gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: assumptions are a bad thing, s


From: gnunet
Subject: [taler-anastasis] branch master updated: assumptions are a bad thing, support for scenarios is a good thing...
Date: Wed, 10 Jun 2020 22:22:45 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new 9354c1b  assumptions are a bad thing, support for scenarios is a good 
thing...
9354c1b is described below

commit 9354c1bb43d452ec83a08f6d0a573492c002c23c
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Wed Jun 10 22:22:42 2020 +0200

    assumptions are a bad thing, support for scenarios is a good thing...
---
 doc/thesis/design.tex     |  32 ++--
 doc/thesis/thesis.bbl     | 417 ++++++++++++++++++++++++++++++++++------------
 doc/thesis/thesis.blg     |  36 ++--
 doc/thesis/thesis.run.xml |   4 +-
 4 files changed, 349 insertions(+), 140 deletions(-)

diff --git a/doc/thesis/design.tex b/doc/thesis/design.tex
index 1753000..bc5c84e 100644
--- a/doc/thesis/design.tex
+++ b/doc/thesis/design.tex
@@ -5,10 +5,10 @@ secret} with an open set of escrow providers and recover it 
if the
 secret is lost. The core secret itself is protected from the escrow
 providers by encrypting it with a {\em master key}. The main objective of
 Anastasis is to ensure that the user can reliably recover the core
-secret, while making this difficult for everyone else. Furthermore, it
-is assumed that the user is unable to reliably remember any secret
-with sufficiently high entropy, so we cannot simply encrypt using some
-other key material in possession of the user.
+secret, while making this difficult for everyone else. Furthermore, Anastasis
+supports situations where the user is unable to reliably remember any secret
+with sufficiently high entropy, so Anastasis does not simply encrypt using some
+other key material in exclusive possession of the user.
 
 To uniquely identify users and to provide a first layer of protection,
 an “unforgettable” identifier is used. This identifier should be
@@ -21,7 +21,7 @@ be used.\\
 
 The figure~\ref{fig:legend_keys_anastasis} shows the legend for the
 illustration of the Anastasis key usage shown in 
figure~\ref{fig:keys_anastasis}
-on page~\pageref{fig:keys_anastasis}. 
+on page~\pageref{fig:keys_anastasis}.
 The figure~\ref{fig:keys_anastasis} gives an overview of the keys used in 
Anastasis. It also shows how they are created and used.\\
 \newline
 \begin{figure}[H]
@@ -38,31 +38,31 @@ The figure~\ref{fig:keys_anastasis} gives an overview of 
the keys used in Anasta
        \label{fig:keys_anastasis}
 \end{figure}
 
-\noindent In the following the keys shown in the 
figure~\ref{fig:keys_anastasis} on 
+\noindent In the following the keys shown in the 
figure~\ref{fig:keys_anastasis} on
 page~\pageref{fig:keys_anastasis} are explained:
 
 \begin{description}
        \item[kdf id] {The {\em kdf id} is derived from the user attributes and 
a
-       randomly generated server salt provided by the escrow provider using 
Argon2. It is used to derive 
+       randomly generated server salt provided by the escrow provider using 
Argon2. It is used to derive
        the {\em private account key}, the {\em symmetric key 1} and the {\em 
symmetric key 2}.}
        \item[private account key] {The {\em private account key} is used to 
sign the {\em encrypted
        recovery document}. It is derived from the {\em identity key} using 
{\em HKDF-1}}.
        \item[public account key] {The {\em public account key} is derived from 
its corresponding
-       {\em private account key}. It used to verify the signature of the {\em 
encrypted recovery 
+       {\em private account key}. It used to verify the signature of the {\em 
encrypted recovery
        document} and also is the identifier of the user which is needed by the 
provider.}
        \item[symmetric key 1] {The {\em symmetric key 1} is derived from the 
{\em identity key} using
        {\em HKDF-2}. It is used to encrypt and decrypt the {\em encrypted 
recovery document} which is stored by
        the provider.}
        \item[symmetric key 2] {The {\em symmetric key 2} is derived from the 
{\em identity key} using
-       {\em HKDF-3}. It is used to encrypt and decrypt the different {\em 
encrypted key shares} which 
+       {\em HKDF-3}. It is used to encrypt and decrypt the different {\em 
encrypted key shares} which
        are stored by the escrow providers.}
-       \item[truth key] {The {\em truth key} is randomly generated for each 
{\em encrypted authentication data} 
+       \item[truth key] {The {\em truth key} is randomly generated for each 
{\em encrypted authentication data}
        and is stored within the {\em encrypted recovery document}. It must be 
provided by the user to let the
-       server decrypt the {\em encrypted authentication data} for 
authentication purposes.} 
+       server decrypt the {\em encrypted authentication data} for 
authentication purposes.}
        \item[master key] {The {\em master key} is randomly generated and is 
used to encrypt and decrypt the
        {\em encrypted core secret} which is stored within an {\em encrypted 
recovery document}. The {\em encrypted master key} also is stored within the 
{\em encrypted recovery document}.}
        \item[policy key] {The {\em policy keys} are used for encryption and 
decryption of the {\em encrypted master key}. A {\em policy key} is constructed 
by hashing a specific combination of {\em key shares} specified by the
-       user. For hashing SHA512 is used here.} 
+       user. For hashing SHA512 is used here.}
 \end{description}
 \newpage
 
@@ -297,7 +297,7 @@ key_share_encrypt(kdf_id, key_share)
 
 recovery_document_encrypt(kdf_id, recovery_document)
 {
-  encrypted_recovery_document = 
+  encrypted_recovery_document =
     encrypt(kdf_id, recovery_document, "erd")
   return encrypted_recovery_document
 }
@@ -321,7 +321,7 @@ algorithm is also used to generate the
 
 \begin{lstlisting}
 (anastasis-account-signature) = eddsa_sign(h_body, eddsa_priv)
-ver_res = 
+ver_res =
   eddsa_verifiy(h_body, anastasis-account-signature, eddsa_pub)
 \end{lstlisting}
 
@@ -331,11 +331,11 @@ ver_res =
        \item[ver\_res] {A Boolean value. True: Signature verification passed, 
False: Signature verification failed.}
 \end{description}
 
-\noindent 
+\noindent
 When requesting policy downloads, the client must also provide a signature:
 \begin{lstlisting}
 (anastasis-account-signature) = eddsa_sign(version, eddsa_priv)
-ver_res = 
+ver_res =
   eddsa_verifiy(version, anastasis-account-signature, eddsa_pub)
 \end{lstlisting}
 
diff --git a/doc/thesis/thesis.bbl b/doc/thesis/thesis.bbl
index 2f233c0..d4e09cb 100644
--- a/doc/thesis/thesis.bbl
+++ b/doc/thesis/thesis.bbl
@@ -19,6 +19,186 @@
 
 \refsection{0}
   \datalist[entry]{none/global//global/global}
+    \entry{garfinkel1995}{book}{}
+      \name{author}{1}{}{%
+        {{hash=f7ae1c1e91c1c29835e2ff7e98908fa7}{%
+           family={Garfinkel},
+           familyi={G\bibinitperiod},
+           given={Simson},
+           giveni={S\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {" O'Reilly Media, Inc."}%
+      }
+      \strng{namehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \strng{fullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \strng{bibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \strng{authorbibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{PGP: pretty good privacy}
+      \field{year}{1995}
+    \endentry
+    \entry{pepdoc}{online}{}
+      \list{organization}{1}{%
+        {pEp Security SA}%
+      }
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labeltitlesource}{title}
+      \field{title}{Welcome to p≡p Documentation!}
+      \field{urlday}{6}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://www.pep.security/docs/
+      \endverb
+      \verb{url}
+      \verb https://www.pep.security/docs/
+      \endverb
+    \endentry
+    \entry{LLLW*2017}{inproceedings}{}
+      \name{author}{7}{}{%
+        {{hash=c4d8c39e3a63acab6d94c490b6d45028}{%
+           family={Liu},
+           familyi={L\bibinitperiod},
+           given={Yi},
+           giveni={Y\bibinitperiod}}}%
+        {{hash=3e1f0e5c79944a684b0e981db2d979bf}{%
+           family={Li},
+           familyi={L\bibinitperiod},
+           given={Ruilin},
+           giveni={R\bibinitperiod}}}%
+        {{hash=ded616c8fbaf16eea249759846a9c40f}{%
+           family={Liu},
+           familyi={L\bibinitperiod},
+           given={Xingtong},
+           giveni={X\bibinitperiod}}}%
+        {{hash=c33641e67eeaefc87b7821dc9b51ff90}{%
+           family={Wang},
+           familyi={W\bibinitperiod},
+           given={Jian},
+           giveni={J\bibinitperiod}}}%
+        {{hash=f4a4cbf770add19c206827116c68732e}{%
+           family={Zhang},
+           familyi={Z\bibinitperiod},
+           given={Lei},
+           giveni={L\bibinitperiod}}}%
+        {{hash=6b995a03f55b8c0d7a4ed8e44daae0a5}{%
+           family={Tang},
+           familyi={T\bibinitperiod},
+           given={Chaojing},
+           giveni={C\bibinitperiod}}}%
+        {{hash=ba23fbcd4b04b46c4588892f422fe72b}{%
+           family={Kang},
+           familyi={K\bibinitperiod},
+           given={Hongyan},
+           giveni={H\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {IEEE}%
+      }
+      \strng{namehash}{10c7b94477775db573510e04e477a77b}
+      \strng{fullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+      \strng{bibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+      \strng{authorbibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+      \strng{authornamehash}{10c7b94477775db573510e04e477a77b}
+      \strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{2017 11th IEEE International Conference on 
Anti-counterfeiting, Security, and Identification (ASID)}
+      \field{title}{An efficient method to enhance Bitcoin wallet security}
+      \field{year}{2017}
+      \field{pages}{26\bibrangedash 29}
+      \range{pages}{4}
+    \endentry
+    \entry{millions_lost}{online}{}
+      \name{author}{1}{}{%
+        {{hash=3648296958ad2ea0461fac7a13e12981}{%
+           family={Cuthbertson},
+           familyi={C\bibinitperiod},
+           given={Anthony},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {INDEPENDENT}%
+      }
+      \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' 
after man dies with only password}
+      \field{urlday}{7}
+      \field{urlmonth}{3}
+      \field{urlyear}{2020}
+      \field{year}{2019}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+      \endverb
+      \verb{url}
+      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+      \endverb
+    \endentry
+    \entry{bitcoin-keys}{online}{}
+      \list{organization}{1}{%
+        {Bitcoin}%
+      }
+      \field{sortinit}{5}
+      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+      \field{labeltitlesource}{title}
+      \field{title}{BIP 32 - Hierarchical Deterministic Wallets}
+      \field{urlday}{6}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
+      \endverb
+      \verb{url}
+      \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
+      \endverb
+    \endentry
+    \entry{bajikar2002}{article}{}
+      \name{author}{1}{}{%
+        {{hash=b5c45c4b8deb48651c65650f0409e671}{%
+           family={Bajikar},
+           familyi={B\bibinitperiod},
+           given={Sundeep},
+           giveni={S\bibinitperiod}}}%
+      }
+      \strng{namehash}{b5c45c4b8deb48651c65650f0409e671}
+      \strng{fullhash}{b5c45c4b8deb48651c65650f0409e671}
+      \strng{bibnamehash}{b5c45c4b8deb48651c65650f0409e671}
+      \strng{authorbibnamehash}{b5c45c4b8deb48651c65650f0409e671}
+      \strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671}
+      \strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671}
+      \field{sortinit}{7}
+      \field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Mobile Platforms Group Intel Corporation}
+      \field{title}{Trusted platform module (tpm) based security on notebook 
pcs-white paper}
+      \field{volume}{1}
+      \field{year}{2002}
+      \field{pages}{20}
+      \range{pages}{1}
+    \endentry
     \entry{vadhan2012}{article}{}
       \true{moreauthor}
       \true{morelabelname}
@@ -38,11 +218,11 @@
       \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
       \strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
       \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{8}
+      \field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
-      \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer 
Science}
+      \field{journaltitle}{Foundations and Trends® in Theoretical Computer 
Science}
       \field{number}{1--3}
       \field{title}{Pseudorandomness}
       \field{volume}{7}
@@ -67,8 +247,8 @@
       \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
       \strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
       \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
-      \field{sortinit}{3}
-      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{booktitle}{Annual International Cryptology Conference}
@@ -107,8 +287,8 @@
       \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
       \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
       \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
-      \field{sortinit}{4}
-      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{issn}{0004-5411}
@@ -160,8 +340,8 @@
       \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
       \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
       \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
-      \field{sortinit}{5}
-      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{abstract}{This paper describes the state of the art for 
cryptographic hash functions. Different definitions are compared, and the few 
theoretical results on hash functions are discussed. A brief overview is 
presented of the most important constructions, and some open problems are 
presented.}
@@ -203,8 +383,8 @@
       \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
       \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
       \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
-      \field{sortinit}{6}
-      \field{sortinithash}{7851c86048328b027313775d8fbd2131}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{International Journal of Computer Science Issues 
(IJCSI)}
@@ -234,8 +414,8 @@
       \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
       \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
       \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
-      \field{sortinit}{9}
-      \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{IJCSNS International Journal of Computer Science 
and Network Security}
@@ -363,8 +543,8 @@
       \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
       \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
       \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{title}{Field-programmable gate array technology}
@@ -387,8 +567,8 @@
       \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
       \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
       \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{month}{6}
@@ -423,8 +603,8 @@
       \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
       \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
       \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{booktitle}{2016 IEEE European Symposium on Security and Privacy 
(EuroS\&P)}
@@ -447,8 +627,8 @@
       \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
       \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
       \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{San Jose State University, Department of Computer 
Science}
@@ -472,8 +652,8 @@
       \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
       \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
       \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
-      \field{sortinit}{1}
-      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{Communications of the ACM}
@@ -569,35 +749,6 @@
       \field{pages}{129\bibrangedash 140}
       \range{pages}{12}
     \endentry
-    \entry{midata}{book}{}
-      \name{author}{2}{}{%
-        {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
-           family={Parag\bibnamedelima Chatterjee},
-           familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
-           given={Emmanuel\bibnamedelima Benoist},
-           giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
-        {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
-           family={Nath},
-           familyi={N\bibinitperiod},
-           given={Asoke},
-           giveni={A\bibinitperiod}}}%
-      }
-      \list{publisher}{1}{%
-        {IGI Global}%
-      }
-      \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
-      \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
-      \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
-      \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
-      \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
-      \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
-      \field{sortinit}{2}
-      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
-      \field{labelnamesource}{author}
-      \field{labeltitlesource}{title}
-      \field{title}{Applied Approach to Privacy and Security for the Internet 
of Things}
-      \field{year}{in print}
-    \endentry
     \entry{multifactor_authentication}{article}{}
       \name{author}{6}{}{%
         {{hash=349f11e1663912dcb58a979614214591}{%
@@ -640,8 +791,8 @@
       \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
       \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
       \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
-      \field{sortinit}{2}
-      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{Cryptography}
@@ -681,8 +832,8 @@
       \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
       \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
       \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
-      \field{sortinit}{2}
-      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{Australian Journal of Basic and Applied Sciences}
@@ -716,8 +867,8 @@
       \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
       \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
       \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
-      \field{sortinit}{2}
-      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{journaltitle}{IEEE Security \& Privacy}
@@ -805,6 +956,26 @@
       \field{volume}{7967}
       \field{year}{2013}
     \endentry
+    \entry{emailauthowasp}{online}{}
+      \list{organization}{1}{%
+        {OWASP Foundation}%
+      }
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labeltitlesource}{title}
+      \field{title}{Forgot Password Cheat Sheet}
+      \field{urlday}{5}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
+      \endverb
+      \verb{url}
+      \verb 
https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
+      \endverb
+    \endentry
     \entry{pohlmann2017}{article}{}
       \name{author}{4}{}{%
         {{hash=613966f471ac9240f4bfce66e6e27b3e}{%
@@ -906,12 +1077,84 @@
       \verb 
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
       \endverb
     \endentry
+    \entry{coinbase}{online}{}
+      \list{organization}{1}{%
+        {Coinbase}%
+      }
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labeltitlesource}{title}
+      \field{title}{Backup your encrypted private keys on Google Drive and 
iCloud with Coinbase Wallet}
+      \field{urlday}{6}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
+      \endverb
+      \verb{url}
+      \verb 
https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
+      \endverb
+    \endentry
+    \entry{midata}{book}{}
+      \name{author}{2}{}{%
+        {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
+           family={Parag\bibnamedelima Chatterjee},
+           familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
+           given={Emmanuel\bibnamedelima Benoist},
+           giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+        {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
+           family={Nath},
+           familyi={N\bibinitperiod},
+           given={Asoke},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {IGI Global}%
+      }
+      \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Applied Approach to Privacy and Security for the Internet 
of Things}
+      \field{year}{in print}
+    \endentry
+    \entry{marlinspike2011}{article}{}
+      \name{author}{1}{}{%
+        {{hash=9dfd0bf532dd1b08969afefcdd7188b5}{%
+           family={Marlinspike},
+           familyi={M\bibinitperiod},
+           given={Moxie},
+           giveni={M\bibinitperiod}}}%
+      }
+      \strng{namehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \strng{fullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \strng{bibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \strng{authorbibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Black Hat USA}
+      \field{title}{SSL and the future of authenticity}
+      \field{volume}{6}
+      \field{year}{2011}
+    \endentry
     \entry{gnu_taler}{online}{}
       \list{organization}{1}{%
         {Taler Systems SA}%
       }
-      \field{sortinit}{3}
-      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
       \field{labeltitlesource}{title}
       \field{title}{GNU Taler: Features}
       \field{urlday}{2}
@@ -930,8 +1173,8 @@
       \list{organization}{1}{%
         {The PostgreSQL Global Development Group}%
       }
-      \field{sortinit}{3}
-      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
       \field{labeltitlesource}{title}
       \field{title}{PostgreSQL: The World's Most Advanced Open Source 
Relational Database}
       \field{urlday}{2}
@@ -950,8 +1193,8 @@
       \list{organization}{1}{%
         {Curl}%
       }
-      \field{sortinit}{3}
-      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
       \field{labeltitlesource}{title}
       \field{title}{libcurl - the multiprotocol file transfer library}
       \field{urlday}{2}
@@ -970,8 +1213,8 @@
       \list{organization}{1}{%
         {GNU project}%
       }
-      \field{sortinit}{3}
-      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
       \field{labeltitlesource}{title}
       \field{title}{GNU Libmicrohttpd}
       \field{urlday}{2}
@@ -990,8 +1233,8 @@
       \list{organization}{1}{%
         {Dell EMC.}%
       }
-      \field{sortinit}{4}
-      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{sortinit}{5}
+      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
       \field{labeltitlesource}{title}
       \field{title}{Global Data Protection Index 2018 – Key Findings}
       \field{urlday}{7}
@@ -1006,40 +1249,6 @@
       \verb 
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
       \endverb
     \endentry
-    \entry{millions_lost}{online}{}
-      \name{author}{1}{}{%
-        {{hash=3648296958ad2ea0461fac7a13e12981}{%
-           family={Cuthbertson},
-           familyi={C\bibinitperiod},
-           given={Anthony},
-           giveni={A\bibinitperiod}}}%
-      }
-      \list{organization}{1}{%
-        {INDEPENDENT}%
-      }
-      \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
-      \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
-      \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
-      \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
-      \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
-      \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
-      \field{sortinit}{4}
-      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
-      \field{labelnamesource}{author}
-      \field{labeltitlesource}{title}
-      \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' 
after man dies with only password}
-      \field{urlday}{7}
-      \field{urlmonth}{3}
-      \field{urlyear}{2020}
-      \field{year}{2019}
-      \field{urldateera}{ce}
-      \verb{urlraw}
-      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
-      \endverb
-      \verb{url}
-      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
-      \endverb
-    \endentry
     \entry{forgot_my_pin}{online}{}
       \name{author}{1}{}{%
         {{hash=3690e6a925d190517dbba666878a6978}{%
@@ -1057,8 +1266,8 @@
       \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
       \strng{authornamehash}{3690e6a925d190517dbba666878a6978}
       \strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
-      \field{sortinit}{4}
-      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{sortinit}{5}
+      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
       \field{labelnamesource}{author}
       \field{labeltitlesource}{title}
       \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in 
Bitcoin}
diff --git a/doc/thesis/thesis.blg b/doc/thesis/thesis.blg
index d691ca6..94b9dd2 100644
--- a/doc/thesis/thesis.blg
+++ b/doc/thesis/thesis.blg
@@ -1,19 +1,19 @@
-[0] Config.pm:304> INFO - This is Biber 2.13
+[0] Config.pm:304> INFO - This is Biber 2.14 (beta)
 [0] Config.pm:307> INFO - Logfile is 'thesis.blg'
-[23] biber:315> INFO - === Mi Jun  3, 2020, 14:34:23
-[36] Biber.pm:375> INFO - Reading 'thesis.bcf'
-[95] Biber.pm:905> INFO - Found 33 citekeys in bib section 0
-[108] Biber.pm:4196> INFO - Processing section 0
-[108] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
-[108] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to 
bibliothek.bib
-[117] Biber.pm:4373> INFO - Looking for bibtex format file 'bibliothek.bib' 
for section 0
-[119] bibtex.pm:1462> INFO - LaTeX decoding ...
-[157] bibtex.pm:1281> INFO - Found BibTeX data source 'bibliothek.bib'
-[238] Utils.pm:300> WARN - year field 'in print' in entry 'midata' is not an 
integer - this will probably not sort properly.
-[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = 
shifted' with 'variable = non-ignorable'
-[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization 
= NFD' with 'normalization = prenormalized'
-[311] Biber.pm:4024> INFO - Sorting list 'none/global//global/global' of type 
'entry' with template 'none' and locale 'en-US'
-[311] Biber.pm:4030> INFO - No sort tailoring available for locale 'en-US'
-[329] bbl.pm:648> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
-[345] bbl.pm:751> INFO - Output to thesis.bbl
-[345] Biber.pm:110> INFO - WARNINGS: 1
+[68] biber:322> INFO - === Wed Jun 10, 2020, 22:18:34
+[80] Biber.pm:415> INFO - Reading 'thesis.bcf'
+[141] Biber.pm:943> INFO - Found 41 citekeys in bib section 0
+[153] Biber.pm:4256> INFO - Processing section 0
+[153] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
+[153] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to 
bibliothek.bib
+[162] Biber.pm:4455> INFO - Looking for bibtex format file 'bibliothek.bib' 
for section 0
+[163] bibtex.pm:1653> INFO - LaTeX decoding ...
+[200] bibtex.pm:1471> INFO - Found BibTeX data source 'bibliothek.bib'
+[350] Utils.pm:293> WARN - year field 'in print' in entry 'midata' is not an 
integer - this will probably not sort properly.
+[394] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization 
= NFD' with 'normalization = prenormalized'
+[394] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = 
shifted' with 'variable = non-ignorable'
+[394] Biber.pm:4084> INFO - Sorting list 'none/global//global/global' of type 
'entry' with template 'none' and locale 'en-US'
+[394] Biber.pm:4090> INFO - No sort tailoring available for locale 'en-US'
+[419] bbl.pm:652> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
+[431] bbl.pm:755> INFO - Output to thesis.bbl
+[431] Biber.pm:128> INFO - WARNINGS: 1
diff --git a/doc/thesis/thesis.run.xml b/doc/thesis/thesis.run.xml
index f9576b8..6c8325d 100644
--- a/doc/thesis/thesis.run.xml
+++ b/doc/thesis/thesis.run.xml
@@ -41,7 +41,7 @@
   >
 ]>
 <requests version="1.0">
-  <internal package="biblatex" priority="9" active="1">
+  <internal package="biblatex" priority="9" active="0">
     <generic>latex</generic>
     <provides type="dynamic">
       <file>thesis.bcf</file>
@@ -65,7 +65,7 @@
       <file>american.lbx</file>
     </requires>
   </internal>
-  <external package="biblatex" priority="5" active="1">
+  <external package="biblatex" priority="5" active="0">
     <generic>biber</generic>
     <cmdline>
       <binary>biber</binary>

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]