An e-payment Architecture Ensuring a High Level of Privacy Protection, 9th International Conference on Security and Privacy in Communication Networks (SecureComm), 2013. ,
DOI : 10.1007/978-3-642-14577-3_27
URL : https://hal.archives-ouvertes.fr/hal-01001929
Online user's registration respecting privacy, 2013 World Congress on Computer and Information Technology (WCCIT), 2013. ,
DOI : 10.1109/WCCIT.2013.6618718
A Privacy Preserving E-Payment Architecture, Financial Cryptography and Data Security (FC) -Session POSTER, 2013. ,
A Mobile Payment Evaluation Based on a Digital Identity Representation, Collaboration Technologies and Systems (CTS), 2012. ,
Protection de la vie privée dans les modèles de paiement en ligne, 8ième Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI), 2013. ,
Minimisation des données de e-santé, A. Plateaux, 4ième Atelier Protection de la Vie Privée (APVP), 2013. ,
Protection de la vie privée dans le système de paiement 3D-Secure, 4ième Atelier Protection de la Vie Privée (APVP), 2013. ,
E-payment architecture preserving the privacy, p.4097 ,
Privacy and identity management for europe [cité p. 10, 21, 59] [3] Information technology ? security techniques ? entity authentication ? part 1 : General Information security : Electronic authentication guideline Securing electronic medical records using biometric authentication, Bibliographie [1] Les transactions Électroniques sécurisées Audio-and Video-Based Biometric Person Authentication, pp.1110-1119, 2004. ,
[cité p. 12] [8] Cnil : Commission nationale informatique et libertés, Lois Informatiques et Libertés, Janvier, issue.6, pp.78-95, 1978. ,
ce du parlement europeen et du conseil du 31 mars 2004 relative à la coordination des procédures de passation des marchés publics de travaux, de fournitures et de services, Journal officiel de l'Union européenne FR, vol.18114, issue.134, pp.50-64, 2004. ,
école privée, prestataire de services. Le Monde, Economie(560 mots), p.14, 2007. ,
Gestion d'identité en contexte télécom, pp.15-59, 2013. ,
pris pour l'application de la loi numéro 78-17 du 6 janvier 1978 relative à l'informatique, aux fichiers et aux libertés, modifiée par la loi numéro, p.15, 1309. ,
Livre iii des crimes et délits contre les bien : Titre ii des autres atteintes aux biens : Chapitre iii des atteintes aux systèmes de traitement automatisé de données, p.15 ,
The stride threat model, p.15, 2005. ,
Privacy Preserving Content Protection, p.15, 2010. ,
Human Identification Theory and the Identity Theft Problem, SSRN Electronic Journal, vol.80, pp.89-134, 2001. ,
DOI : 10.2139/ssrn.263213
Defending against sequence number attacks, p.16, 1996. ,
DOI : 10.17487/rfc1948
Client-side defense against web-based identity theft, Proc. NDSS, p.17, 2004. ,
A New Replay Attack Against Anonymous Communication Networks, 2008 IEEE International Conference on Communications, pp.1578-1582, 2008. ,
DOI : 10.1109/ICC.2008.305
Strategies against replay attacks, Proceedings 10th Computer Security Foundations Workshop, pp.59-68, 1997. ,
DOI : 10.1109/CSFW.1997.596787
Atom : A system for building customized program analysis tools, Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation, pp.196-205, 1994. ,
A preliminary study of a new soft biometric finger recognition for keystroke dynamics, 9th Summer School for Advanced Studies on Biometrics for Secure Authentication : Understanding Man Machine Interactions in Forensics and Security Applications, p.18, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00789370
Hacking the human : social engineering techniques and security countermeasures, p.18, 2008. ,
The art of deception : Controlling the human element of security, p.18, 2003. ,
Measuring resistance to social engineering. Information Security Practice and Experience, pp.132-143, 2005. ,
DOI : 10.1007/978-3-540-31979-5_12
Dynamic spyware analysis, USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, pp.1-14, 2007. ,
Measurement and analysis of spywave in a university environment, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, pp.11-18, 2004. ,
Contributions à la dynamique de frappe au clavier : multibiométrie, biométrie douce et mise à jour de la référence, p.18, 2012. ,
Electronic authentication guideline : Recommendations of the National Institute of Standards and Technology, p.19, 2006. ,
A security policy model for clinical information systems, Proceedings 1996 IEEE Symposium on Security and Privacy, p.19, 1996. ,
DOI : 10.1109/SECPRI.1996.502667
Protecting privacy and liberty, Nature, vol.413, issue.6858, pp.773-792, 2001. ,
DOI : 10.1038/35101663
Constitutional law and privacy. A companion to philosophy of law and legal theory, pp.139-155, 1996. ,
DOI : 10.1002/9781444320114.ch8
Towards a privacy-preserving national identity card. Data Privacy Management and Autonomous Spontaneous Security, pp.48-64, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00411838
Anonymity, unlinkability, unobservability, pseudonymity, and identity management -a consolidated proposal for terminology, 2008. ,
The laws of identity ,
Announcing the advanced encryption standard (aes) Information Technology Laboratory, National Institute of Standards and Technology, pp.22-29, 2001. ,
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.30-52, 2002. ,
DOI : 10.1145/586110.586114
pour la confiance dans l'économie numérique, p.29, 2004. ,
46-3, data encryption standard (des) National Institute for Standards and Technology, p.29, 1999. ,
National institute of standarts and technology, p.29 ,
The design of Rijndael : AES?the advanced encryption standard, p.29, 2002. ,
DOI : 10.1007/978-3-662-04722-4
Recommendation for block cipher modes of operation : Methods and techniques, p.30, 2001. ,
DOI : 10.6028/NIST.SP.800-38a
Special publication 800-38b : Recommendation for block cipher modes of operation : The cmac mode for authentication, p.30, 2005. ,
Keccak sponge function family main document. Submission to NIST, p.30, 2009. ,
Cryptographic communications system and method, US Patent, vol.4405, pp.829-860, 1983. ,
A kilobit special number field sieve factorization Advances in Cryptology?ASIACRYPT, pp.1-12, 2007. ,
Combinatorial cryptosystems galore. Finite Fields : Theory, Applications, and Algorithms, pp.51-61 ,
DOI : 10.1090/conm/168/01688
Gröbner bases and applications, p.31, 1998. ,
An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. Information Theory, IEEE Transactions on, vol.24, issue.1, pp.106-110, 1978. ,
Use of Elliptic Curves in Cryptography, Advances in Cryptology, p.85 ,
DOI : 10.1007/3-540-39799-X_31
Elliptic curve cryptosystems Mathematics of computation, pp.203-209, 1987. ,
La cryptologie : des messages secrets aux transactions sécurisées, p.32, 2008. ,
Optimal asymmetric encryption how to encrypt with rsa, p.32, 1995. ,
New directions in cryptography, IEEE transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
Ecrit et preuve électroniques dans la loi n 2000-230 du 13 mars, p.33, 2000. ,
Le décret du 30 mars 2001 relatif à la signature électronique : lecture critique, technique et juridique, JCP Entreprise et Affaires, pp.30-56, 2001. ,
Fips pub 186-3 federal information processing standards publication digital signature standard (dss), p.34, 2009. ,
Efficient identification and signatures for smart cards, Advances in Cryptology- Crypto'89 Proceedings, pp.239-252, 1990. ,
Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography, pp.61-81, 1996. ,
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, Advances in Cryptology-ASIACRYPT'99, pp.378-389, 2004. ,
DOI : 10.1007/978-3-540-48000-6_30
Ecpv : Efficient certificate path validation in publickey infrastructure, Proceedings of 17th IFIP WG11, p.34 ,
Public-key cryptography standards (pkcs)# 1 : Rsa cryptography specification version 2, p.34, 2003. ,
DOI : 10.17487/rfc3447
Towards a practical public-key cryptosystem, p.35, 1978. ,
The knowledge complexity of interactive proofsystems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, pp.291-304, 1985. ,
Zero-knowledge undeniable signatures, Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.458-464, 1991. ,
DOI : 10.1007/3-540-46877-3_41
98-5 information technology ? security techniques ? entity authentication ? part 5 : Mechanisms using zero-knowledge techniques, p.36, 2009. ,
Zero-knowledge proofs of identity, Journal of Cryptology, vol.3, issue.2, pp.77-94, 1988. ,
DOI : 10.1007/BF02351717
Method, apparatus and article for identification and signature, US Patent, vol.4748, pp.668-705, 1988. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology-Crypto'86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems, Journal of the ACM, vol.38, issue.3, pp.690-728, 1991. ,
DOI : 10.1145/116825.116852
Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991. ,
DOI : 10.1007/BF00196725
URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf
Proof of partial knowledge and simplified designe of witness hiding protocols, CRYPTO'94, p.38, 1994. ,
Signatures pour l'anonymat fondées sur les couplages et applications, pp.38-42, 2007. ,
Gradual and verifiable release of a secret, Advances in Cryptology-CRYPTO'87, pp.156-166, 2006. ,
Easy come ??? Easy go divisible cash, Advances in Cryptology-EUROCRYPT'98, pp.561-575, 1998. ,
DOI : 10.1007/BFb0054154
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.6247
Efficient Proofs that a Committed Number Lies in an Interval, Advances in Cryptology-EUROCRYPT 2000, pp.431-444, 2000. ,
DOI : 10.1007/3-540-45539-6_31
A fair and efficient solution to the socialist millionaires??? problem, Discrete Applied Mathematics, vol.111, issue.1-2, pp.23-36, 2001. ,
DOI : 10.1016/S0166-218X(00)00342-5
Blind Signatures for Untraceable Payments, Advances in Cryptology : Proceedings of Crypto, pp.199-203, 1983. ,
DOI : 10.1007/978-1-4757-0602-4_18
Security of blind discrete log signatures against interactive attacks. Information and Communications Security, pp.1-12, 2001. ,
Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000. ,
DOI : 10.1007/s001450010003
Mobile transactions : trust and privacy aspects, C&ESAR 2008. Orange Labs, Orange FT Group, p.41, 2008. ,
Group Signatures, Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, pp.257-265, 1991. ,
DOI : 10.1007/3-540-46416-6_22
Efficient group signature schemes for large groups Advances in Cryptology-CRYPTO'97, pp.410-424, 1997. ,
Blind Signatures for Untraceable Payments, Crypto, pp.199-203, 1982. ,
DOI : 10.1007/978-1-4757-0602-4_18
Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985. ,
DOI : 10.1145/4372.4373
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology-EUROCRYPT 2001, pp.93-118, 2001. ,
DOI : 10.1007/3-540-44987-6_7
U-prove cryptographic specification v1. 0, pp.43-59, 2010. ,
U-prove technology overview v1, pp.43-59, 2011. ,
Rethinking Public Key Infrastructures and digital certificates : builgind in privacy, p.43, 2000. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Divertible protocols and atomic proxy cryptography, Advances in Cryptology-EUROCRYPT'98, pp.127-144, 1998. ,
DOI : 10.1007/BFb0054122
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246
Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006. ,
DOI : 10.1145/1127345.1127346
Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.113-159, 2008. ,
DOI : 10.1109/TIFS.2007.908165
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
DOI : 10.1147/sj.403.0614
Cancellable biometerics featuring with tokenised random number, Pattern Recognition Letters, vol.26, issue.10, pp.1454-1460, 2005. ,
DOI : 10.1016/j.patrec.2004.11.021
Biometric template transformation : A security analysis, Media Forensics and Security, p.46, 2010. ,
Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007. ,
DOI : 10.1109/TPAMI.2007.1004
A performance driven methodology for cancelable face templates generation, Pattern Recognition, vol.43, issue.7, pp.2544-2559, 2010. ,
DOI : 10.1016/j.patcog.2010.02.001
Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal Mach ,
Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, pp.1-17, 2008. ,
DOI : 10.1109/TIFS.2007.908165
SCQL, ACM SIGSOFT Software Engineering Notes, vol.30, issue.4, pp.1-5, 2005. ,
DOI : 10.1145/1082983.1083161
Chip authentication program functional architecture, p.49, 2004. ,
Electromagnetic Analysis: Concrete Results, Cryptographic Hardware and Embedded Systems-CHES 2001, pp.251-261, 2001. ,
DOI : 10.1007/3-540-44709-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990
Electromagnetic analysis (ema) : Measures and countermeasures for smart cards. Smart Card Programming and Security, pp.200-210, 2001. ,
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, Advances in Cryptology-CRYPTO'96, pp.104-113, 1996. ,
DOI : 10.1007/3-540-68697-5_9
Smart Card Security and Applications, EDPACS, vol.25, issue.11, p.49, 2001. ,
DOI : 10.1201/1079/43233.25.11.19980501/30169.6
Infineon Technologies AG, and Philips Semiconductors . Platform protection profile, p.49, 2001. ,
Sd specification : Physical layer simplified specification version 4.10. SD Card Association, p.50, 2013. ,
140-1 : Security requirements for cryptographic modules, p.51, 1994. ,
Technologies de l'information ? techniques de sécurité ? critères d'évaluation pour la sécurité ti, p.51, 2005. ,
Integrated circuit card, specifications for payment systems, p.51, 2000. ,
Crypt2pay : Security services, pp.52-169, 2009. ,
Gramm-leach-bliley act, the, Berkeley Tech. LJ, vol.17, pp.497-56, 2002. ,
The personal information protection and electronic documents act. Available at SSRN 1403922, p.56, 2009. ,
The platform for privacy preferences 1.1 (p3p1. 1) specification. W3C Working Group Note, p.57, 2006. ,
PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009. ,
DOI : 10.1145/1578002.1578010
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, pp.1-6, 2009. ,
DOI : 10.1109/WOWMOM.2009.5282446
URL : https://hal.archives-ouvertes.fr/hal-00687186
DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012. ,
DOI : 10.1109/PerComW.2012.6197504
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, pp.11-16 ,
DOI : 10.1145/1179529.1179532
The secure sockets layer (ssl) protocol version 3.0, p.67, 2011. ,
DOI : 10.17487/rfc6101
The transport layer security (tls) protocol version 1.2, p.67, 2008. ,
DOI : 10.17487/rfc5246
Analysis of the ssl 3.0 protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, pp.29-40, 1996. ,
The homograph attack, Communications of the ACM, vol.45, issue.2, pp.128-67, 2002. ,
DOI : 10.1145/503124.503156
Improving Brumley and Boneh timing attack on unprotected SSL implementations, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.139-146, 2005. ,
DOI : 10.1145/1102120.1102140
Germanys teleservices data protection act. privacy law and policy reporter, p.67, 1998. ,
Payment card industry data security standard, p.68, 2006. ,
relative aux droits des malades et à la qualité du système de santé, Parue au Journal officiel de la République Française, p.76, 2002. ,
A security policy model for clinical information systems, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.30-43, 1996. ,
DOI : 10.1109/SECPRI.1996.502667
Under threat: patient confidentiality and NHS computing, Drugs and Alcohol Today, vol.6, issue.4, pp.13-17, 2006. ,
DOI : 10.1108/17459265200600060
Confidentiality and Connecting for Health, British Journal of General Practice, vol.58, issue.547, pp.75-76, 2008. ,
DOI : 10.3399/bjgp08X263992
Report on the review of patient-identifiable information. Department of Health, p.78, 1997. ,
810 du 13 août 2004 relative à l'assurance maladie, Parue au Journal officiel de la République Française (JORF) le, p.80, 2004. ,
Rapport public annuel : Les téléservices publics de santé, p.80, 2013. ,
Centralised versus decentralised management of patients? medical records, Medical Informatics in a United and Healthy Europe, p.81, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00473701
Information flow analysis for embedded systems : from practical to theoretical aspects, p.81, 2008. ,
Towards a cross???context identity management framework in e???health, Online Information Review, vol.33, issue.3, pp.422-442, 2009. ,
DOI : 10.1108/14684520910969880
Identity in federated electronic healthcare, 2008 1st IFIP Wireless Days, pp.1-5, 2008. ,
DOI : 10.1109/WD.2008.4812919
Anonymous E-prescriptions, Proceeding of the ACM workshop on Privacy in the Electronic Society , WPES '02, pp.19-31, 2002. ,
DOI : 10.1145/644527.644530
Anonymous e-prescriptions, pp.118-133, 2008. ,
A Proof of Concept Attack against Norwegian Internet Banking Systems, Financial Cryptography, pp.197-201, 2008. ,
DOI : 10.1007/978-3-540-85230-8_18
31/EC of the european parliament and of the council of 8 june 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market, p.106, 2000. ,
DirectiveEC of the european parliament and of the council of 13 november 2007 on payment services in the internal market, p.106, 2007. ,
Single euro payment area, 2007. ,
Trust, Privacy and Security in E-Business: Requirements and Solutions, Advances in Informatics, pp.548-558, 2005. ,
DOI : 10.1007/11573036_52
Sips e-payment, solution de paiement sécurisé, p.108, 2002. ,
Verified by visa and mastercard securecode : or, how not to design authentication. Financial Cryptography and Data Security, pp.336-342, 2010. ,
Optimised to fail : Card readers for online banking. Financial Cryptography and Data Security, pp.184-200, 2009. ,
A formal specification of requirements for payment transactions in the SET protocol, Proceedings of Financial Cryptography and Data Sceurity, p.108, 1998. ,
DOI : 10.1007/BFb0055477
Formal Verification of Cardholder Registration in SET, Computer Security -ESORICS, vol.114, pp.159-174, 2000. ,
DOI : 10.1007/10722599_10
The verification of an industrial payment protocol, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.12-20, 2002. ,
DOI : 10.1145/586110.586113
A flaw in the electronic commerce protocol SET, Information Processing Letters, vol.97, issue.3, pp.104-108, 2006. ,
DOI : 10.1016/j.ipl.2005.10.002
Formal analysis of card-based payment systems in mobile devices, Proceedings of the 2006 Australasian workshops on Grid computing and e-research, pp.213-220, 2006. ,
Enabling Privacy-Preserving e-Payment Processing, Database Systems for Advanced Applications, pp.596-603, 2008. ,
DOI : 10.1007/978-3-540-78568-2_51
E-commerce : protecting purchaser privacy to enforce trust. Electronic commerce research, pp.421-456, 2011. ,
RFC 6101 : The secure sockets layer (SSL) protocol version 3, p.111, 2011. ,
RFC 5246 : The transport layer security (TLS) protocol version 1.2, p.111, 2008. ,
Achetez, vendez et envoyez de l'argent en ligne, p.112, 1988. ,
Privacy policy for paypal services, p.112, 2012. ,
Untraceable Electronic Cash, Advances in Cryptology CRYPTO'88, pp.319-327, 1990. ,
DOI : 10.1007/0-387-34799-2_25
New e-payment scenarios in an extended version of the traditional model. Computational Science and Its Applications? ICCSA, pp.514-525, 2008. ,
Security for electronic commerce. Encyclopedia of Information Science and Technology, pp.14-113, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00288447
Verifying the SET Purchase Protocols, Journal of Automated Reasoning, vol.2, issue.3, pp.5-37, 2006. ,
DOI : 10.1007/s10817-005-9018-6
How to model (and simplify) the SET payment phase for automated verification, IJCAR'01, p.114, 2001. ,
The electronic check architecture. Financial Services Technology Consortium, p.123, 1998. ,
A Practical and Efficient Electronic Checkbook, Journal of Organizational Computing and Electronic Commerce, vol.434, issue.4, pp.285-293, 2009. ,
DOI : 10.1007/s10207-002-0015-z
Privacy Enhanced Electronic Cheque System, Seventh IEEE International Conference on E-Commerce Technology (CEC'05), pp.431-434, 2005. ,
DOI : 10.1109/ICECT.2005.68
Society for worldwide interbank financial telecommunication, p.125, 1977. ,
Decisive Heuristics to Differentiate Legitimate from Phishing Sites, 2011 Conference on Network and Information Systems Security, pp.1-9, 2011. ,
DOI : 10.1109/SAR-SSI.2011.5931389
URL : https://hal.archives-ouvertes.fr/hal-01304087
une transaction électronique sécurisée Source : [1] ,
Source : [1], p.11 ,