The benefits and drawbacks of using electronic identities
Tài liệu tham khảo
2008, All three US presidential candidates has passports breached, The Guardian
CIFAS, the UK's Fraud Prevention Service. http://www.cifas.org.uk/.
Diffie, 1976, New directions in cryptography, IEEE Transactions on Information Theory, 22, 644, 10.1109/TIT.1976.1055638
Drimer, 2008, Thinking inside the box: system-level failures of tamper proofing, IEEE Symposium on Security and Privacy
EMVCo (Europay Mastercard Visa). http://www.emvco.com/.
2007, How firms and fraudsters deal in data, BBC News Article
Matsumoto, Tsutomu. Importance of open discussion on adversarial analyses for mobile security technologies. ITU-T Workshop on Security, Seoul, 14 May 2002. http://groups.csail.mit.edu/cis/crypto/classes/6.857/papers/gummy-slides.pdf.
Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21, 120, 10.1145/359340.359342
2007, Village hit by credit card scam, BBC News Article
