M. Abadi and R. M. Needham, "Prudent engineering practice for cryptographic protocols, " IEEE Trans. Software Eng., vol. 22, no. 1, pp. 6-15, 1996.
D. Basin, C. Cremers, T. H.-J. Kim, A. Perrig, R. Sasse, and P. Szalachowski, "ARPKI: Attack resilient public-key infrastructure, " in Proc. of the ACM Conference on Computer and Communications Security, ser. CCS '14. New York, NY, USA: ACM, 2014, pp. 382-393. [Online]. Available: http://doi. acm. org/10. 1145/2660267. 2660298
E. Blass, K. Elkhiyaoui, and R. Molva, "Tracker: Security and privacy for RFID-based supply chains, " in Proceedings of the Network and Distributed System Security Symposium, NDSS, 2011.
K. Bowers, A. Juels, R. L. Rivest, and E. Shen, "Drifting keys: Impersonation detection for constrained devices, " in Proc. IEEE INFOCOM, April 2013, pp. 1025-1033.
M. R. Carr, "Smart card technology with case studies, " in Proc. International Carnahan Conference on Security Technology. IEEE, 2002, pp. 158-159.
M. Chase and S. Meiklejohn, "Transparency overlays and applications, " in CCS, 2016, pp. 168-179.
L. Chuat, P. Szalachowski, A. Perrig, B. Laurie, and E. Messeri, "Efficient gossip protocols for verifying the consistency of certificate logs, " in Proceedings of the IEEE Conference on Communications and Network Security (CNS), September 2015. [Online]. Available: http://www. netsec. ethz. ch/publications/papers/gossip2015. pdf
K. Cohn-Gordon, C. J. F. Cremers, and L. Garratt, "On post-compromise security, " in CSF, 2016, 2016.
I. Eyal, A. E. Gencer, E. G. Sirer, and R. V. Renesse, "Bitcoin-NG: A scalable blockchain protocol, " in 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). Santa Clara, CA: USENIX Association, Mar. 2016, pp. 45-59.
J. H?astad, J. Jonsson, A. Juels, and M. Yung, "Funkspiel schemes: An alternative to conventional tamper resistance, " in Proc. of the ACM Conference on Computer and Communications Security, ser. CCS '00. New York, NY, USA: ACM, 2000, pp. 125-133. [Online]. Available: http://doi. acm. org/10. 1145/352600. 352619
G. Itkis, "Cryptographic tamper evidence, " in Proc. of the ACM Conference on Computer and Communication Security. ACM Press, 2003, pp. 355-364.
E. Kokoris-Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford, "Enhancing bitcoin security and performance with strong consistency via collective signing, " in 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016., 2016, pp. 279-296.
R. Küsters, T. Truderung, and A. Vogt, "Accountability: definition and relationship to verifiability, " in Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, 2010, pp. 526-535.
B. Laurie, A. Langley, and E. Kasper, "Certificate transparency, " Internet Requests for Comments, RFC Editor, RFC 6962, June 2013. [Online]. Available: http://www. rfc-editor. org/rfc/rfc6962
M. Lehtonen, F. Michahelles, and E. Fleisch, "How to detect cloned tags in a reliable way from incomplete RFID traces, " in RFID, 2009. IEEE, 2009, pp. 257-264.
S. Meier, B. Schmidt, C. Cremers, and D. Basin, "The TAMARIN Prover for the Symbolic Analysis of Security Protocols, " in Computer Aided Verification, 25th International Conference, CAV 2013, Princeton, USA, Proc., ser. Lecture Notes in Computer Science, N. Sharygina and H. Veith, Eds., vol. 8044. Springer, 2013, pp. 696-701.
Moxie Marlinspike and Trevor Perrin, "The double ratchet algorithm, " https://whispersystems. org/docs/specifications/doubleratchet/, 2016.
S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system, " 2009.
United States Department of Defense, "DoD Common Access Card, " May 2016, http://www. cac. mil/common-access-card/.
J. Yu, V. Cheval, and M. Ryan, "DTKI: A new formalized PKI with verifiable trusted parties, " Comput. J., vol. 59, no. 11, pp. 1695-1713, 2016.
J. Yu, M. Ryan, and C. Cremers, "Decim: Detecting endpoint compromise in messaging, " IACR Cryptology ePrint Archive, vol. 2015, p. 486, 2015.
D. Zanetti, L. Fellmann, and S. Capkun, "Privacy-preserving clone detection for RFID-enabled supply chains, " in RFID, 2010. IEEE, 2010, pp. 37-44.
D. Zanetti, S. Capkun, and A. Juels, "Tailing RFID tags for clone detection, " in 20th Annual Network and Distributed System Security Symposium, NDSS, 2013.