh, Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal Mach

A. Jain, K. Nandakumar, and A. Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.1-17, 2008.
DOI : 10.1109/TIFS.2007.908165

A. Hindle and D. German, SCQL, ACM SIGSOFT Software Engineering Notes, vol.30, issue.4, pp.1-5, 2005.
DOI : 10.1145/1082983.1083161

M. International, Chip authentication program functional architecture, p.49, 2004.

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems-CHES 2001, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990

J. Quisquater and D. Samyde, Electromagnetic analysis (ema) : Measures and countermeasures for smart cards. Smart Card Programming and Security, pp.200-210, 2001.

P. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology-CRYPTO'96, pp.104-113, 1996.
DOI : 10.1007/3-540-68697-5_9

M. Hendry, Smart Card Security and Applications, EDPACS, vol.25, issue.11, p.49, 2001.
DOI : 10.1201/1079/43233.25.11.19980501/30169.6

A. Smart, C. Ics, and H. Europe-ltd, Infineon Technologies AG, and Philips Semiconductors . Platform protection profile, p.49, 2001.

T. Commitee, Sd specification : Physical layer simplified specification version 4.10. SD Card Association, p.50, 2013.

P. Fips, 140-1 : Security requirements for cryptographic modules, p.51, 1994.

K. Nishilura, S. Ishikawa, K. Hirota, H. Aburatani, M. Hirose et al., Technologies de l'information ? techniques de sécurité ? critères d'évaluation pour la sécurité ti, p.51, 2005.

L. Emvco, Integrated circuit card, specifications for payment systems, p.51, 2000.

S. Bull, Crypt2pay : Security services, pp.52-169, 2009.

J. Cuaresma, Gramm-leach-bliley act, the, Berkeley Tech. LJ, vol.17, pp.497-56, 2002.

P. Commissioner and . Canada, The personal information protection and electronic documents act. Available at SSRN 1403922, p.56, 2009.

R. Wenning, M. Schunter, L. Cranor, and M. Marchiori, The platform for privacy preferences 1.1 (p3p1. 1) specification. W3C Working Group Note, p.57, 2006.

S. Buchegger, D. Schiöberg, L. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009.
DOI : 10.1145/1578002.1578010

L. Cutillo, R. Molva, and T. Strufe, Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, pp.1-6, 2009.
DOI : 10.1109/WOWMOM.2009.5282446

URL : https://hal.archives-ouvertes.fr/hal-00687186

S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia, DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012.
DOI : 10.1109/PerComW.2012.6197504

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16
DOI : 10.1145/1179529.1179532

A. Freier, P. Karlton, and P. Kocher, The secure sockets layer (ssl) protocol version 3.0, p.67, 2011.
DOI : 10.17487/rfc6101

T. Dierks, The transport layer security (tls) protocol version 1.2, p.67, 2008.
DOI : 10.17487/rfc5246

D. Wagner and B. Schneier, Analysis of the ssl 3.0 protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, pp.29-40, 1996.

E. Gabrilovich and A. Gontmakher, The homograph attack, Communications of the ACM, vol.45, issue.2, pp.128-67, 2002.
DOI : 10.1145/503124.503156

O. Aciiçmez, W. Schindler, and C. Koç, Improving Brumley and Boneh timing attack on unprotected SSL implementations, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.139-146, 2005.
DOI : 10.1145/1102120.1102140

L. Bygrave, Germanys teleservices data protection act. privacy law and policy reporter, p.67, 1998.

P. Dss, Payment card industry data security standard, p.68, 2006.

. La-loi-n, relative aux droits des malades et à la qualité du système de santé, Parue au Journal officiel de la République Française, p.76, 2002.

R. Anderson, A security policy model for clinical information systems, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.30-43, 1996.
DOI : 10.1109/SECPRI.1996.502667

R. Anderson, Under threat: patient confidentiality and NHS computing, Drugs and Alcohol Today, vol.6, issue.4, pp.13-17, 2006.
DOI : 10.1108/17459265200600060

R. Anderson, Confidentiality and Connecting for Health, British Journal of General Practice, vol.58, issue.547, pp.75-76, 2008.
DOI : 10.3399/bjgp08X263992

F. Caldicott and G. Britain, Report on the review of patient-identifiable information. Department of Health, p.78, 1997.

. Loi, 810 du 13 août 2004 relative à l'assurance maladie, Parue au Journal officiel de la République Française (JORF) le, p.80, 2004.

C. Cours, Rapport public annuel : Les téléservices publics de santé, p.80, 2013.

C. Quantin, G. Coatrieux, M. Fassa, V. Breton, D. Jaquet-chiffelle et al., Centralised versus decentralised management of patients? medical records, Medical Informatics in a United and Healthy Europe, p.81, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00473701

D. Ghindici, Information flow analysis for embedded systems : from practical to theoretical aspects, p.81, 2008.

M. Deng, D. De-cock, and B. Preneel, Towards a cross???context identity management framework in e???health, Online Information Review, vol.33, issue.3, pp.422-442, 2009.
DOI : 10.1108/14684520910969880

M. Deng, R. Scandariato, D. De-cock, B. Preneel, and W. Joosen, Identity in federated electronic healthcare, 2008 1st IFIP Wireless Days, pp.1-5, 2008.
DOI : 10.1109/WD.2008.4812919

G. Ateniese and B. Medeiros, Anonymous E-prescriptions, Proceeding of the ACM workshop on Privacy in the Electronic Society , WPES '02, pp.19-31, 2002.
DOI : 10.1145/644527.644530

B. D. Decker, M. Layouni, H. Vangheluwe, and K. Verslype, Anonymous e-prescriptions, pp.118-133, 2008.

Y. Espelid, L. Netland, A. Klingsheim, and K. Hole, A Proof of Concept Attack against Norwegian Internet Banking Systems, Financial Cryptography, pp.197-201, 2008.
DOI : 10.1007/978-3-540-85230-8_18

E. Commission, 31/EC of the european parliament and of the council of 8 june 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market, p.106, 2000.

E. Commission, DirectiveEC of the european parliament and of the council of 13 november 2007 on payment services in the internal market, p.106, 2007.

. European-payments and . Council, Single euro payment area, 2007.

S. Katsikas, J. Lopez, and G. Pernul, Trust, Privacy and Security in E-Business: Requirements and Solutions, Advances in Informatics, pp.548-558, 2005.
DOI : 10.1007/11573036_52

A. Worldline, Sips e-payment, solution de paiement sécurisé, p.108, 2002.

S. Murdoch and R. Anderson, Verified by visa and mastercard securecode : or, how not to design authentication. Financial Cryptography and Data Security, pp.336-342, 2010.

S. Drimer, S. Murdoch, and R. Anderson, Optimised to fail : Card readers for online banking. Financial Cryptography and Data Security, pp.184-200, 2009.

C. Meadows and P. Syverson, A formal specification of requirements for payment transactions in the SET protocol, Proceedings of Financial Cryptography and Data Sceurity, p.108, 1998.
DOI : 10.1007/BFb0055477

G. Bella, F. Massacci, L. Paulson, and P. Tramontano, Formal Verification of Cardholder Registration in SET, Computer Security -ESORICS, vol.114, pp.159-174, 2000.
DOI : 10.1007/10722599_10

S. Bella, L. Paulson, and F. Massacci, The verification of an industrial payment protocol, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.12-20, 2002.
DOI : 10.1145/586110.586113

S. Brlek, S. Hamadou, and J. Mullins, A flaw in the electronic commerce protocol SET, Information Processing Letters, vol.97, issue.3, pp.104-108, 2006.
DOI : 10.1016/j.ipl.2005.10.002

V. Pasupathinathan, J. Pieprzyk, H. Wang, and J. Cho, Formal analysis of card-based payment systems in mobile devices, Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pp.213-220, 2006.

M. Ashrafi and S. Ng, Enabling Privacy-Preserving e-Payment Processing, Database Systems for Advanced Applications, pp.596-603, 2008.
DOI : 10.1007/978-3-540-78568-2_51

G. Antoniou and L. Batten, E-commerce : protecting purchaser privacy to enforce trust. Electronic commerce research, pp.421-456, 2011.

A. Freier, P. Kocher, and P. Karlton, RFC 6101 : The secure sockets layer (SSL) protocol version 3, p.111, 2011.

T. Dierks, RFC 5246 : The transport layer security (TLS) protocol version 1.2, p.111, 2008.

. Paypal, Achetez, vendez et envoyez de l'argent en ligne, p.112, 1988.

. Paypal, Privacy policy for paypal services, p.112, 2012.

D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Advances in Cryptology CRYPTO'88, pp.319-327, 1990.
DOI : 10.1007/0-387-34799-2_25

M. Carbonell, J. Torres, A. Izquierdo, and D. Suarez, New e-payment scenarios in an extended version of the traditional model. Computational Science and Its Applications? ICCSA, pp.514-525, 2008.

M. Pasquet, C. Rosenberger, and F. Cuozzo, Security for electronic commerce. Encyclopedia of Information Science and Technology, pp.14-113, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00288447

G. Bella, F. Massacci, and L. Paulson, Verifying the SET Purchase Protocols, Journal of Automated Reasoning, vol.2, issue.3, pp.5-37, 2006.
DOI : 10.1007/s10817-005-9018-6

A. Fioravanti and F. Massacci, How to model (and simplify) the SET payment phase for automated verification, IJCAR'01, p.114, 2001.

M. Anderson, The electronic check architecture. Financial Services Technology Consortium, p.123, 1998.

T. Chen, S. Yeh, K. Liao, and W. Lee, A Practical and Efficient Electronic Checkbook, Journal of Organizational Computing and Electronic Commerce, vol.434, issue.4, pp.285-293, 2009.
DOI : 10.1007/s10207-002-0015-z

V. Pasupathinathan, J. Pieprzyk, and H. Wang, Privacy Enhanced Electronic Cheque System, Seventh IEEE International Conference on E-Commerce Technology (CEC'05), pp.431-434, 2005.
DOI : 10.1109/ICECT.2005.68

Y. Shah, F. Vanbever, and G. Leibbrandt, Society for worldwide interbank financial telecommunication, p.125, 1977.

S. Gastellier-prevost, G. Granadillo, and M. Laurent, Decisive Heuristics to Differentiate Legitimate from Phishing Sites, 2011 Conference on Network and Information Systems Security, pp.1-9, 2011.
DOI : 10.1109/SAR-SSI.2011.5931389

URL : https://hal.archives-ouvertes.fr/hal-01304087

.. Schéma-général-de-la-chaîne-d, une transaction électronique sécurisée Source : [1]

.. Identités-possibles-pour-un-utilisateur, Source : [1], p.11