[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated (c6639f8 -> cd31c69)
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated (c6639f8 -> cd31c69) |
Date: |
Wed, 03 Jun 2020 17:55:35 +0200 |
This is an automated email from the git hooks/post-receive script.
dennis-neufeld pushed a change to branch master
in repository anastasis.
from c6639f8 fixed some images ack draft
new 0d57648 modified related work
new 9d85d00 merge
new cd31c69 merge
The 3 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "add" were already present in the repository and have only
been added to this reference.
Summary of changes:
.gitignore | 6 +
doc/thesis/bibliothek.bib | 14 +-
doc/thesis/related_work.tex | 27 +-
doc/thesis/thesis.bbl | 1080 +++++++++++++++++++++++++++++++++++++++++
doc/thesis/thesis.blg | 19 +
doc/thesis/thesis.lof | 15 +
doc/thesis/thesis.lot | 3 +
NEWS => doc/thesis/thesis.out | 0
doc/thesis/thesis.synctex.gz | Bin 0 -> 355649 bytes
9 files changed, 1153 insertions(+), 11 deletions(-)
create mode 100644 doc/thesis/thesis.bbl
create mode 100644 doc/thesis/thesis.blg
create mode 100644 doc/thesis/thesis.lof
create mode 100644 doc/thesis/thesis.lot
copy NEWS => doc/thesis/thesis.out (100%)
create mode 100644 doc/thesis/thesis.synctex.gz
diff --git a/.gitignore b/.gitignore
index 0364a3f..94ea221 100644
--- a/.gitignore
+++ b/.gitignore
@@ -100,3 +100,9 @@ src/cli/.libs/
src/cli/.libs/anastasis-assembler
src/cli/.libs/anastasis-splitter
+doc/thesis/*.aux
+doc/thesis/*.bcf
+doc/thesis/*.log
+doc/thesis/*.run.xml
+doc/thesis/*.toc
+doc/thesis/*.pdf
\ No newline at end of file
diff --git a/doc/thesis/bibliothek.bib b/doc/thesis/bibliothek.bib
index 4edca42..b06dcd7 100644
--- a/doc/thesis/bibliothek.bib
+++ b/doc/thesis/bibliothek.bib
@@ -295,5 +295,17 @@
year={2004},
publisher={IEEE}
}
-
+@inproceedings{MBSS2013,
+ title={SMS-based one-time passwords: attacks and defense},
+ author={Mulliner, Collin and Borgaonkar, Ravishankar and Stewin, Patrick and
Seifert, Jean-Pierre},
+ booktitle={International Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment},
+ pages={150--159},
+ year={2013},
+ organization={Springer}
+}
+@article{pohlmann2017,
+ title={Wenn der Softbot menschliche Identit{\"a}t best{\"a}tigt.
Videoident-Verfahren II: Die Technik},
+ author={Pohlmann, Norbert and Frintrop, Jan-Hendrik and Widdermann, Rick and
Ziegler, Tim},
+ year={2017}
+}
diff --git a/doc/thesis/related_work.tex b/doc/thesis/related_work.tex
index 86fbf2d..668de6a 100644
--- a/doc/thesis/related_work.tex
+++ b/doc/thesis/related_work.tex
@@ -76,7 +76,7 @@ The security of MIDATA as described in "Patient empowerment
in IoT for eHealth -
\subsection{Authentication}
-To build a secure authentication procedure, today multi-factor authentication
is the standard \cite{multifactor_authentication}. A single authentication
method by itself is usually highly vulnerable. But multi-factor authentication
combines multiple authentication procedures to enhance the security of the
system. \\
+To build a secure authentication procedure, today multi-factor authentication
is the standard \cite{multifactor_authentication}. A single authentication
method by itself is usually vulnerable. But multi-factor authentication
combines multiple authentication procedures to enhance the security of the
system. \\
Anastasis is designed to use a wide range of authentication methods to
authenticate its users. Even though the user in Anastasis is free to specify
only one authentication method, we strongly recommend the use of multi-factor
authentication. A short overview of the possible methods is presented here.
\subsubsection{Password authentication}
@@ -94,24 +94,31 @@ There are several ways to implement authentication via a
secure question:
The first option is the easiest one. But predefining the answers has the
disadvantage being very impersonal and inflexible. The questions must
inevitably be very general, which allows an attacker to answer the questions
without even having to guess. Therefore the first option is not applicable.\\
The second option is more applicable but has some drawbacks, too. For example
there may be questions whose answers have multiple syntactic representations
(for example, "St." versus "Street") \cite{just2004}. Another problem could be
a question whose answer may change over time. Asking for the favourite actor
for example could be problematic. In addition, there is a challenge to define
questions for all kind of people. Some people for example could not answer to
the question, what the na [...]
In case of the third option we also have the problematic of the second one.
Furthermore there is the difficulty for the user to ask creative questions. A
good question should only be answerable by the user. Also, it would be perfect
to have the attacker on the wrong track by using ambiguities he doesn't know.\\
-FIXME: privacy concerns (personal answers must be stored)
-
+Authentication using a secure question needs personal information stored at
the server which is critical in terms of privacy. That is why Anastasis doesn't
store the answers of secure questions in clear text. Instead, we only store the
hash value of an answer. Thus the user only has to provide the hash value of
the answer and does not have to disclose any personal information.
\subsubsection{SMS authentication}
-Another way to authenticate is SMS authentication. The most popular use case
is the mobile TAN used to authorize online banking transactions. But SMS is no
longer considered secure. The SMS authentication relies on the security of the
mobile network, which has different possible attacks \cite{rieck_detection}.
There are also specialized mobile Trojans which are used to eavesdrop these
messages directly on the mobile device.\\
+Another way to authenticate is SMS authentication. The most popular use case
is the so called Mobile TAN used to authorize online banking transactions. A
Mobile TAN is an SMS based One-Time Password (OTP), short SMS OTP. SMS OTPs
"were introduced to counter phishing and other attacks against authentication
and authorization of Internet services" \cite{MBSS2013}. But SMS is no longer
considered secure. The SMS authentication relies on the security of the mobile
network, which has differe [...]
When it comes to privacy, storing a phone number is a problem. But the service
authenticating the user needs the phone number enabling it to send a message to
the user during authentication process.\\
In Anastasis we also need to store the phone number to the server. But in our
case the phone number is encrypted with a secret key only the user owns. The
server only gets this secret key during an authentication process. Thus
stealing the database of the server does not reveal the phone number to the
attacker.
-FIXME
-Instead of using SMS one can also use other forms of messages such as email or
physical mail. They all face the threat of interception. FIXME
+\subsubsection{E-mail authentication}
+Authentication by e-mail is very similar to SMS authentication. Here, the user
receives an OTP by e-mail and has to provide it during authentication process.\\
+
+FIXME: drawbacks,vulnerability\\
+In Anastasis the mail address of the user is stored in an encrypted way, too.
The user has to provide the corresponding key to the server during
authentication process.
-\subsubsection{Mail authentication}
-\subsubsection{Videoindent}
+\subsubsection{VideoIdent}
+VideoIdent uses a video chat to verify the identity of a user. The user needs
to show his face using a camera to an employee of the VideoIdent-service who
verifies the correct user by a picture of the user \cite{pohlmann2017}.\\
+Prerequisites for error-free identification are a video camera with good video
quality and a high-resolution image of the user on which the face can be seen
very clearly. The user should also not change his outward appearance too much
over time. A thick beard could also lead to the VideoIdent-service employee not
being able to recognise the user correctly.\\
+For an attacker who looks very similar to the user, there is a high chance
that the employee incorrectly confirms the identification. Therefor some
interaction of the user is needed like for example telling the employee a short
code which has been sent right before to the user by mail.\\
+In Anastasis the picture of the user is stored in an encrypted way. During
authentication process the user has to provide the correct key for decryption
to the server which provides the picture to the VideoIdent-service.
-\subsubsection{Postident}
+\subsubsection{PostIdent}
+It is also possible to sent a verification code to the user by physical mail.
Of course this authentication method takes some time and there is the
possibility the physical mail gets intercepted or lost during transmission.\\
+Anastasis does not store the address of the user in clear text. Instead the
address is encrypted before storing and the server gets to know the address
only during authentication process of the user.
\subsubsection{Biometric authentication}
-Another way of authenticating is the biometric approach \cite{biometric_auth}.
Biometric authentication is based on "something you are", like your iris or
your fingerprint. There are also threats against biometric authentication.
There are documented attacks against fingerprint and iris scan authentication.
For example, a member of the German CCC e.V. was able to generate replicas from
Angela Merkel's iris and Ursula von der Leyen's fingerprint \cite{ccc_merkel}.
+Another way of authenticating is the biometric approach \cite{biometric_auth}.
Biometric authentication is based on "something you are", like your iris or
your fingerprint. There are also threats against biometric authentication.
There are documented attacks against fingerprint and iris scan authentication.
For example, a member of the German CCC e.V. was able to generate replicas from
Angela Merkel's iris and Ursula von der Leyen's fingerprint \cite{ccc_merkel}.
diff --git a/doc/thesis/thesis.bbl b/doc/thesis/thesis.bbl
new file mode 100644
index 0000000..2f233c0
--- /dev/null
+++ b/doc/thesis/thesis.bbl
@@ -0,0 +1,1080 @@
+% $ biblatex auxiliary file $
+% $ biblatex bbl format version 3.1 $
+% Do not modify the above lines!
+%
+% This is an auxiliary file used by the 'biblatex' package.
+% This file may safely be deleted. It will be recreated by
+% biber as required.
+%
+\begingroup
+\makeatletter
+\@ifundefined{ver@biblatex.sty}
+ {\@latex@error
+ {Missing 'biblatex' package}
+ {The bibliography requires the 'biblatex' package.}
+ \aftergroup\endinput}
+ {}
+\endgroup
+
+
+\refsection{0}
+ \datalist[entry]{none/global//global/global}
+ \entry{vadhan2012}{article}{}
+ \true{moreauthor}
+ \true{morelabelname}
+ \name{author}{1}{}{%
+ {{hash=4a7848d2e829c08c64fd0693e3389940}{%
+ family={Vadhan},
+ familyi={V\bibinitperiod},
+ given={Salil\bibnamedelima P},
+ giveni={S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Now Publishers, Inc.}%
+ }
+ \strng{namehash}{abb7f98446293f740b141f01ff61554d}
+ \strng{fullhash}{abb7f98446293f740b141f01ff61554d}
+ \strng{bibnamehash}{abb7f98446293f740b141f01ff61554d}
+ \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
+ \strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
+ \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer
Science}
+ \field{number}{1--3}
+ \field{title}{Pseudorandomness}
+ \field{volume}{7}
+ \field{year}{2012}
+ \field{pages}{1\bibrangedash 336}
+ \range{pages}{336}
+ \endentry
+ \entry{nielsen2002}{inproceedings}{}
+ \name{author}{1}{}{%
+ {{hash=6535189281ff6a1012638e384823f5cf}{%
+ family={Nielsen},
+ familyi={N\bibinitperiod},
+ given={Jesper\bibnamedelima Buus},
+ giveni={J\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{6535189281ff6a1012638e384823f5cf}
+ \strng{fullhash}{6535189281ff6a1012638e384823f5cf}
+ \strng{bibnamehash}{6535189281ff6a1012638e384823f5cf}
+ \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
+ \strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
+ \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{Annual International Cryptology Conference}
+ \field{title}{A threshold pseudorandom function construction and its
applications}
+ \field{year}{2002}
+ \field{pages}{401\bibrangedash 416}
+ \range{pages}{16}
+ \endentry
+ \entry{GGM1986}{article}{}
+ \name{author}{3}{}{%
+ {{hash=66aba379c7d3adb8af5b662a65c4c140}{%
+ family={Goldreich},
+ familyi={G\bibinitperiod},
+ given={Oded},
+ giveni={O\bibinitperiod}}}%
+ {{hash=39e4a0690915f1d991133196a545b37b}{%
+ family={Goldwasser},
+ familyi={G\bibinitperiod},
+ given={Shafi},
+ giveni={S\bibinitperiod}}}%
+ {{hash=fb54c363f1b0d126e883c84df49e4790}{%
+ family={Micali},
+ familyi={M\bibinitperiod},
+ given={Silvio},
+ giveni={S\bibinitperiod}}}%
+ }
+ \list{location}{1}{%
+ {New York, NY, USA}%
+ }
+ \list{publisher}{1}{%
+ {Association for Computing Machinery}%
+ }
+ \strng{namehash}{39e304099b960365cdb56b83f4c70df6}
+ \strng{fullhash}{39e304099b960365cdb56b83f4c70df6}
+ \strng{bibnamehash}{39e304099b960365cdb56b83f4c70df6}
+ \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
+ \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
+ \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{issn}{0004-5411}
+ \field{journaltitle}{J. ACM}
+ \field{month}{8}
+ \field{number}{4}
+ \field{title}{How to Construct Random Functions}
+ \field{volume}{33}
+ \field{year}{1986}
+ \field{pages}{792\bibrangedash 807}
+ \range{pages}{16}
+ \verb{doi}
+ \verb 10.1145/6490.6503
+ \endverb
+ \verb{urlraw}
+ \verb https://doi.org/10.1145/6490.6503
+ \endverb
+ \verb{url}
+ \verb https://doi.org/10.1145/6490.6503
+ \endverb
+ \endentry
+ \entry{Preneel1999}{inbook}{}
+ \name{author}{1}{}{%
+ {{hash=0b9d4896fca22178c881b5236f351e05}{%
+ family={Preneel},
+ familyi={P\bibinitperiod},
+ given={Bart},
+ giveni={B\bibinitperiod}}}%
+ }
+ \name{editor}{1}{}{%
+ {{hash=14f9bdb855aa40873ff3dce506ed6fff}{%
+ family={Damg{å}rd},
+ familyi={D\bibinitperiod},
+ given={Ivan\bibnamedelima Bjerre},
+ giveni={I\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+ }
+ \list{location}{1}{%
+ {Berlin, Heidelberg}%
+ }
+ \list{publisher}{1}{%
+ {Springer Berlin Heidelberg}%
+ }
+ \strng{namehash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{fullhash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{bibnamehash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{authorbibnamehash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{authornamehash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{authorfullhash}{0b9d4896fca22178c881b5236f351e05}
+ \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
+ \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
+ \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
+ \field{sortinit}{5}
+ \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{abstract}{This paper describes the state of the art for
cryptographic hash functions. Different definitions are compared, and the few
theoretical results on hash functions are discussed. A brief overview is
presented of the most important constructions, and some open problems are
presented.}
+ \field{booktitle}{Lectures on Data Security: Modern Cryptology in Theory
and Practice}
+ \field{isbn}{978-3-540-48969-6}
+ \field{title}{The State of Cryptographic Hash Functions}
+ \field{year}{1999}
+ \field{pages}{158}
+ \range{pages}{1}
+ \verb{doi}
+ \verb 10.1007/3-540-48969-X_8
+ \endverb
+ \verb{urlraw}
+ \verb https://doi.org/10.1007/3-540-48969-X_8
+ \endverb
+ \verb{url}
+ \verb https://doi.org/10.1007/3-540-48969-X_8
+ \endverb
+ \endentry
+ \entry{SG2012}{article}{}
+ \name{author}{2}{}{%
+ {{hash=831a194fddb2f27c4e2c482b1f72f48a}{%
+ family={Sobti},
+ familyi={S\bibinitperiod},
+ given={Rajeev},
+ giveni={R\bibinitperiod}}}%
+ {{hash=c244900d83a048c38628604327a28052}{%
+ family={Geetha},
+ familyi={G\bibinitperiod},
+ given={G},
+ giveni={G\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {International Journal of Computer Science Issues (IJCSI)}%
+ }
+ \strng{namehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \strng{fullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \strng{bibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
+ \field{sortinit}{6}
+ \field{sortinithash}{7851c86048328b027313775d8fbd2131}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{International Journal of Computer Science Issues
(IJCSI)}
+ \field{number}{2}
+ \field{title}{Cryptographic hash functions: a review}
+ \field{volume}{9}
+ \field{year}{2012}
+ \field{pages}{462}
+ \range{pages}{1}
+ \endentry
+ \entry{RK2011}{article}{}
+ \name{author}{2}{}{%
+ {{hash=8f939579bcf2d180bae9f53387cab62b}{%
+ family={Ramanujam},
+ familyi={R\bibinitperiod},
+ given={Sriram},
+ giveni={S\bibinitperiod}}}%
+ {{hash=81584ababc9dfe487baae50ab6f0ca8a}{%
+ family={Karuppiah},
+ familyi={K\bibinitperiod},
+ given={Marimuthu},
+ giveni={M\bibinitperiod}}}%
+ }
+ \strng{namehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \strng{fullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \strng{bibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+ \field{sortinit}{9}
+ \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{IJCSNS International Journal of Computer Science
and Network Security}
+ \field{number}{1}
+ \field{title}{Designing an algorithm with high Avalanche Effect}
+ \field{volume}{11}
+ \field{year}{2011}
+ \field{pages}{106\bibrangedash 111}
+ \range{pages}{6}
+ \endentry
+ \entry{GJW2011}{inproceedings}{}
+ \name{author}{3}{}{%
+ {{hash=74ca2f05d1125811a4211361255b1cf2}{%
+ family={Gueron},
+ familyi={G\bibinitperiod},
+ given={Shay},
+ giveni={S\bibinitperiod}}}%
+ {{hash=38e00ab25a60509b785c20ef8caa89b9}{%
+ family={Johnson},
+ familyi={J\bibinitperiod},
+ given={Simon},
+ giveni={S\bibinitperiod}}}%
+ {{hash=20a47eef2fa55e0486b02a0e2a0b8d0c}{%
+ family={Walker},
+ familyi={W\bibinitperiod},
+ given={Jesse},
+ giveni={J\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {IEEE}%
+ }
+ \strng{namehash}{4b253103893adba3aada17995ac73ec0}
+ \strng{fullhash}{4b253103893adba3aada17995ac73ec0}
+ \strng{bibnamehash}{4b253103893adba3aada17995ac73ec0}
+ \strng{authorbibnamehash}{4b253103893adba3aada17995ac73ec0}
+ \strng{authornamehash}{4b253103893adba3aada17995ac73ec0}
+ \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{2011 Eighth International Conference on Information
Technology: New Generations}
+ \field{title}{SHA-512/256}
+ \field{year}{2011}
+ \field{pages}{354\bibrangedash 358}
+ \range{pages}{5}
+ \endentry
+ \entry{BCK1996}{article}{}
+ \name{author}{3}{}{%
+ {{hash=06e2bb2f83d8b669b46db64431509301}{%
+ family={Bellare},
+ familyi={B\bibinitperiod},
+ given={Mihir},
+ giveni={M\bibinitperiod}}}%
+ {{hash=7faf0f3900af6c70795ea089d283f02e}{%
+ family={Canetti},
+ familyi={C\bibinitperiod},
+ given={Ran},
+ giveni={R\bibinitperiod}}}%
+ {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
+ family={Krawczyk},
+ familyi={K\bibinitperiod},
+ given={Hugo},
+ giveni={H\bibinitperiod}}}%
+ }
+ \strng{namehash}{2527ef0685da3bdb01959cd066adc238}
+ \strng{fullhash}{2527ef0685da3bdb01959cd066adc238}
+ \strng{bibnamehash}{2527ef0685da3bdb01959cd066adc238}
+ \strng{authorbibnamehash}{2527ef0685da3bdb01959cd066adc238}
+ \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238}
+ \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{RSA Laboratories’ CryptoBytes}
+ \field{number}{1}
+ \field{title}{Message authentication using hash functions: The HMAC
construction}
+ \field{volume}{2}
+ \field{year}{1996}
+ \field{pages}{12\bibrangedash 15}
+ \range{pages}{4}
+ \endentry
+ \entry{krawczyk2010}{inproceedings}{}
+ \name{author}{1}{}{%
+ {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
+ family={Krawczyk},
+ familyi={K\bibinitperiod},
+ given={Hugo},
+ giveni={H\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{088445b3855bedf4bcc9d25651eb98b2}
+ \strng{fullhash}{088445b3855bedf4bcc9d25651eb98b2}
+ \strng{bibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
+ \strng{authorbibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
+ \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2}
+ \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{Annual Cryptology Conference}
+ \field{title}{Cryptographic extraction and key derivation: The HKDF
scheme}
+ \field{year}{2010}
+ \field{pages}{631\bibrangedash 648}
+ \range{pages}{18}
+ \endentry
+ \entry{trimberger2012}{book}{}
+ \name{author}{1}{}{%
+ {{hash=0afd18d7b25d23c61db1fe942ec1c236}{%
+ family={Trimberger},
+ familyi={T\bibinitperiod},
+ given={Stephen\bibnamedelima M},
+ giveni={S\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Springer Science \& Business Media}%
+ }
+ \strng{namehash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \strng{fullhash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \strng{bibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Field-programmable gate array technology}
+ \field{year}{2012}
+ \endentry
+ \entry{madurawe2006}{misc}{}
+ \name{author}{1}{}{%
+ {{hash=093f14ec763e8df6227fd18ac8958011}{%
+ family={Madurawe},
+ familyi={M\bibinitperiod},
+ given={Raminda\bibnamedelima Udaya},
+ giveni={R\bibinitperiod\bibinitdelim U\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Google Patents}%
+ }
+ \strng{namehash}{093f14ec763e8df6227fd18ac8958011}
+ \strng{fullhash}{093f14ec763e8df6227fd18ac8958011}
+ \strng{bibnamehash}{093f14ec763e8df6227fd18ac8958011}
+ \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
+ \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
+ \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{month}{6}
+ \field{note}{US Patent 7,064,579}
+ \field{title}{Alterable application specific integrated circuit (ASIC)}
+ \field{year}{2006}
+ \endentry
+ \entry{BDK2016}{inproceedings}{}
+ \name{author}{3}{}{%
+ {{hash=6b9702c0a225b2966f2e07631bcfe935}{%
+ family={Biryukov},
+ familyi={B\bibinitperiod},
+ given={Alex},
+ giveni={A\bibinitperiod}}}%
+ {{hash=bf937d804c107f19fafa536592af6563}{%
+ family={Dinu},
+ familyi={D\bibinitperiod},
+ given={Daniel},
+ giveni={D\bibinitperiod}}}%
+ {{hash=d38e18b5ec4018e5f12aab4287c4a08f}{%
+ family={Khovratovich},
+ familyi={K\bibinitperiod},
+ given={Dmitry},
+ giveni={D\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {IEEE}%
+ }
+ \strng{namehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \strng{fullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \strng{bibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{2016 IEEE European Symposium on Security and Privacy
(EuroS\&P)}
+ \field{title}{Argon2: new generation of memory-hard functions for
password hashing and other applications}
+ \field{year}{2016}
+ \field{pages}{292\bibrangedash 302}
+ \range{pages}{11}
+ \endentry
+ \entry{stamp2003}{article}{}
+ \name{author}{1}{}{%
+ {{hash=799c6648cb97b6ffb4e9da11a6e277ac}{%
+ family={Stamp},
+ familyi={S\bibinitperiod},
+ given={Mark},
+ giveni={M\bibinitperiod}}}%
+ }
+ \strng{namehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \strng{fullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \strng{bibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{San Jose State University, Department of Computer
Science}
+ \field{title}{Once upon a time-memory tradeoff}
+ \field{year}{2003}
+ \endentry
+ \entry{shamir_sharing}{article}{}
+ \name{author}{1}{}{%
+ {{hash=71b77dd8ab33fe646ef25cded49e9881}{%
+ family={Shamir},
+ familyi={S\bibinitperiod},
+ given={Adi},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {ACm New York, NY, USA}%
+ }
+ \strng{namehash}{71b77dd8ab33fe646ef25cded49e9881}
+ \strng{fullhash}{71b77dd8ab33fe646ef25cded49e9881}
+ \strng{bibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
+ \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
+ \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
+ \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Communications of the ACM}
+ \field{number}{11}
+ \field{title}{How to share a secret}
+ \field{volume}{22}
+ \field{year}{1979}
+ \field{pages}{612\bibrangedash 613}
+ \range{pages}{2}
+ \endentry
+ \entry{pedersen_sharing_0}{inproceedings}{}
+ \name{author}{1}{}{%
+ {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
+ family={Pedersen},
+ familyi={P\bibinitperiod},
+ given={Torben\bibnamedelima Pryds},
+ giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \field{extraname}{1}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{Annual international cryptology conference}
+ \field{chapter}{0}
+ \field{title}{Non-interactive and information-theoretic secure
verifiable secret sharing}
+ \field{year}{1991}
+ \field{pages}{129\bibrangedash 140}
+ \range{pages}{12}
+ \endentry
+ \entry{feldman_sharing}{inproceedings}{}
+ \name{author}{1}{}{%
+ {{hash=618e5892290641345f357d52e5ef3c12}{%
+ family={Feldman},
+ familyi={F\bibinitperiod},
+ given={Paul},
+ giveni={P\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {IEEE}%
+ }
+ \strng{namehash}{618e5892290641345f357d52e5ef3c12}
+ \strng{fullhash}{618e5892290641345f357d52e5ef3c12}
+ \strng{bibnamehash}{618e5892290641345f357d52e5ef3c12}
+ \strng{authorbibnamehash}{618e5892290641345f357d52e5ef3c12}
+ \strng{authornamehash}{618e5892290641345f357d52e5ef3c12}
+ \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{28th Annual Symposium on Foundations of Computer
Science (sfcs 1987)}
+ \field{title}{A practical scheme for non-interactive verifiable secret
sharing}
+ \field{year}{1987}
+ \field{pages}{427\bibrangedash 438}
+ \range{pages}{12}
+ \endentry
+ \entry{pedersen_sharing_5.2}{inproceedings}{}
+ \name{author}{1}{}{%
+ {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
+ family={Pedersen},
+ familyi={P\bibinitperiod},
+ given={Torben\bibnamedelima Pryds},
+ giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+ \field{extraname}{2}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{Annual international cryptology conference}
+ \field{chapter}{5.2}
+ \field{title}{Non-interactive and information-theoretic secure
verifiable secret sharing}
+ \field{year}{1991}
+ \field{pages}{129\bibrangedash 140}
+ \range{pages}{12}
+ \endentry
+ \entry{midata}{book}{}
+ \name{author}{2}{}{%
+ {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
+ family={Parag\bibnamedelima Chatterjee},
+ familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
+ given={Emmanuel\bibnamedelima Benoist},
+ giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+ {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
+ family={Nath},
+ familyi={N\bibinitperiod},
+ given={Asoke},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {IGI Global}%
+ }
+ \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Applied Approach to Privacy and Security for the Internet
of Things}
+ \field{year}{in print}
+ \endentry
+ \entry{multifactor_authentication}{article}{}
+ \name{author}{6}{}{%
+ {{hash=349f11e1663912dcb58a979614214591}{%
+ family={Ometov},
+ familyi={O\bibinitperiod},
+ given={Aleksandr},
+ giveni={A\bibinitperiod}}}%
+ {{hash=2210a791565f0e229e45ee4adddbe39a}{%
+ family={Bezzateev},
+ familyi={B\bibinitperiod},
+ given={Sergey},
+ giveni={S\bibinitperiod}}}%
+ {{hash=515fcf6ab2738bfda2f35fc8a7aabbad}{%
+ family={Makitalo},
+ familyi={M\bibinitperiod},
+ given={Niko},
+ giveni={N\bibinitperiod}}}%
+ {{hash=29e0c47c24b13223f7986b9dd3f37aeb}{%
+ family={Andreev},
+ familyi={A\bibinitperiod},
+ given={Sergey},
+ giveni={S\bibinitperiod}}}%
+ {{hash=5d7740b6e2ec0fb41f72f451e980670b}{%
+ family={Mikkonen},
+ familyi={M\bibinitperiod},
+ given={Tommi},
+ giveni={T\bibinitperiod}}}%
+ {{hash=1b1c95790f3403d472ac8a4befa0eb49}{%
+ family={Koucheryavy},
+ familyi={K\bibinitperiod},
+ given={Yevgeni},
+ giveni={Y\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Multidisciplinary Digital Publishing Institute}%
+ }
+ \strng{namehash}{45cd1a76e0cdd8946f91bead3b664768}
+ \strng{fullhash}{c1db872bc8ef36ee51e0526f23769166}
+ \strng{bibnamehash}{c1db872bc8ef36ee51e0526f23769166}
+ \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
+ \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
+ \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Cryptography}
+ \field{number}{1}
+ \field{title}{Multi-factor authentication: A survey}
+ \field{volume}{2}
+ \field{year}{2018}
+ \field{pages}{1}
+ \range{pages}{1}
+ \endentry
+ \entry{authentication_methods_review}{article}{}
+ \name{author}{4}{}{%
+ {{hash=7320eb44b90aead6870ac2fab7d71076}{%
+ family={Syed\bibnamedelima Idrus},
+ familyi={S\bibinitperiod\bibinitdelim I\bibinitperiod},
+ given={Syed\bibnamedelima Zulkarnain},
+ giveni={S\bibinitperiod\bibinitdelim Z\bibinitperiod}}}%
+ {{hash=a09a932af5f7cd55229eaae3115944ad}{%
+ family={Cherrier},
+ familyi={C\bibinitperiod},
+ given={Estelle},
+ giveni={E\bibinitperiod}}}%
+ {{hash=b91ea03eff7b52d366d5afa7847a6284}{%
+ family={Rosenberger},
+ familyi={R\bibinitperiod},
+ given={Christophe},
+ giveni={C\bibinitperiod}}}%
+ {{hash=315979ea9ce5ac9865a4cf0dae673cd0}{%
+ family={Schwartzmann},
+ familyi={S\bibinitperiod},
+ given={Jean-Jacques},
+ giveni={J\bibinithyphendelim J\bibinitperiod}}}%
+ }
+ \strng{namehash}{ce7e837cc1dbca8dddef9896de46176c}
+ \strng{fullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+ \strng{bibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+ \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+ \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
+ \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Australian Journal of Basic and Applied Sciences}
+ \field{number}{5}
+ \field{title}{A Review on Authentication Methods}
+ \field{volume}{7}
+ \field{year}{2013}
+ \field{pages}{95\bibrangedash 107}
+ \range{pages}{13}
+ \verb{urlraw}
+ \verb https://hal.archives-ouvertes.fr/hal-00912435
+ \endverb
+ \verb{url}
+ \verb https://hal.archives-ouvertes.fr/hal-00912435
+ \endverb
+ \endentry
+ \entry{just2004}{article}{}
+ \name{author}{1}{}{%
+ {{hash=daa648a2c605762c09bfaab94d0f2168}{%
+ family={Just},
+ familyi={J\bibinitperiod},
+ given={Mike},
+ giveni={M\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {IEEE}%
+ }
+ \strng{namehash}{daa648a2c605762c09bfaab94d0f2168}
+ \strng{fullhash}{daa648a2c605762c09bfaab94d0f2168}
+ \strng{bibnamehash}{daa648a2c605762c09bfaab94d0f2168}
+ \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
+ \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
+ \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{IEEE Security \& Privacy}
+ \field{number}{5}
+ \field{title}{Designing and evaluating challenge-question systems}
+ \field{volume}{2}
+ \field{year}{2004}
+ \field{pages}{32\bibrangedash 39}
+ \range{pages}{8}
+ \endentry
+ \entry{MBSS2013}{inproceedings}{}
+ \name{author}{4}{}{%
+ {{hash=0c05d559d041112c87e63b05c5a7262b}{%
+ family={Mulliner},
+ familyi={M\bibinitperiod},
+ given={Collin},
+ giveni={C\bibinitperiod}}}%
+ {{hash=4e0292e00a4787b4db10b2dff39f4a1f}{%
+ family={Borgaonkar},
+ familyi={B\bibinitperiod},
+ given={Ravishankar},
+ giveni={R\bibinitperiod}}}%
+ {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
+ family={Stewin},
+ familyi={S\bibinitperiod},
+ given={Patrick},
+ giveni={P\bibinitperiod}}}%
+ {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
+ family={Seifert},
+ familyi={S\bibinitperiod},
+ given={Jean-Pierre},
+ giveni={J\bibinithyphendelim P\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{adce78e3f1e04476f35b2b5fcb6c6262}
+ \strng{fullhash}{85e8ef541ae3f71805b7382856006c85}
+ \strng{bibnamehash}{85e8ef541ae3f71805b7382856006c85}
+ \strng{authorbibnamehash}{85e8ef541ae3f71805b7382856006c85}
+ \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262}
+ \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{International Conference on Detection of Intrusions
and Malware, and Vulnerability Assessment}
+ \field{title}{SMS-based one-time passwords: attacks and defense}
+ \field{year}{2013}
+ \field{pages}{150\bibrangedash 159}
+ \range{pages}{10}
+ \endentry
+ \entry{rieck_detection}{book}{}
+ \name{author}{3}{}{%
+ {{hash=47449209bde605e33642aeb4dcc23bf2}{%
+ family={Rieck},
+ familyi={R\bibinitperiod},
+ given={Konrad},
+ giveni={K\bibinitperiod}}}%
+ {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
+ family={Stewin},
+ familyi={S\bibinitperiod},
+ given={Patrick},
+ giveni={P\bibinitperiod}}}%
+ {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
+ family={Seifert},
+ familyi={S\bibinitperiod},
+ given={Jean-Pierre},
+ giveni={J\bibinithyphendelim P\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Springer}%
+ }
+ \strng{namehash}{5646590031d49807385b96f9f6caae4a}
+ \strng{fullhash}{5646590031d49807385b96f9f6caae4a}
+ \strng{bibnamehash}{5646590031d49807385b96f9f6caae4a}
+ \strng{authorbibnamehash}{5646590031d49807385b96f9f6caae4a}
+ \strng{authornamehash}{5646590031d49807385b96f9f6caae4a}
+ \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Detection of Intrusions and Malware, and Vulnerability
Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July
18-19, 2013. Proceedings}
+ \field{volume}{7967}
+ \field{year}{2013}
+ \endentry
+ \entry{pohlmann2017}{article}{}
+ \name{author}{4}{}{%
+ {{hash=613966f471ac9240f4bfce66e6e27b3e}{%
+ family={Pohlmann},
+ familyi={P\bibinitperiod},
+ given={Norbert},
+ giveni={N\bibinitperiod}}}%
+ {{hash=6462a03ff4a69f0c01462ca9dfd9c2ac}{%
+ family={Frintrop},
+ familyi={F\bibinitperiod},
+ given={Jan-Hendrik},
+ giveni={J\bibinithyphendelim H\bibinitperiod}}}%
+ {{hash=247317f34ce75f08f273ab47d30a4e91}{%
+ family={Widdermann},
+ familyi={W\bibinitperiod},
+ given={Rick},
+ giveni={R\bibinitperiod}}}%
+ {{hash=197d288c2557c4675696cefb75461cf0}{%
+ family={Ziegler},
+ familyi={Z\bibinitperiod},
+ given={Tim},
+ giveni={T\bibinitperiod}}}%
+ }
+ \strng{namehash}{46fedf156ec86b72f1439a7e282b9fee}
+ \strng{fullhash}{7c1027a04280b6542245beeb85db1408}
+ \strng{bibnamehash}{7c1027a04280b6542245beeb85db1408}
+ \strng{authorbibnamehash}{7c1027a04280b6542245beeb85db1408}
+ \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee}
+ \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Wenn der Softbot menschliche Identit{ä}t best{ä}tigt.
Videoident-Verfahren II: Die Technik}
+ \field{year}{2017}
+ \endentry
+ \entry{biometric_auth}{article}{}
+ \name{author}{2}{}{%
+ {{hash=019f89587e0c1e896a94bec0898d3964}{%
+ family={Pagnin},
+ familyi={P\bibinitperiod},
+ given={Elena},
+ giveni={E\bibinitperiod}}}%
+ {{hash=3a3c8efa3b514b0608c70f90d96e7fec}{%
+ family={Mitrokotsa},
+ familyi={M\bibinitperiod},
+ given={Aikaterini},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {Hindawi}%
+ }
+ \strng{namehash}{db53816ca2458e8344846c9aa5b3bce3}
+ \strng{fullhash}{db53816ca2458e8344846c9aa5b3bce3}
+ \strng{bibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
+ \strng{authorbibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
+ \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3}
+ \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Security and Communication Networks}
+ \field{title}{Privacy-preserving biometric authentication: challenges
and directions}
+ \field{volume}{2017}
+ \field{year}{2017}
+ \endentry
+ \entry{ccc_merkel}{online}{}
+ \name{author}{1}{}{%
+ {{hash=b7a2e18f77259e34d5b676fd04412bb3}{%
+ family={Krempl},
+ familyi={K\bibinitperiod},
+ given={Stefan},
+ giveni={S\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {heise online}%
+ }
+ \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens
Fingerabdruck}
+ \field{urlday}{7}
+ \field{urlmonth}{3}
+ \field{urlyear}{2020}
+ \field{year}{2014}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
+ \endverb
+ \verb{url}
+ \verb
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
+ \endverb
+ \endentry
+ \entry{gnu_taler}{online}{}
+ \list{organization}{1}{%
+ {Taler Systems SA}%
+ }
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labeltitlesource}{title}
+ \field{title}{GNU Taler: Features}
+ \field{urlday}{2}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://taler.net/en/features.html
+ \endverb
+ \verb{url}
+ \verb https://taler.net/en/features.html
+ \endverb
+ \endentry
+ \entry{postgresql}{online}{}
+ \list{organization}{1}{%
+ {The PostgreSQL Global Development Group}%
+ }
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labeltitlesource}{title}
+ \field{title}{PostgreSQL: The World's Most Advanced Open Source
Relational Database}
+ \field{urlday}{2}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://www.postgresql.org/
+ \endverb
+ \verb{url}
+ \verb https://www.postgresql.org/
+ \endverb
+ \endentry
+ \entry{libcurl}{online}{}
+ \list{organization}{1}{%
+ {Curl}%
+ }
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labeltitlesource}{title}
+ \field{title}{libcurl - the multiprotocol file transfer library}
+ \field{urlday}{2}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://curl.haxx.se/libcurl/
+ \endverb
+ \verb{url}
+ \verb https://curl.haxx.se/libcurl/
+ \endverb
+ \endentry
+ \entry{libmicrohttpd}{online}{}
+ \list{organization}{1}{%
+ {GNU project}%
+ }
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labeltitlesource}{title}
+ \field{title}{GNU Libmicrohttpd}
+ \field{urlday}{2}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://www.gnu.org/software/libmicrohttpd/?
+ \endverb
+ \verb{url}
+ \verb https://www.gnu.org/software/libmicrohttpd/?
+ \endverb
+ \endentry
+ \entry{global_data_index}{online}{}
+ \list{organization}{1}{%
+ {Dell EMC.}%
+ }
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labeltitlesource}{title}
+ \field{title}{Global Data Protection Index 2018 – Key Findings}
+ \field{urlday}{7}
+ \field{urlmonth}{3}
+ \field{urlyear}{2020}
+ \field{year}{2018}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
+ \endverb
+ \verb{url}
+ \verb
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
+ \endverb
+ \endentry
+ \entry{millions_lost}{online}{}
+ \name{author}{1}{}{%
+ {{hash=3648296958ad2ea0461fac7a13e12981}{%
+ family={Cuthbertson},
+ familyi={C\bibinitperiod},
+ given={Anthony},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {INDEPENDENT}%
+ }
+ \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost'
after man dies with only password}
+ \field{urlday}{7}
+ \field{urlmonth}{3}
+ \field{urlyear}{2020}
+ \field{year}{2019}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+ \endverb
+ \verb{url}
+ \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+ \endverb
+ \endentry
+ \entry{forgot_my_pin}{online}{}
+ \name{author}{1}{}{%
+ {{hash=3690e6a925d190517dbba666878a6978}{%
+ family={Frauenfelder},
+ familyi={F\bibinitperiod},
+ given={Mark},
+ giveni={M\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {WIRED}%
+ }
+ \strng{namehash}{3690e6a925d190517dbba666878a6978}
+ \strng{fullhash}{3690e6a925d190517dbba666878a6978}
+ \strng{bibnamehash}{3690e6a925d190517dbba666878a6978}
+ \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
+ \strng{authornamehash}{3690e6a925d190517dbba666878a6978}
+ \strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in
Bitcoin}
+ \field{urlday}{7}
+ \field{urlmonth}{3}
+ \field{urlyear}{2020}
+ \field{year}{2017}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
+ \endverb
+ \verb{url}
+ \verb
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
+ \endverb
+ \endentry
+ \enddatalist
+\endrefsection
+\endinput
+
diff --git a/doc/thesis/thesis.blg b/doc/thesis/thesis.blg
new file mode 100644
index 0000000..d691ca6
--- /dev/null
+++ b/doc/thesis/thesis.blg
@@ -0,0 +1,19 @@
+[0] Config.pm:304> INFO - This is Biber 2.13
+[0] Config.pm:307> INFO - Logfile is 'thesis.blg'
+[23] biber:315> INFO - === Mi Jun 3, 2020, 14:34:23
+[36] Biber.pm:375> INFO - Reading 'thesis.bcf'
+[95] Biber.pm:905> INFO - Found 33 citekeys in bib section 0
+[108] Biber.pm:4196> INFO - Processing section 0
+[108] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
+[108] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to
bibliothek.bib
+[117] Biber.pm:4373> INFO - Looking for bibtex format file 'bibliothek.bib'
for section 0
+[119] bibtex.pm:1462> INFO - LaTeX decoding ...
+[157] bibtex.pm:1281> INFO - Found BibTeX data source 'bibliothek.bib'
+[238] Utils.pm:300> WARN - year field 'in print' in entry 'midata' is not an
integer - this will probably not sort properly.
+[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable =
shifted' with 'variable = non-ignorable'
+[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization
= NFD' with 'normalization = prenormalized'
+[311] Biber.pm:4024> INFO - Sorting list 'none/global//global/global' of type
'entry' with template 'none' and locale 'en-US'
+[311] Biber.pm:4030> INFO - No sort tailoring available for locale 'en-US'
+[329] bbl.pm:648> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
+[345] bbl.pm:751> INFO - Output to thesis.bbl
+[345] Biber.pm:110> INFO - WARNINGS: 1
diff --git a/doc/thesis/thesis.lof b/doc/thesis/thesis.lof
new file mode 100644
index 0000000..981edd3
--- /dev/null
+++ b/doc/thesis/thesis.lof
@@ -0,0 +1,15 @@
+\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse
{pagetracker}\boolfalse {backtracker}\relax
+\defcounter {refsection}{0}\relax
+\selectlanguage *{english}
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {1}{\ignorespaces System design
overview}}{15}{figure.1}%
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {2}{\ignorespaces Anastasis
database}}{17}{figure.2}%
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {3}{\ignorespaces Secret split
process}}{24}{figure.3}%
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {4}{\ignorespaces Secret split
process}}{25}{figure.4}%
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {5}{\ignorespaces Secret recovery
process}}{26}{figure.5}%
+\defcounter {refsection}{0}\relax
+\contentsline {figure}{\numberline {6}{\ignorespaces Business project
plan}}{37}{figure.6}%
diff --git a/doc/thesis/thesis.lot b/doc/thesis/thesis.lot
new file mode 100644
index 0000000..1a53ee5
--- /dev/null
+++ b/doc/thesis/thesis.lot
@@ -0,0 +1,3 @@
+\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse
{pagetracker}\boolfalse {backtracker}\relax
+\defcounter {refsection}{0}\relax
+\selectlanguage *{english}
diff --git a/NEWS b/doc/thesis/thesis.out
similarity index 100%
copy from NEWS
copy to doc/thesis/thesis.out
diff --git a/doc/thesis/thesis.synctex.gz b/doc/thesis/thesis.synctex.gz
new file mode 100644
index 0000000..6a57e81
Binary files /dev/null and b/doc/thesis/thesis.synctex.gz differ
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [taler-anastasis] branch master updated (c6639f8 -> cd31c69),
gnunet <=