gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] 03/03: merge


From: gnunet
Subject: [taler-anastasis] 03/03: merge
Date: Wed, 03 Jun 2020 17:55:38 +0200

This is an automated email from the git hooks/post-receive script.

dennis-neufeld pushed a commit to branch master
in repository anastasis.

commit cd31c6950185e38579fcddc2dbda7ddd8d9ddf57
Merge: 9d85d00 c6639f8
Author: Dennis Neufeld <dennis.neufeld@students.bfh.ch>
AuthorDate: Wed Jun 3 15:54:52 2020 +0000

    merge

 doc/ledger/Anastasis_Full_v4.pdf       |  Bin 0 -> 1592835 bytes
 doc/thesis/acknowledgments.tex         |    3 +
 doc/thesis/images/recovery_process.png |  Bin 37488 -> 49986 bytes
 doc/thesis/images/secret_split.png     |  Bin 49879 -> 62384 bytes
 doc/thesis/images/system_design.png    |  Bin 41561 -> 52261 bytes
 doc/thesis/implementation.tex          |   20 +-
 doc/thesis/thesis.aux                  |   75 ++
 doc/thesis/thesis.bbl                  | 1080 ++++++++++++++++
 doc/thesis/thesis.bcf                  | 2229 ++++++++++++++++++++++++++++++++
 doc/thesis/thesis.blg                  |   19 +
 doc/thesis/thesis.lof                  |   15 +
 doc/thesis/thesis.log                  | 1777 +++++++++++++++++++++++++
 doc/thesis/thesis.lot                  |    3 +
 doc/thesis/thesis.out                  |    0
 doc/thesis/thesis.run.xml              |   90 ++
 doc/thesis/thesis.synctex.gz           |  Bin 0 -> 355649 bytes
 16 files changed, 5307 insertions(+), 4 deletions(-)

diff --cc doc/thesis/thesis.bbl
index 0000000,0000000..2f233c0
new file mode 100644
--- /dev/null
+++ b/doc/thesis/thesis.bbl
@@@ -1,0 -1,0 +1,1080 @@@
++% $ biblatex auxiliary file $
++% $ biblatex bbl format version 3.1 $
++% Do not modify the above lines!
++%
++% This is an auxiliary file used by the 'biblatex' package.
++% This file may safely be deleted. It will be recreated by
++% biber as required.
++%
++\begingroup
++\makeatletter
++\@ifundefined{ver@biblatex.sty}
++  {\@latex@error
++     {Missing 'biblatex' package}
++     {The bibliography requires the 'biblatex' package.}
++      \aftergroup\endinput}
++  {}
++\endgroup
++
++
++\refsection{0}
++  \datalist[entry]{none/global//global/global}
++    \entry{vadhan2012}{article}{}
++      \true{moreauthor}
++      \true{morelabelname}
++      \name{author}{1}{}{%
++        {{hash=4a7848d2e829c08c64fd0693e3389940}{%
++           family={Vadhan},
++           familyi={V\bibinitperiod},
++           given={Salil\bibnamedelima P},
++           giveni={S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Now Publishers, Inc.}%
++      }
++      \strng{namehash}{abb7f98446293f740b141f01ff61554d}
++      \strng{fullhash}{abb7f98446293f740b141f01ff61554d}
++      \strng{bibnamehash}{abb7f98446293f740b141f01ff61554d}
++      \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
++      \strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
++      \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer 
Science}
++      \field{number}{1--3}
++      \field{title}{Pseudorandomness}
++      \field{volume}{7}
++      \field{year}{2012}
++      \field{pages}{1\bibrangedash 336}
++      \range{pages}{336}
++    \endentry
++    \entry{nielsen2002}{inproceedings}{}
++      \name{author}{1}{}{%
++        {{hash=6535189281ff6a1012638e384823f5cf}{%
++           family={Nielsen},
++           familyi={N\bibinitperiod},
++           given={Jesper\bibnamedelima Buus},
++           giveni={J\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{6535189281ff6a1012638e384823f5cf}
++      \strng{fullhash}{6535189281ff6a1012638e384823f5cf}
++      \strng{bibnamehash}{6535189281ff6a1012638e384823f5cf}
++      \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
++      \strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
++      \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{Annual International Cryptology Conference}
++      \field{title}{A threshold pseudorandom function construction and its 
applications}
++      \field{year}{2002}
++      \field{pages}{401\bibrangedash 416}
++      \range{pages}{16}
++    \endentry
++    \entry{GGM1986}{article}{}
++      \name{author}{3}{}{%
++        {{hash=66aba379c7d3adb8af5b662a65c4c140}{%
++           family={Goldreich},
++           familyi={G\bibinitperiod},
++           given={Oded},
++           giveni={O\bibinitperiod}}}%
++        {{hash=39e4a0690915f1d991133196a545b37b}{%
++           family={Goldwasser},
++           familyi={G\bibinitperiod},
++           given={Shafi},
++           giveni={S\bibinitperiod}}}%
++        {{hash=fb54c363f1b0d126e883c84df49e4790}{%
++           family={Micali},
++           familyi={M\bibinitperiod},
++           given={Silvio},
++           giveni={S\bibinitperiod}}}%
++      }
++      \list{location}{1}{%
++        {New York, NY, USA}%
++      }
++      \list{publisher}{1}{%
++        {Association for Computing Machinery}%
++      }
++      \strng{namehash}{39e304099b960365cdb56b83f4c70df6}
++      \strng{fullhash}{39e304099b960365cdb56b83f4c70df6}
++      \strng{bibnamehash}{39e304099b960365cdb56b83f4c70df6}
++      \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
++      \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
++      \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
++      \field{sortinit}{4}
++      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{issn}{0004-5411}
++      \field{journaltitle}{J. ACM}
++      \field{month}{8}
++      \field{number}{4}
++      \field{title}{How to Construct Random Functions}
++      \field{volume}{33}
++      \field{year}{1986}
++      \field{pages}{792\bibrangedash 807}
++      \range{pages}{16}
++      \verb{doi}
++      \verb 10.1145/6490.6503
++      \endverb
++      \verb{urlraw}
++      \verb https://doi.org/10.1145/6490.6503
++      \endverb
++      \verb{url}
++      \verb https://doi.org/10.1145/6490.6503
++      \endverb
++    \endentry
++    \entry{Preneel1999}{inbook}{}
++      \name{author}{1}{}{%
++        {{hash=0b9d4896fca22178c881b5236f351e05}{%
++           family={Preneel},
++           familyi={P\bibinitperiod},
++           given={Bart},
++           giveni={B\bibinitperiod}}}%
++      }
++      \name{editor}{1}{}{%
++        {{hash=14f9bdb855aa40873ff3dce506ed6fff}{%
++           family={Damg{å}rd},
++           familyi={D\bibinitperiod},
++           given={Ivan\bibnamedelima Bjerre},
++           giveni={I\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
++      }
++      \list{location}{1}{%
++        {Berlin, Heidelberg}%
++      }
++      \list{publisher}{1}{%
++        {Springer Berlin Heidelberg}%
++      }
++      \strng{namehash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{fullhash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{bibnamehash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{authorbibnamehash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{authornamehash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{authorfullhash}{0b9d4896fca22178c881b5236f351e05}
++      \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
++      \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
++      \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
++      \field{sortinit}{5}
++      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{abstract}{This paper describes the state of the art for 
cryptographic hash functions. Different definitions are compared, and the few 
theoretical results on hash functions are discussed. A brief overview is 
presented of the most important constructions, and some open problems are 
presented.}
++      \field{booktitle}{Lectures on Data Security: Modern Cryptology in 
Theory and Practice}
++      \field{isbn}{978-3-540-48969-6}
++      \field{title}{The State of Cryptographic Hash Functions}
++      \field{year}{1999}
++      \field{pages}{158}
++      \range{pages}{1}
++      \verb{doi}
++      \verb 10.1007/3-540-48969-X_8
++      \endverb
++      \verb{urlraw}
++      \verb https://doi.org/10.1007/3-540-48969-X_8
++      \endverb
++      \verb{url}
++      \verb https://doi.org/10.1007/3-540-48969-X_8
++      \endverb
++    \endentry
++    \entry{SG2012}{article}{}
++      \name{author}{2}{}{%
++        {{hash=831a194fddb2f27c4e2c482b1f72f48a}{%
++           family={Sobti},
++           familyi={S\bibinitperiod},
++           given={Rajeev},
++           giveni={R\bibinitperiod}}}%
++        {{hash=c244900d83a048c38628604327a28052}{%
++           family={Geetha},
++           familyi={G\bibinitperiod},
++           given={G},
++           giveni={G\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {International Journal of Computer Science Issues (IJCSI)}%
++      }
++      \strng{namehash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \strng{fullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \strng{bibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
++      \field{sortinit}{6}
++      \field{sortinithash}{7851c86048328b027313775d8fbd2131}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{International Journal of Computer Science Issues 
(IJCSI)}
++      \field{number}{2}
++      \field{title}{Cryptographic hash functions: a review}
++      \field{volume}{9}
++      \field{year}{2012}
++      \field{pages}{462}
++      \range{pages}{1}
++    \endentry
++    \entry{RK2011}{article}{}
++      \name{author}{2}{}{%
++        {{hash=8f939579bcf2d180bae9f53387cab62b}{%
++           family={Ramanujam},
++           familyi={R\bibinitperiod},
++           given={Sriram},
++           giveni={S\bibinitperiod}}}%
++        {{hash=81584ababc9dfe487baae50ab6f0ca8a}{%
++           family={Karuppiah},
++           familyi={K\bibinitperiod},
++           given={Marimuthu},
++           giveni={M\bibinitperiod}}}%
++      }
++      \strng{namehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \strng{fullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \strng{bibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
++      \field{sortinit}{9}
++      \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{IJCSNS International Journal of Computer Science 
and Network Security}
++      \field{number}{1}
++      \field{title}{Designing an algorithm with high Avalanche Effect}
++      \field{volume}{11}
++      \field{year}{2011}
++      \field{pages}{106\bibrangedash 111}
++      \range{pages}{6}
++    \endentry
++    \entry{GJW2011}{inproceedings}{}
++      \name{author}{3}{}{%
++        {{hash=74ca2f05d1125811a4211361255b1cf2}{%
++           family={Gueron},
++           familyi={G\bibinitperiod},
++           given={Shay},
++           giveni={S\bibinitperiod}}}%
++        {{hash=38e00ab25a60509b785c20ef8caa89b9}{%
++           family={Johnson},
++           familyi={J\bibinitperiod},
++           given={Simon},
++           giveni={S\bibinitperiod}}}%
++        {{hash=20a47eef2fa55e0486b02a0e2a0b8d0c}{%
++           family={Walker},
++           familyi={W\bibinitperiod},
++           given={Jesse},
++           giveni={J\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {IEEE}%
++      }
++      \strng{namehash}{4b253103893adba3aada17995ac73ec0}
++      \strng{fullhash}{4b253103893adba3aada17995ac73ec0}
++      \strng{bibnamehash}{4b253103893adba3aada17995ac73ec0}
++      \strng{authorbibnamehash}{4b253103893adba3aada17995ac73ec0}
++      \strng{authornamehash}{4b253103893adba3aada17995ac73ec0}
++      \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{2011 Eighth International Conference on Information 
Technology: New Generations}
++      \field{title}{SHA-512/256}
++      \field{year}{2011}
++      \field{pages}{354\bibrangedash 358}
++      \range{pages}{5}
++    \endentry
++    \entry{BCK1996}{article}{}
++      \name{author}{3}{}{%
++        {{hash=06e2bb2f83d8b669b46db64431509301}{%
++           family={Bellare},
++           familyi={B\bibinitperiod},
++           given={Mihir},
++           giveni={M\bibinitperiod}}}%
++        {{hash=7faf0f3900af6c70795ea089d283f02e}{%
++           family={Canetti},
++           familyi={C\bibinitperiod},
++           given={Ran},
++           giveni={R\bibinitperiod}}}%
++        {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
++           family={Krawczyk},
++           familyi={K\bibinitperiod},
++           given={Hugo},
++           giveni={H\bibinitperiod}}}%
++      }
++      \strng{namehash}{2527ef0685da3bdb01959cd066adc238}
++      \strng{fullhash}{2527ef0685da3bdb01959cd066adc238}
++      \strng{bibnamehash}{2527ef0685da3bdb01959cd066adc238}
++      \strng{authorbibnamehash}{2527ef0685da3bdb01959cd066adc238}
++      \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238}
++      \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{RSA Laboratories’ CryptoBytes}
++      \field{number}{1}
++      \field{title}{Message authentication using hash functions: The HMAC 
construction}
++      \field{volume}{2}
++      \field{year}{1996}
++      \field{pages}{12\bibrangedash 15}
++      \range{pages}{4}
++    \endentry
++    \entry{krawczyk2010}{inproceedings}{}
++      \name{author}{1}{}{%
++        {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
++           family={Krawczyk},
++           familyi={K\bibinitperiod},
++           given={Hugo},
++           giveni={H\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{088445b3855bedf4bcc9d25651eb98b2}
++      \strng{fullhash}{088445b3855bedf4bcc9d25651eb98b2}
++      \strng{bibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
++      \strng{authorbibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
++      \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2}
++      \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{Annual Cryptology Conference}
++      \field{title}{Cryptographic extraction and key derivation: The HKDF 
scheme}
++      \field{year}{2010}
++      \field{pages}{631\bibrangedash 648}
++      \range{pages}{18}
++    \endentry
++    \entry{trimberger2012}{book}{}
++      \name{author}{1}{}{%
++        {{hash=0afd18d7b25d23c61db1fe942ec1c236}{%
++           family={Trimberger},
++           familyi={T\bibinitperiod},
++           given={Stephen\bibnamedelima M},
++           giveni={S\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Springer Science \& Business Media}%
++      }
++      \strng{namehash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \strng{fullhash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \strng{bibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{Field-programmable gate array technology}
++      \field{year}{2012}
++    \endentry
++    \entry{madurawe2006}{misc}{}
++      \name{author}{1}{}{%
++        {{hash=093f14ec763e8df6227fd18ac8958011}{%
++           family={Madurawe},
++           familyi={M\bibinitperiod},
++           given={Raminda\bibnamedelima Udaya},
++           giveni={R\bibinitperiod\bibinitdelim U\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Google Patents}%
++      }
++      \strng{namehash}{093f14ec763e8df6227fd18ac8958011}
++      \strng{fullhash}{093f14ec763e8df6227fd18ac8958011}
++      \strng{bibnamehash}{093f14ec763e8df6227fd18ac8958011}
++      \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
++      \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
++      \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{month}{6}
++      \field{note}{US Patent 7,064,579}
++      \field{title}{Alterable application specific integrated circuit (ASIC)}
++      \field{year}{2006}
++    \endentry
++    \entry{BDK2016}{inproceedings}{}
++      \name{author}{3}{}{%
++        {{hash=6b9702c0a225b2966f2e07631bcfe935}{%
++           family={Biryukov},
++           familyi={B\bibinitperiod},
++           given={Alex},
++           giveni={A\bibinitperiod}}}%
++        {{hash=bf937d804c107f19fafa536592af6563}{%
++           family={Dinu},
++           familyi={D\bibinitperiod},
++           given={Daniel},
++           giveni={D\bibinitperiod}}}%
++        {{hash=d38e18b5ec4018e5f12aab4287c4a08f}{%
++           family={Khovratovich},
++           familyi={K\bibinitperiod},
++           given={Dmitry},
++           giveni={D\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {IEEE}%
++      }
++      \strng{namehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \strng{fullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \strng{bibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{2016 IEEE European Symposium on Security and Privacy 
(EuroS\&P)}
++      \field{title}{Argon2: new generation of memory-hard functions for 
password hashing and other applications}
++      \field{year}{2016}
++      \field{pages}{292\bibrangedash 302}
++      \range{pages}{11}
++    \endentry
++    \entry{stamp2003}{article}{}
++      \name{author}{1}{}{%
++        {{hash=799c6648cb97b6ffb4e9da11a6e277ac}{%
++           family={Stamp},
++           familyi={S\bibinitperiod},
++           given={Mark},
++           giveni={M\bibinitperiod}}}%
++      }
++      \strng{namehash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \strng{fullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \strng{bibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{San Jose State University, Department of Computer 
Science}
++      \field{title}{Once upon a time-memory tradeoff}
++      \field{year}{2003}
++    \endentry
++    \entry{shamir_sharing}{article}{}
++      \name{author}{1}{}{%
++        {{hash=71b77dd8ab33fe646ef25cded49e9881}{%
++           family={Shamir},
++           familyi={S\bibinitperiod},
++           given={Adi},
++           giveni={A\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {ACm New York, NY, USA}%
++      }
++      \strng{namehash}{71b77dd8ab33fe646ef25cded49e9881}
++      \strng{fullhash}{71b77dd8ab33fe646ef25cded49e9881}
++      \strng{bibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
++      \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
++      \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
++      \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
++      \field{sortinit}{1}
++      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{Communications of the ACM}
++      \field{number}{11}
++      \field{title}{How to share a secret}
++      \field{volume}{22}
++      \field{year}{1979}
++      \field{pages}{612\bibrangedash 613}
++      \range{pages}{2}
++    \endentry
++    \entry{pedersen_sharing_0}{inproceedings}{}
++      \name{author}{1}{}{%
++        {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
++           family={Pedersen},
++           familyi={P\bibinitperiod},
++           given={Torben\bibnamedelima Pryds},
++           giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \field{extraname}{1}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{Annual international cryptology conference}
++      \field{chapter}{0}
++      \field{title}{Non-interactive and information-theoretic secure 
verifiable secret sharing}
++      \field{year}{1991}
++      \field{pages}{129\bibrangedash 140}
++      \range{pages}{12}
++    \endentry
++    \entry{feldman_sharing}{inproceedings}{}
++      \name{author}{1}{}{%
++        {{hash=618e5892290641345f357d52e5ef3c12}{%
++           family={Feldman},
++           familyi={F\bibinitperiod},
++           given={Paul},
++           giveni={P\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {IEEE}%
++      }
++      \strng{namehash}{618e5892290641345f357d52e5ef3c12}
++      \strng{fullhash}{618e5892290641345f357d52e5ef3c12}
++      \strng{bibnamehash}{618e5892290641345f357d52e5ef3c12}
++      \strng{authorbibnamehash}{618e5892290641345f357d52e5ef3c12}
++      \strng{authornamehash}{618e5892290641345f357d52e5ef3c12}
++      \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{28th Annual Symposium on Foundations of Computer 
Science (sfcs 1987)}
++      \field{title}{A practical scheme for non-interactive verifiable secret 
sharing}
++      \field{year}{1987}
++      \field{pages}{427\bibrangedash 438}
++      \range{pages}{12}
++    \endentry
++    \entry{pedersen_sharing_5.2}{inproceedings}{}
++      \name{author}{1}{}{%
++        {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
++           family={Pedersen},
++           familyi={P\bibinitperiod},
++           given={Torben\bibnamedelima Pryds},
++           giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
++      \field{extraname}{2}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{Annual international cryptology conference}
++      \field{chapter}{5.2}
++      \field{title}{Non-interactive and information-theoretic secure 
verifiable secret sharing}
++      \field{year}{1991}
++      \field{pages}{129\bibrangedash 140}
++      \range{pages}{12}
++    \endentry
++    \entry{midata}{book}{}
++      \name{author}{2}{}{%
++        {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
++           family={Parag\bibnamedelima Chatterjee},
++           familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
++           given={Emmanuel\bibnamedelima Benoist},
++           giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
++        {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
++           family={Nath},
++           familyi={N\bibinitperiod},
++           given={Asoke},
++           giveni={A\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {IGI Global}%
++      }
++      \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
++      \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
++      \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
++      \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
++      \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
++      \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{Applied Approach to Privacy and Security for the Internet 
of Things}
++      \field{year}{in print}
++    \endentry
++    \entry{multifactor_authentication}{article}{}
++      \name{author}{6}{}{%
++        {{hash=349f11e1663912dcb58a979614214591}{%
++           family={Ometov},
++           familyi={O\bibinitperiod},
++           given={Aleksandr},
++           giveni={A\bibinitperiod}}}%
++        {{hash=2210a791565f0e229e45ee4adddbe39a}{%
++           family={Bezzateev},
++           familyi={B\bibinitperiod},
++           given={Sergey},
++           giveni={S\bibinitperiod}}}%
++        {{hash=515fcf6ab2738bfda2f35fc8a7aabbad}{%
++           family={Makitalo},
++           familyi={M\bibinitperiod},
++           given={Niko},
++           giveni={N\bibinitperiod}}}%
++        {{hash=29e0c47c24b13223f7986b9dd3f37aeb}{%
++           family={Andreev},
++           familyi={A\bibinitperiod},
++           given={Sergey},
++           giveni={S\bibinitperiod}}}%
++        {{hash=5d7740b6e2ec0fb41f72f451e980670b}{%
++           family={Mikkonen},
++           familyi={M\bibinitperiod},
++           given={Tommi},
++           giveni={T\bibinitperiod}}}%
++        {{hash=1b1c95790f3403d472ac8a4befa0eb49}{%
++           family={Koucheryavy},
++           familyi={K\bibinitperiod},
++           given={Yevgeni},
++           giveni={Y\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Multidisciplinary Digital Publishing Institute}%
++      }
++      \strng{namehash}{45cd1a76e0cdd8946f91bead3b664768}
++      \strng{fullhash}{c1db872bc8ef36ee51e0526f23769166}
++      \strng{bibnamehash}{c1db872bc8ef36ee51e0526f23769166}
++      \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
++      \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
++      \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{Cryptography}
++      \field{number}{1}
++      \field{title}{Multi-factor authentication: A survey}
++      \field{volume}{2}
++      \field{year}{2018}
++      \field{pages}{1}
++      \range{pages}{1}
++    \endentry
++    \entry{authentication_methods_review}{article}{}
++      \name{author}{4}{}{%
++        {{hash=7320eb44b90aead6870ac2fab7d71076}{%
++           family={Syed\bibnamedelima Idrus},
++           familyi={S\bibinitperiod\bibinitdelim I\bibinitperiod},
++           given={Syed\bibnamedelima Zulkarnain},
++           giveni={S\bibinitperiod\bibinitdelim Z\bibinitperiod}}}%
++        {{hash=a09a932af5f7cd55229eaae3115944ad}{%
++           family={Cherrier},
++           familyi={C\bibinitperiod},
++           given={Estelle},
++           giveni={E\bibinitperiod}}}%
++        {{hash=b91ea03eff7b52d366d5afa7847a6284}{%
++           family={Rosenberger},
++           familyi={R\bibinitperiod},
++           given={Christophe},
++           giveni={C\bibinitperiod}}}%
++        {{hash=315979ea9ce5ac9865a4cf0dae673cd0}{%
++           family={Schwartzmann},
++           familyi={S\bibinitperiod},
++           given={Jean-Jacques},
++           giveni={J\bibinithyphendelim J\bibinitperiod}}}%
++      }
++      \strng{namehash}{ce7e837cc1dbca8dddef9896de46176c}
++      \strng{fullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
++      \strng{bibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
++      \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
++      \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
++      \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{Australian Journal of Basic and Applied Sciences}
++      \field{number}{5}
++      \field{title}{A Review on Authentication Methods}
++      \field{volume}{7}
++      \field{year}{2013}
++      \field{pages}{95\bibrangedash 107}
++      \range{pages}{13}
++      \verb{urlraw}
++      \verb https://hal.archives-ouvertes.fr/hal-00912435
++      \endverb
++      \verb{url}
++      \verb https://hal.archives-ouvertes.fr/hal-00912435
++      \endverb
++    \endentry
++    \entry{just2004}{article}{}
++      \name{author}{1}{}{%
++        {{hash=daa648a2c605762c09bfaab94d0f2168}{%
++           family={Just},
++           familyi={J\bibinitperiod},
++           given={Mike},
++           giveni={M\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {IEEE}%
++      }
++      \strng{namehash}{daa648a2c605762c09bfaab94d0f2168}
++      \strng{fullhash}{daa648a2c605762c09bfaab94d0f2168}
++      \strng{bibnamehash}{daa648a2c605762c09bfaab94d0f2168}
++      \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
++      \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
++      \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
++      \field{sortinit}{2}
++      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{IEEE Security \& Privacy}
++      \field{number}{5}
++      \field{title}{Designing and evaluating challenge-question systems}
++      \field{volume}{2}
++      \field{year}{2004}
++      \field{pages}{32\bibrangedash 39}
++      \range{pages}{8}
++    \endentry
++    \entry{MBSS2013}{inproceedings}{}
++      \name{author}{4}{}{%
++        {{hash=0c05d559d041112c87e63b05c5a7262b}{%
++           family={Mulliner},
++           familyi={M\bibinitperiod},
++           given={Collin},
++           giveni={C\bibinitperiod}}}%
++        {{hash=4e0292e00a4787b4db10b2dff39f4a1f}{%
++           family={Borgaonkar},
++           familyi={B\bibinitperiod},
++           given={Ravishankar},
++           giveni={R\bibinitperiod}}}%
++        {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
++           family={Stewin},
++           familyi={S\bibinitperiod},
++           given={Patrick},
++           giveni={P\bibinitperiod}}}%
++        {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
++           family={Seifert},
++           familyi={S\bibinitperiod},
++           given={Jean-Pierre},
++           giveni={J\bibinithyphendelim P\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{adce78e3f1e04476f35b2b5fcb6c6262}
++      \strng{fullhash}{85e8ef541ae3f71805b7382856006c85}
++      \strng{bibnamehash}{85e8ef541ae3f71805b7382856006c85}
++      \strng{authorbibnamehash}{85e8ef541ae3f71805b7382856006c85}
++      \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262}
++      \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{booktitle}{International Conference on Detection of Intrusions 
and Malware, and Vulnerability Assessment}
++      \field{title}{SMS-based one-time passwords: attacks and defense}
++      \field{year}{2013}
++      \field{pages}{150\bibrangedash 159}
++      \range{pages}{10}
++    \endentry
++    \entry{rieck_detection}{book}{}
++      \name{author}{3}{}{%
++        {{hash=47449209bde605e33642aeb4dcc23bf2}{%
++           family={Rieck},
++           familyi={R\bibinitperiod},
++           given={Konrad},
++           giveni={K\bibinitperiod}}}%
++        {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
++           family={Stewin},
++           familyi={S\bibinitperiod},
++           given={Patrick},
++           giveni={P\bibinitperiod}}}%
++        {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
++           family={Seifert},
++           familyi={S\bibinitperiod},
++           given={Jean-Pierre},
++           giveni={J\bibinithyphendelim P\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Springer}%
++      }
++      \strng{namehash}{5646590031d49807385b96f9f6caae4a}
++      \strng{fullhash}{5646590031d49807385b96f9f6caae4a}
++      \strng{bibnamehash}{5646590031d49807385b96f9f6caae4a}
++      \strng{authorbibnamehash}{5646590031d49807385b96f9f6caae4a}
++      \strng{authornamehash}{5646590031d49807385b96f9f6caae4a}
++      \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{Detection of Intrusions and Malware, and Vulnerability 
Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 
18-19, 2013. Proceedings}
++      \field{volume}{7967}
++      \field{year}{2013}
++    \endentry
++    \entry{pohlmann2017}{article}{}
++      \name{author}{4}{}{%
++        {{hash=613966f471ac9240f4bfce66e6e27b3e}{%
++           family={Pohlmann},
++           familyi={P\bibinitperiod},
++           given={Norbert},
++           giveni={N\bibinitperiod}}}%
++        {{hash=6462a03ff4a69f0c01462ca9dfd9c2ac}{%
++           family={Frintrop},
++           familyi={F\bibinitperiod},
++           given={Jan-Hendrik},
++           giveni={J\bibinithyphendelim H\bibinitperiod}}}%
++        {{hash=247317f34ce75f08f273ab47d30a4e91}{%
++           family={Widdermann},
++           familyi={W\bibinitperiod},
++           given={Rick},
++           giveni={R\bibinitperiod}}}%
++        {{hash=197d288c2557c4675696cefb75461cf0}{%
++           family={Ziegler},
++           familyi={Z\bibinitperiod},
++           given={Tim},
++           giveni={T\bibinitperiod}}}%
++      }
++      \strng{namehash}{46fedf156ec86b72f1439a7e282b9fee}
++      \strng{fullhash}{7c1027a04280b6542245beeb85db1408}
++      \strng{bibnamehash}{7c1027a04280b6542245beeb85db1408}
++      \strng{authorbibnamehash}{7c1027a04280b6542245beeb85db1408}
++      \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee}
++      \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{Wenn der Softbot menschliche Identit{ä}t best{ä}tigt. 
Videoident-Verfahren II: Die Technik}
++      \field{year}{2017}
++    \endentry
++    \entry{biometric_auth}{article}{}
++      \name{author}{2}{}{%
++        {{hash=019f89587e0c1e896a94bec0898d3964}{%
++           family={Pagnin},
++           familyi={P\bibinitperiod},
++           given={Elena},
++           giveni={E\bibinitperiod}}}%
++        {{hash=3a3c8efa3b514b0608c70f90d96e7fec}{%
++           family={Mitrokotsa},
++           familyi={M\bibinitperiod},
++           given={Aikaterini},
++           giveni={A\bibinitperiod}}}%
++      }
++      \list{publisher}{1}{%
++        {Hindawi}%
++      }
++      \strng{namehash}{db53816ca2458e8344846c9aa5b3bce3}
++      \strng{fullhash}{db53816ca2458e8344846c9aa5b3bce3}
++      \strng{bibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
++      \strng{authorbibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
++      \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3}
++      \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{journaltitle}{Security and Communication Networks}
++      \field{title}{Privacy-preserving biometric authentication: challenges 
and directions}
++      \field{volume}{2017}
++      \field{year}{2017}
++    \endentry
++    \entry{ccc_merkel}{online}{}
++      \name{author}{1}{}{%
++        {{hash=b7a2e18f77259e34d5b676fd04412bb3}{%
++           family={Krempl},
++           familyi={K\bibinitperiod},
++           given={Stefan},
++           giveni={S\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {heise online}%
++      }
++      \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens 
Fingerabdruck}
++      \field{urlday}{7}
++      \field{urlmonth}{3}
++      \field{urlyear}{2020}
++      \field{year}{2014}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb 
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
++      \endverb
++      \verb{url}
++      \verb 
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
++      \endverb
++    \endentry
++    \entry{gnu_taler}{online}{}
++      \list{organization}{1}{%
++        {Taler Systems SA}%
++      }
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labeltitlesource}{title}
++      \field{title}{GNU Taler: Features}
++      \field{urlday}{2}
++      \field{urlmonth}{6}
++      \field{urlyear}{2020}
++      \field{year}{2020}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb https://taler.net/en/features.html
++      \endverb
++      \verb{url}
++      \verb https://taler.net/en/features.html
++      \endverb
++    \endentry
++    \entry{postgresql}{online}{}
++      \list{organization}{1}{%
++        {The PostgreSQL Global Development Group}%
++      }
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labeltitlesource}{title}
++      \field{title}{PostgreSQL: The World's Most Advanced Open Source 
Relational Database}
++      \field{urlday}{2}
++      \field{urlmonth}{6}
++      \field{urlyear}{2020}
++      \field{year}{2020}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb https://www.postgresql.org/
++      \endverb
++      \verb{url}
++      \verb https://www.postgresql.org/
++      \endverb
++    \endentry
++    \entry{libcurl}{online}{}
++      \list{organization}{1}{%
++        {Curl}%
++      }
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labeltitlesource}{title}
++      \field{title}{libcurl - the multiprotocol file transfer library}
++      \field{urlday}{2}
++      \field{urlmonth}{6}
++      \field{urlyear}{2020}
++      \field{year}{2020}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb https://curl.haxx.se/libcurl/
++      \endverb
++      \verb{url}
++      \verb https://curl.haxx.se/libcurl/
++      \endverb
++    \endentry
++    \entry{libmicrohttpd}{online}{}
++      \list{organization}{1}{%
++        {GNU project}%
++      }
++      \field{sortinit}{3}
++      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
++      \field{labeltitlesource}{title}
++      \field{title}{GNU Libmicrohttpd}
++      \field{urlday}{2}
++      \field{urlmonth}{6}
++      \field{urlyear}{2020}
++      \field{year}{2020}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb https://www.gnu.org/software/libmicrohttpd/?
++      \endverb
++      \verb{url}
++      \verb https://www.gnu.org/software/libmicrohttpd/?
++      \endverb
++    \endentry
++    \entry{global_data_index}{online}{}
++      \list{organization}{1}{%
++        {Dell EMC.}%
++      }
++      \field{sortinit}{4}
++      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
++      \field{labeltitlesource}{title}
++      \field{title}{Global Data Protection Index 2018 – Key Findings}
++      \field{urlday}{7}
++      \field{urlmonth}{3}
++      \field{urlyear}{2020}
++      \field{year}{2018}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb 
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
++      \endverb
++      \verb{url}
++      \verb 
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
++      \endverb
++    \endentry
++    \entry{millions_lost}{online}{}
++      \name{author}{1}{}{%
++        {{hash=3648296958ad2ea0461fac7a13e12981}{%
++           family={Cuthbertson},
++           familyi={C\bibinitperiod},
++           given={Anthony},
++           giveni={A\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {INDEPENDENT}%
++      }
++      \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
++      \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
++      \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
++      \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
++      \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
++      \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
++      \field{sortinit}{4}
++      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' 
after man dies with only password}
++      \field{urlday}{7}
++      \field{urlmonth}{3}
++      \field{urlyear}{2020}
++      \field{year}{2019}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
++      \endverb
++      \verb{url}
++      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
++      \endverb
++    \endentry
++    \entry{forgot_my_pin}{online}{}
++      \name{author}{1}{}{%
++        {{hash=3690e6a925d190517dbba666878a6978}{%
++           family={Frauenfelder},
++           familyi={F\bibinitperiod},
++           given={Mark},
++           giveni={M\bibinitperiod}}}%
++      }
++      \list{organization}{1}{%
++        {WIRED}%
++      }
++      \strng{namehash}{3690e6a925d190517dbba666878a6978}
++      \strng{fullhash}{3690e6a925d190517dbba666878a6978}
++      \strng{bibnamehash}{3690e6a925d190517dbba666878a6978}
++      \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
++      \strng{authornamehash}{3690e6a925d190517dbba666878a6978}
++      \strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
++      \field{sortinit}{4}
++      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
++      \field{labelnamesource}{author}
++      \field{labeltitlesource}{title}
++      \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in 
Bitcoin}
++      \field{urlday}{7}
++      \field{urlmonth}{3}
++      \field{urlyear}{2020}
++      \field{year}{2017}
++      \field{urldateera}{ce}
++      \verb{urlraw}
++      \verb 
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
++      \endverb
++      \verb{url}
++      \verb 
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
++      \endverb
++    \endentry
++  \enddatalist
++\endrefsection
++\endinput
++
diff --cc doc/thesis/thesis.blg
index 0000000,0000000..d691ca6
new file mode 100644
--- /dev/null
+++ b/doc/thesis/thesis.blg
@@@ -1,0 -1,0 +1,19 @@@
++[0] Config.pm:304> INFO - This is Biber 2.13
++[0] Config.pm:307> INFO - Logfile is 'thesis.blg'
++[23] biber:315> INFO - === Mi Jun  3, 2020, 14:34:23
++[36] Biber.pm:375> INFO - Reading 'thesis.bcf'
++[95] Biber.pm:905> INFO - Found 33 citekeys in bib section 0
++[108] Biber.pm:4196> INFO - Processing section 0
++[108] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
++[108] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to 
bibliothek.bib
++[117] Biber.pm:4373> INFO - Looking for bibtex format file 'bibliothek.bib' 
for section 0
++[119] bibtex.pm:1462> INFO - LaTeX decoding ...
++[157] bibtex.pm:1281> INFO - Found BibTeX data source 'bibliothek.bib'
++[238] Utils.pm:300> WARN - year field 'in print' in entry 'midata' is not an 
integer - this will probably not sort properly.
++[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = 
shifted' with 'variable = non-ignorable'
++[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 
'normalization = NFD' with 'normalization = prenormalized'
++[311] Biber.pm:4024> INFO - Sorting list 'none/global//global/global' of type 
'entry' with template 'none' and locale 'en-US'
++[311] Biber.pm:4030> INFO - No sort tailoring available for locale 'en-US'
++[329] bbl.pm:648> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
++[345] bbl.pm:751> INFO - Output to thesis.bbl
++[345] Biber.pm:110> INFO - WARNINGS: 1
diff --cc doc/thesis/thesis.lof
index 0000000,0000000..981edd3
new file mode 100644
--- /dev/null
+++ b/doc/thesis/thesis.lof
@@@ -1,0 -1,0 +1,15 @@@
++\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse 
{pagetracker}\boolfalse {backtracker}\relax 
++\defcounter {refsection}{0}\relax 
++\selectlanguage *{english}
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {1}{\ignorespaces System design 
overview}}{15}{figure.1}% 
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {2}{\ignorespaces Anastasis 
database}}{17}{figure.2}% 
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {3}{\ignorespaces Secret split 
process}}{24}{figure.3}% 
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {4}{\ignorespaces Secret split 
process}}{25}{figure.4}% 
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {5}{\ignorespaces Secret recovery 
process}}{26}{figure.5}% 
++\defcounter {refsection}{0}\relax 
++\contentsline {figure}{\numberline {6}{\ignorespaces Business project 
plan}}{37}{figure.6}% 
diff --cc doc/thesis/thesis.lot
index 0000000,0000000..1a53ee5
new file mode 100644
--- /dev/null
+++ b/doc/thesis/thesis.lot
@@@ -1,0 -1,0 +1,3 @@@
++\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse 
{pagetracker}\boolfalse {backtracker}\relax 
++\defcounter {refsection}{0}\relax 
++\selectlanguage *{english}
diff --cc doc/thesis/thesis.out
index 0000000,0000000..e69de29
new file mode 100644
--- /dev/null
+++ b/doc/thesis/thesis.out
diff --cc doc/thesis/thesis.synctex.gz
index 0000000,0000000..6a57e81
new file mode 100644
Binary files differ

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]