2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.47
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Application Acquisition Protocol

Abstract: In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers. In certain application scenarios it might be necessary (e.g. banking and identity applications). However, with introduction of the Trusted Service Manager (TSM) architecture there might be valid cases where revealing the card user's identity is not necessary. At th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(20 citation statements)
references
References 35 publications
(29 reference statements)
0
20
0
Order By: Relevance
“…It will endorse that the platform conforms to the stated security and operational requirements [14], along with the attestation process and its e ectiveness. The SCM may deliver the Chain1 Chain 2…”
Section: Enrolment Phasementioning
confidence: 99%
See 2 more Smart Citations
“…It will endorse that the platform conforms to the stated security and operational requirements [14], along with the attestation process and its e ectiveness. The SCM may deliver the Chain1 Chain 2…”
Section: Enrolment Phasementioning
confidence: 99%
“…The reliability assurance process veri es that the software part of the smart card platform is not been tampered/modi ed. For the description of the TEM and implementation of the attestation handler see [14].…”
Section: Trusted Environment and Execution Manager (Tem)mentioning
confidence: 99%
See 1 more Smart Citation
“…Unknown key-share resilience-Unknown key share attack may occur when the connection between a firmware server and a WAP is established, but the WAP or the server believes it is sharing the key related to connection with another entity [36,37]. Proposed protocol's message always have a MAC (Message Authentication Code).…”
Section: Analysis Of the Proposed Protocol's Security Attributionsmentioning
confidence: 99%
“…Thus, any detail and published secure profile provisioning directly related to eUICC cannot be found, but only few works which describes the enhanced business process for a flexible MCIM (M2M Communication Identity Module) [7] and several works related to the provisioning for UICCs or smart cards can be found [6], [8]- [13]. In [7], the business process related to M2M is mainly focused, therefore no detail consideration of security can be found.…”
Section: B Standardization and Related Workmentioning
confidence: 99%