Cite this paper
M. Talamo, M. Galinium, C. H. Schunck and F. Arcieri, "Secure Messaging Implementation in OpenSC,"
Journal of Information Security, Vol. 3 No. 4, 2012, pp. 251-258. doi:
10.4236/jis.2012.34032.
References
[1] International Organization for Standardization (ISO) “Identification Cards—Integrated Circuit Cards Part 4: Organization, Security and Commands for Interchange,” International Organization for Standardization Std., Geneva, 2005.
[2] International Organization for Standardization (ISO) “Identification Cards—Integrated Circuit Cards Programming Interfaces—Part 3: Application Programming Interface,” International Organization for Standardization Std., Geneva, 2008.
[3] The Common Criteria, “Common Criteria for Information Technology Security Evaluation,” Common Criteria Std., 2009.
http://www.commoncriteriaportal.org/cc/
[4] The European Committee for Standardization (CEN), “Secure Signature-Creation Devices ‘EAL 4+’,” European Committee for Standardization (CEN) Std., Brussels, 2004.
[5] M. Talamo et al., “Robustness and Interoperability Problems in Security Devices,” Proceedings of 4th International Conferences on Information Security and Cryptology, Beijing, 14-17 December 2008.
[6] M. Talamo et al., “Verifying Extended Criteria for Interoperability of Security Devices,” Proceedings of 3rd International Symposium on Information Security, Monterrey, 10-11 November 2008, pp. 1131-1139.
[7] M. Talamo, M. Galinium, C. H. Schunck and F. Arcieri, “Interleaving Command Sequences: A Thread to Secure Smartcard Interoperability,” Proceedings of the 10th International Conference on Information Security and Privacy, Jakarta, 1-3 December 2011, pp. 102-107.
[8] OpenSC, “OpenSC Tools and Libraries for Smartcard,” 2001.
http://www.opensc-project.org/opensc
[9] W. Rankl and W. Effing, “Smart Card Handbook,” 4th Edition, Wiley, West Sussex, 2010.
[10] M. Talamo, M. Galinium, C. H. Schunck and F. Arcieri, “Interleaving Commands: A Threat to the Interoperability of Smartcard Based Security Applications,” International Journal of Computer and Communication, Vol. 6, No. 1, 2012, pp. 76-83.
[11] M. Talamo, M. Galinium, C. H. Schunck and F. Arcieri, “Integrating Secure Messaging into OpenSC,” Proceedings of the 2nd International Conference on Computer and Management, Wuhan, 9-11 March 2012, pp. 1222-1227.
[12] E. Pucciarelli, “Implementation of Secure Messaging,” 2008.
http://www.mail-archive.com/opensc-devel@lists.opensc-project.org/msg03034.html
[13] A. Villani, “Incrypto34v2 User and Administrator Guidance,” ST. Incard, Marcianese, 2004.
[14] OpenSC. “Supported Hardware (Smart Cards and Usb tokens),” 2011.
http://www.opensc-project.org/opensc/wiki/SupportedHardware
[15] O. Kirch and A. Iacono, “pkcs15-postecert.c,” 2004.
http://www.opensc-project.org/opensc/browser/OpenSC/src/libopensc/pkcs15-postecert.c
[16] E. Pucciarelli, “pkcs15-itacns.c,” 2008.
http://www.opensc-project.org/opensc/browser/OpenSC/src/libopensc/pkcs15-itacns.c
[17] Agencia per L’Italia Digitale, “Certificatori Firma Digitale. Ente Nazionale per la Digitalizzazione della Pubblica Amministrazione,” 2011.
http://www.digitpa.gov.it/certificatori_firma_digitale