[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-anastasis] branch master updated: assumptions are a bad thing, s
From: |
gnunet |
Subject: |
[taler-anastasis] branch master updated: assumptions are a bad thing, support for scenarios is a good thing... |
Date: |
Wed, 10 Jun 2020 22:22:45 +0200 |
This is an automated email from the git hooks/post-receive script.
grothoff pushed a commit to branch master
in repository anastasis.
The following commit(s) were added to refs/heads/master by this push:
new 9354c1b assumptions are a bad thing, support for scenarios is a good
thing...
9354c1b is described below
commit 9354c1bb43d452ec83a08f6d0a573492c002c23c
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Wed Jun 10 22:22:42 2020 +0200
assumptions are a bad thing, support for scenarios is a good thing...
---
doc/thesis/design.tex | 32 ++--
doc/thesis/thesis.bbl | 417 ++++++++++++++++++++++++++++++++++------------
doc/thesis/thesis.blg | 36 ++--
doc/thesis/thesis.run.xml | 4 +-
4 files changed, 349 insertions(+), 140 deletions(-)
diff --git a/doc/thesis/design.tex b/doc/thesis/design.tex
index 1753000..bc5c84e 100644
--- a/doc/thesis/design.tex
+++ b/doc/thesis/design.tex
@@ -5,10 +5,10 @@ secret} with an open set of escrow providers and recover it
if the
secret is lost. The core secret itself is protected from the escrow
providers by encrypting it with a {\em master key}. The main objective of
Anastasis is to ensure that the user can reliably recover the core
-secret, while making this difficult for everyone else. Furthermore, it
-is assumed that the user is unable to reliably remember any secret
-with sufficiently high entropy, so we cannot simply encrypt using some
-other key material in possession of the user.
+secret, while making this difficult for everyone else. Furthermore, Anastasis
+supports situations where the user is unable to reliably remember any secret
+with sufficiently high entropy, so Anastasis does not simply encrypt using some
+other key material in exclusive possession of the user.
To uniquely identify users and to provide a first layer of protection,
an “unforgettable” identifier is used. This identifier should be
@@ -21,7 +21,7 @@ be used.\\
The figure~\ref{fig:legend_keys_anastasis} shows the legend for the
illustration of the Anastasis key usage shown in
figure~\ref{fig:keys_anastasis}
-on page~\pageref{fig:keys_anastasis}.
+on page~\pageref{fig:keys_anastasis}.
The figure~\ref{fig:keys_anastasis} gives an overview of the keys used in
Anastasis. It also shows how they are created and used.\\
\newline
\begin{figure}[H]
@@ -38,31 +38,31 @@ The figure~\ref{fig:keys_anastasis} gives an overview of
the keys used in Anasta
\label{fig:keys_anastasis}
\end{figure}
-\noindent In the following the keys shown in the
figure~\ref{fig:keys_anastasis} on
+\noindent In the following the keys shown in the
figure~\ref{fig:keys_anastasis} on
page~\pageref{fig:keys_anastasis} are explained:
\begin{description}
\item[kdf id] {The {\em kdf id} is derived from the user attributes and
a
- randomly generated server salt provided by the escrow provider using
Argon2. It is used to derive
+ randomly generated server salt provided by the escrow provider using
Argon2. It is used to derive
the {\em private account key}, the {\em symmetric key 1} and the {\em
symmetric key 2}.}
\item[private account key] {The {\em private account key} is used to
sign the {\em encrypted
recovery document}. It is derived from the {\em identity key} using
{\em HKDF-1}}.
\item[public account key] {The {\em public account key} is derived from
its corresponding
- {\em private account key}. It used to verify the signature of the {\em
encrypted recovery
+ {\em private account key}. It used to verify the signature of the {\em
encrypted recovery
document} and also is the identifier of the user which is needed by the
provider.}
\item[symmetric key 1] {The {\em symmetric key 1} is derived from the
{\em identity key} using
{\em HKDF-2}. It is used to encrypt and decrypt the {\em encrypted
recovery document} which is stored by
the provider.}
\item[symmetric key 2] {The {\em symmetric key 2} is derived from the
{\em identity key} using
- {\em HKDF-3}. It is used to encrypt and decrypt the different {\em
encrypted key shares} which
+ {\em HKDF-3}. It is used to encrypt and decrypt the different {\em
encrypted key shares} which
are stored by the escrow providers.}
- \item[truth key] {The {\em truth key} is randomly generated for each
{\em encrypted authentication data}
+ \item[truth key] {The {\em truth key} is randomly generated for each
{\em encrypted authentication data}
and is stored within the {\em encrypted recovery document}. It must be
provided by the user to let the
- server decrypt the {\em encrypted authentication data} for
authentication purposes.}
+ server decrypt the {\em encrypted authentication data} for
authentication purposes.}
\item[master key] {The {\em master key} is randomly generated and is
used to encrypt and decrypt the
{\em encrypted core secret} which is stored within an {\em encrypted
recovery document}. The {\em encrypted master key} also is stored within the
{\em encrypted recovery document}.}
\item[policy key] {The {\em policy keys} are used for encryption and
decryption of the {\em encrypted master key}. A {\em policy key} is constructed
by hashing a specific combination of {\em key shares} specified by the
- user. For hashing SHA512 is used here.}
+ user. For hashing SHA512 is used here.}
\end{description}
\newpage
@@ -297,7 +297,7 @@ key_share_encrypt(kdf_id, key_share)
recovery_document_encrypt(kdf_id, recovery_document)
{
- encrypted_recovery_document =
+ encrypted_recovery_document =
encrypt(kdf_id, recovery_document, "erd")
return encrypted_recovery_document
}
@@ -321,7 +321,7 @@ algorithm is also used to generate the
\begin{lstlisting}
(anastasis-account-signature) = eddsa_sign(h_body, eddsa_priv)
-ver_res =
+ver_res =
eddsa_verifiy(h_body, anastasis-account-signature, eddsa_pub)
\end{lstlisting}
@@ -331,11 +331,11 @@ ver_res =
\item[ver\_res] {A Boolean value. True: Signature verification passed,
False: Signature verification failed.}
\end{description}
-\noindent
+\noindent
When requesting policy downloads, the client must also provide a signature:
\begin{lstlisting}
(anastasis-account-signature) = eddsa_sign(version, eddsa_priv)
-ver_res =
+ver_res =
eddsa_verifiy(version, anastasis-account-signature, eddsa_pub)
\end{lstlisting}
diff --git a/doc/thesis/thesis.bbl b/doc/thesis/thesis.bbl
index 2f233c0..d4e09cb 100644
--- a/doc/thesis/thesis.bbl
+++ b/doc/thesis/thesis.bbl
@@ -19,6 +19,186 @@
\refsection{0}
\datalist[entry]{none/global//global/global}
+ \entry{garfinkel1995}{book}{}
+ \name{author}{1}{}{%
+ {{hash=f7ae1c1e91c1c29835e2ff7e98908fa7}{%
+ family={Garfinkel},
+ familyi={G\bibinitperiod},
+ given={Simson},
+ giveni={S\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {" O'Reilly Media, Inc."}%
+ }
+ \strng{namehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \strng{fullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \strng{bibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \strng{authorbibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{PGP: pretty good privacy}
+ \field{year}{1995}
+ \endentry
+ \entry{pepdoc}{online}{}
+ \list{organization}{1}{%
+ {pEp Security SA}%
+ }
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{labeltitlesource}{title}
+ \field{title}{Welcome to p≡p Documentation!}
+ \field{urlday}{6}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://www.pep.security/docs/
+ \endverb
+ \verb{url}
+ \verb https://www.pep.security/docs/
+ \endverb
+ \endentry
+ \entry{LLLW*2017}{inproceedings}{}
+ \name{author}{7}{}{%
+ {{hash=c4d8c39e3a63acab6d94c490b6d45028}{%
+ family={Liu},
+ familyi={L\bibinitperiod},
+ given={Yi},
+ giveni={Y\bibinitperiod}}}%
+ {{hash=3e1f0e5c79944a684b0e981db2d979bf}{%
+ family={Li},
+ familyi={L\bibinitperiod},
+ given={Ruilin},
+ giveni={R\bibinitperiod}}}%
+ {{hash=ded616c8fbaf16eea249759846a9c40f}{%
+ family={Liu},
+ familyi={L\bibinitperiod},
+ given={Xingtong},
+ giveni={X\bibinitperiod}}}%
+ {{hash=c33641e67eeaefc87b7821dc9b51ff90}{%
+ family={Wang},
+ familyi={W\bibinitperiod},
+ given={Jian},
+ giveni={J\bibinitperiod}}}%
+ {{hash=f4a4cbf770add19c206827116c68732e}{%
+ family={Zhang},
+ familyi={Z\bibinitperiod},
+ given={Lei},
+ giveni={L\bibinitperiod}}}%
+ {{hash=6b995a03f55b8c0d7a4ed8e44daae0a5}{%
+ family={Tang},
+ familyi={T\bibinitperiod},
+ given={Chaojing},
+ giveni={C\bibinitperiod}}}%
+ {{hash=ba23fbcd4b04b46c4588892f422fe72b}{%
+ family={Kang},
+ familyi={K\bibinitperiod},
+ given={Hongyan},
+ giveni={H\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {IEEE}%
+ }
+ \strng{namehash}{10c7b94477775db573510e04e477a77b}
+ \strng{fullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+ \strng{bibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+ \strng{authorbibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+ \strng{authornamehash}{10c7b94477775db573510e04e477a77b}
+ \strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{booktitle}{2017 11th IEEE International Conference on
Anti-counterfeiting, Security, and Identification (ASID)}
+ \field{title}{An efficient method to enhance Bitcoin wallet security}
+ \field{year}{2017}
+ \field{pages}{26\bibrangedash 29}
+ \range{pages}{4}
+ \endentry
+ \entry{millions_lost}{online}{}
+ \name{author}{1}{}{%
+ {{hash=3648296958ad2ea0461fac7a13e12981}{%
+ family={Cuthbertson},
+ familyi={C\bibinitperiod},
+ given={Anthony},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{organization}{1}{%
+ {INDEPENDENT}%
+ }
+ \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
+ \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost'
after man dies with only password}
+ \field{urlday}{7}
+ \field{urlmonth}{3}
+ \field{urlyear}{2020}
+ \field{year}{2019}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+ \endverb
+ \verb{url}
+ \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+ \endverb
+ \endentry
+ \entry{bitcoin-keys}{online}{}
+ \list{organization}{1}{%
+ {Bitcoin}%
+ }
+ \field{sortinit}{5}
+ \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{labeltitlesource}{title}
+ \field{title}{BIP 32 - Hierarchical Deterministic Wallets}
+ \field{urlday}{6}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
+ \endverb
+ \verb{url}
+ \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
+ \endverb
+ \endentry
+ \entry{bajikar2002}{article}{}
+ \name{author}{1}{}{%
+ {{hash=b5c45c4b8deb48651c65650f0409e671}{%
+ family={Bajikar},
+ familyi={B\bibinitperiod},
+ given={Sundeep},
+ giveni={S\bibinitperiod}}}%
+ }
+ \strng{namehash}{b5c45c4b8deb48651c65650f0409e671}
+ \strng{fullhash}{b5c45c4b8deb48651c65650f0409e671}
+ \strng{bibnamehash}{b5c45c4b8deb48651c65650f0409e671}
+ \strng{authorbibnamehash}{b5c45c4b8deb48651c65650f0409e671}
+ \strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671}
+ \strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671}
+ \field{sortinit}{7}
+ \field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Mobile Platforms Group Intel Corporation}
+ \field{title}{Trusted platform module (tpm) based security on notebook
pcs-white paper}
+ \field{volume}{1}
+ \field{year}{2002}
+ \field{pages}{20}
+ \range{pages}{1}
+ \endentry
\entry{vadhan2012}{article}{}
\true{moreauthor}
\true{morelabelname}
@@ -38,11 +218,11 @@
\strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
\strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
\strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{8}
+ \field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
- \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer
Science}
+ \field{journaltitle}{Foundations and Trends® in Theoretical Computer
Science}
\field{number}{1--3}
\field{title}{Pseudorandomness}
\field{volume}{7}
@@ -67,8 +247,8 @@
\strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
\strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
\strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
- \field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Annual International Cryptology Conference}
@@ -107,8 +287,8 @@
\strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
\strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
\strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
- \field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{0004-5411}
@@ -160,8 +340,8 @@
\strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
\strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
\strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
- \field{sortinit}{5}
- \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{abstract}{This paper describes the state of the art for
cryptographic hash functions. Different definitions are compared, and the few
theoretical results on hash functions are discussed. A brief overview is
presented of the most important constructions, and some open problems are
presented.}
@@ -203,8 +383,8 @@
\strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
\strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
\strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
- \field{sortinit}{6}
- \field{sortinithash}{7851c86048328b027313775d8fbd2131}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{International Journal of Computer Science Issues
(IJCSI)}
@@ -234,8 +414,8 @@
\strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
\strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
\strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
- \field{sortinit}{9}
- \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
+ \field{sortinit}{1}
+ \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IJCSNS International Journal of Computer Science
and Network Security}
@@ -363,8 +543,8 @@
\strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
\strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
\strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Field-programmable gate array technology}
@@ -387,8 +567,8 @@
\strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
\strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
\strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{6}
@@ -423,8 +603,8 @@
\strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
\strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
\strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{2016 IEEE European Symposium on Security and Privacy
(EuroS\&P)}
@@ -447,8 +627,8 @@
\strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
\strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
\strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{San Jose State University, Department of Computer
Science}
@@ -472,8 +652,8 @@
\strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
\strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
\strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
- \field{sortinit}{1}
- \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+ \field{sortinit}{2}
+ \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Communications of the ACM}
@@ -569,35 +749,6 @@
\field{pages}{129\bibrangedash 140}
\range{pages}{12}
\endentry
- \entry{midata}{book}{}
- \name{author}{2}{}{%
- {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
- family={Parag\bibnamedelima Chatterjee},
- familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
- given={Emmanuel\bibnamedelima Benoist},
- giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
- {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
- family={Nath},
- familyi={N\bibinitperiod},
- given={Asoke},
- giveni={A\bibinitperiod}}}%
- }
- \list{publisher}{1}{%
- {IGI Global}%
- }
- \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
- \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
- \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
- \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
- \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
- \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
- \field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
- \field{labelnamesource}{author}
- \field{labeltitlesource}{title}
- \field{title}{Applied Approach to Privacy and Security for the Internet
of Things}
- \field{year}{in print}
- \endentry
\entry{multifactor_authentication}{article}{}
\name{author}{6}{}{%
{{hash=349f11e1663912dcb58a979614214591}{%
@@ -640,8 +791,8 @@
\strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
\strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
\strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
- \field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Cryptography}
@@ -681,8 +832,8 @@
\strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
\strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
\strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
- \field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Australian Journal of Basic and Applied Sciences}
@@ -716,8 +867,8 @@
\strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
\strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
\strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
- \field{sortinit}{2}
- \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IEEE Security \& Privacy}
@@ -805,6 +956,26 @@
\field{volume}{7967}
\field{year}{2013}
\endentry
+ \entry{emailauthowasp}{online}{}
+ \list{organization}{1}{%
+ {OWASP Foundation}%
+ }
+ \field{sortinit}{3}
+ \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{labeltitlesource}{title}
+ \field{title}{Forgot Password Cheat Sheet}
+ \field{urlday}{5}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
+ \endverb
+ \verb{url}
+ \verb
https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
+ \endverb
+ \endentry
\entry{pohlmann2017}{article}{}
\name{author}{4}{}{%
{{hash=613966f471ac9240f4bfce66e6e27b3e}{%
@@ -906,12 +1077,84 @@
\verb
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
\endverb
\endentry
+ \entry{coinbase}{online}{}
+ \list{organization}{1}{%
+ {Coinbase}%
+ }
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labeltitlesource}{title}
+ \field{title}{Backup your encrypted private keys on Google Drive and
iCloud with Coinbase Wallet}
+ \field{urlday}{6}
+ \field{urlmonth}{6}
+ \field{urlyear}{2020}
+ \field{year}{2020}
+ \field{urldateera}{ce}
+ \verb{urlraw}
+ \verb
https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
+ \endverb
+ \verb{url}
+ \verb
https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
+ \endverb
+ \endentry
+ \entry{midata}{book}{}
+ \name{author}{2}{}{%
+ {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
+ family={Parag\bibnamedelima Chatterjee},
+ familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
+ given={Emmanuel\bibnamedelima Benoist},
+ giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+ {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
+ family={Nath},
+ familyi={N\bibinitperiod},
+ given={Asoke},
+ giveni={A\bibinitperiod}}}%
+ }
+ \list{publisher}{1}{%
+ {IGI Global}%
+ }
+ \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
+ \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{title}{Applied Approach to Privacy and Security for the Internet
of Things}
+ \field{year}{in print}
+ \endentry
+ \entry{marlinspike2011}{article}{}
+ \name{author}{1}{}{%
+ {{hash=9dfd0bf532dd1b08969afefcdd7188b5}{%
+ family={Marlinspike},
+ familyi={M\bibinitperiod},
+ given={Moxie},
+ giveni={M\bibinitperiod}}}%
+ }
+ \strng{namehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \strng{fullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \strng{bibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \strng{authorbibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{labelnamesource}{author}
+ \field{labeltitlesource}{title}
+ \field{journaltitle}{Black Hat USA}
+ \field{title}{SSL and the future of authenticity}
+ \field{volume}{6}
+ \field{year}{2011}
+ \endentry
\entry{gnu_taler}{online}{}
\list{organization}{1}{%
{Taler Systems SA}%
}
- \field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{GNU Taler: Features}
\field{urlday}{2}
@@ -930,8 +1173,8 @@
\list{organization}{1}{%
{The PostgreSQL Global Development Group}%
}
- \field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{PostgreSQL: The World's Most Advanced Open Source
Relational Database}
\field{urlday}{2}
@@ -950,8 +1193,8 @@
\list{organization}{1}{%
{Curl}%
}
- \field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{libcurl - the multiprotocol file transfer library}
\field{urlday}{2}
@@ -970,8 +1213,8 @@
\list{organization}{1}{%
{GNU project}%
}
- \field{sortinit}{3}
- \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+ \field{sortinit}{4}
+ \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{GNU Libmicrohttpd}
\field{urlday}{2}
@@ -990,8 +1233,8 @@
\list{organization}{1}{%
{Dell EMC.}%
}
- \field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinit}{5}
+ \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labeltitlesource}{title}
\field{title}{Global Data Protection Index 2018 – Key Findings}
\field{urlday}{7}
@@ -1006,40 +1249,6 @@
\verb
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
\endverb
\endentry
- \entry{millions_lost}{online}{}
- \name{author}{1}{}{%
- {{hash=3648296958ad2ea0461fac7a13e12981}{%
- family={Cuthbertson},
- familyi={C\bibinitperiod},
- given={Anthony},
- giveni={A\bibinitperiod}}}%
- }
- \list{organization}{1}{%
- {INDEPENDENT}%
- }
- \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
- \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
- \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
- \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
- \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
- \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
- \field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
- \field{labelnamesource}{author}
- \field{labeltitlesource}{title}
- \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost'
after man dies with only password}
- \field{urlday}{7}
- \field{urlmonth}{3}
- \field{urlyear}{2020}
- \field{year}{2019}
- \field{urldateera}{ce}
- \verb{urlraw}
- \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
- \endverb
- \verb{url}
- \verb
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
- \endverb
- \endentry
\entry{forgot_my_pin}{online}{}
\name{author}{1}{}{%
{{hash=3690e6a925d190517dbba666878a6978}{%
@@ -1057,8 +1266,8 @@
\strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
\strng{authornamehash}{3690e6a925d190517dbba666878a6978}
\strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
- \field{sortinit}{4}
- \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+ \field{sortinit}{5}
+ \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in
Bitcoin}
diff --git a/doc/thesis/thesis.blg b/doc/thesis/thesis.blg
index d691ca6..94b9dd2 100644
--- a/doc/thesis/thesis.blg
+++ b/doc/thesis/thesis.blg
@@ -1,19 +1,19 @@
-[0] Config.pm:304> INFO - This is Biber 2.13
+[0] Config.pm:304> INFO - This is Biber 2.14 (beta)
[0] Config.pm:307> INFO - Logfile is 'thesis.blg'
-[23] biber:315> INFO - === Mi Jun 3, 2020, 14:34:23
-[36] Biber.pm:375> INFO - Reading 'thesis.bcf'
-[95] Biber.pm:905> INFO - Found 33 citekeys in bib section 0
-[108] Biber.pm:4196> INFO - Processing section 0
-[108] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
-[108] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to
bibliothek.bib
-[117] Biber.pm:4373> INFO - Looking for bibtex format file 'bibliothek.bib'
for section 0
-[119] bibtex.pm:1462> INFO - LaTeX decoding ...
-[157] bibtex.pm:1281> INFO - Found BibTeX data source 'bibliothek.bib'
-[238] Utils.pm:300> WARN - year field 'in print' in entry 'midata' is not an
integer - this will probably not sort properly.
-[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable =
shifted' with 'variable = non-ignorable'
-[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization
= NFD' with 'normalization = prenormalized'
-[311] Biber.pm:4024> INFO - Sorting list 'none/global//global/global' of type
'entry' with template 'none' and locale 'en-US'
-[311] Biber.pm:4030> INFO - No sort tailoring available for locale 'en-US'
-[329] bbl.pm:648> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
-[345] bbl.pm:751> INFO - Output to thesis.bbl
-[345] Biber.pm:110> INFO - WARNINGS: 1
+[68] biber:322> INFO - === Wed Jun 10, 2020, 22:18:34
+[80] Biber.pm:415> INFO - Reading 'thesis.bcf'
+[141] Biber.pm:943> INFO - Found 41 citekeys in bib section 0
+[153] Biber.pm:4256> INFO - Processing section 0
+[153] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
+[153] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to
bibliothek.bib
+[162] Biber.pm:4455> INFO - Looking for bibtex format file 'bibliothek.bib'
for section 0
+[163] bibtex.pm:1653> INFO - LaTeX decoding ...
+[200] bibtex.pm:1471> INFO - Found BibTeX data source 'bibliothek.bib'
+[350] Utils.pm:293> WARN - year field 'in print' in entry 'midata' is not an
integer - this will probably not sort properly.
+[394] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization
= NFD' with 'normalization = prenormalized'
+[394] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable =
shifted' with 'variable = non-ignorable'
+[394] Biber.pm:4084> INFO - Sorting list 'none/global//global/global' of type
'entry' with template 'none' and locale 'en-US'
+[394] Biber.pm:4090> INFO - No sort tailoring available for locale 'en-US'
+[419] bbl.pm:652> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
+[431] bbl.pm:755> INFO - Output to thesis.bbl
+[431] Biber.pm:128> INFO - WARNINGS: 1
diff --git a/doc/thesis/thesis.run.xml b/doc/thesis/thesis.run.xml
index f9576b8..6c8325d 100644
--- a/doc/thesis/thesis.run.xml
+++ b/doc/thesis/thesis.run.xml
@@ -41,7 +41,7 @@
>
]>
<requests version="1.0">
- <internal package="biblatex" priority="9" active="1">
+ <internal package="biblatex" priority="9" active="0">
<generic>latex</generic>
<provides type="dynamic">
<file>thesis.bcf</file>
@@ -65,7 +65,7 @@
<file>american.lbx</file>
</requires>
</internal>
- <external package="biblatex" priority="5" active="1">
+ <external package="biblatex" priority="5" active="0">
<generic>biber</generic>
<cmdline>
<binary>biber</binary>
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [taler-anastasis] branch master updated: assumptions are a bad thing, support for scenarios is a good thing...,
gnunet <=