You are here: Resources > FIDIS Deliverables > Forensic Implications > D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research > 

D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research

Towards combating the same thing  Title:



Acquisti, A., (2002). Privacy and Security of Personal Information: Economic Incentives and Technological Solutions, SIMS Workshop on Economics and Information Security, May 2002.

Anderson, R. (2001). Why information security is hard – An economic perspective,

Baecker, D. (1999). Organisation als System; Suhrkamp, Frankfurt am Main.

Ben-Ner, A. and Putterman, L. (2002). Trust in the New Economy, HRRI Working Paper 11-02, University of Minnesota, Industrial Relations Centre

Brickell, Ernest F., Jan Camenisch, Liqun Chen (2004). Direct anonymous attestation. ACM Conference on Computer and Communications Security, pp 132-145 

Camenisch, Jan, Anna Lysyanskaya (2001). An Efficient System for Non-transferable, Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT, pp. 93-118 

Camenisch, Jan, Anna Lysyanskaya (2000). Efficient Non-transferable Anonymous Multi-show Credential System with Optional Anonymity Revocation, Research Report RZ 3295 (#93341), IBM Research, November 2000. 

Camenisch, Jan, Els Van Herreweghen (2002). Design and implementation of the idemix anonymous credential system. ACM Conference on Computer and communications, Security, pp. 21-30

Cate, F. H. and Staten, M. E. (1999). Putting people first: Consumer benefits of information sharing, National Retail Foundation.

CIFAS, (2004). CIFASThe UK’s Fraud Prevention Service, Brussels, EU Forum for the Prevention of Organised Crime, 2 February 2004.

Chapman, T. (2004). Credit Reporting, Identity Theft and Privacy: Truth and Consequences, Equifax Inc. Atlanta, Georgia, April 7, 2004

David Chaum (1981). Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, 24/2, pp 84-88.

Chaum, David (1985). Security without Identification: Transaction Systems to make Big Brother Obsolete, Communications of the ACM, 28/10, pp 1030-1044.

Chaum, David (1990). Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt ‘90, LNCS 453, Springer, Berlin, pp 246-264.

Clarke, R. (1997). Chip-based ID: promise or peril. Proc. International conference on Privacy. Montrel, September, 1997. This paper is available at Roger.Clarke/DV/IDCards97.html

DIN 31000 (1979). DIN 31000 (VDE 1000): 1979-03 Allgemeine Leitsätze für das Sicherheitsgerichtete Gestalten technischer Erzeugnisse. DKE Deutsche Kommission Elektrotechnik Elektronik Informationstechnik im DIN und VDE.

Ellison, C., Schneier, B. (2000). Ten Risk of PKI: What You’re Not Being Told About Public Key Infrastructure, Computer Security Journal, vol. 16 (1), pp 1-7,  See

Elston, M.J., Stein, S.A. (2002), International cooperation in on-line identity theft investigations: a hopeful future but a frustrating present, see %20and%20Stein.pdf.

Federal Trade Commission, (2000). Privacy Online: Fair Information Practices in the Electronic Marketplace, May 2000

Freyssinet, E. (2004). IT Forensic analyses & identity issues. Internal FIDIS workshop on Identity & Crime. IPTS organization. Fontainebleau, December 9th, 2004.

Frosch-Wilke, D. (2001). Are e-privacy and e-commerce a contradiction in terms? - an economic examination, Informing Science - Challenges to Informing Clients.

FTC (2005). National and State Trends in Fraud & Identity Theft, Federal Trade Commission, February 2005.

Freud, S. (1978). Das Ich und das Es und andere metapsychologische Schriften; Fischer, Frankfurt am Main

Grijpink, J. (2003). Identiteitsfraude als uitdaging voor de rechtstaat [Identity Fraud as a Challenge to the Rule of Law], Privacy & Informatie, August 2003, pp 148ff. [translation of the definition: Bert-Jaap Koops]

Gordon, G.R., Willox, N.A. (2003). Identity Fraud: A Critical National and Global Threat, Utica;

ITRC, (2003). Identity theft: THE AFTERMATH 2003, Identity Theft Resource Center, Summer 2003.

Kent, S.T., Millett, L.I. (ed.) (2001). Who goes there? Authentication through the Lens of Privacy, Washington, D.C., pp 80-103.

Kieserling, A. (2000). Kommunikation unter Anwesenden – Studien über Interaktions-systeme; Frankfurt am Main.

Tadayoshi Kohno, Andre Broido, K.C. Claffy (2005). Remote Physical Device Fingerprinting, IEEE Transactions on Dependable and Secure Computing, 2 (2), April 2005, pp 93-108.

Levi, M. (2004). The Social Impact of ID Theft/Fraud: Challenges & Responsibilities, Brussels, EU Forum for the Prevention of Organised Crime, 2 February 2004.

Lindlau, D. (1987). Der Mob: Recherchen zum organisierten Verbrechen, pp 43-47, Verlag Hoffmann und Kampe, Hamburg.

Linnartz, J.P., Tuyls, P. (2003). New shielding functions to enhance privacy and prevent misuse of biometric templates, 4th International Conference on Audio-and Video-Based Biometric Person Authentication.

Litan, A (2004). Phishing Victims Likely Will Suffer Identity Theft Fraud, Gartner Analyst Report,

Luhmann, N. (1991). Die Form ‘Person’, in: Soziale Welt; 42. Jg., Heft 2, p. 167-175.

Luhmann, N. (1997). Die Gesellschaft der Gesellschaft; 1st Edition; Suhrkamp, Frankfurt am Main.

Luhmann, N. (2000). Organisation und Entscheidung; 1st Edition; Westdeutscher Verlag, Opladen/Wiesbaden.

Mead, G.H. (1934). Mind, Self and Society, Chicago Press.

Matsumoto, T et. al. (2002). Impact of Artificial ‘Gummy’ Fingers on Fingerprint Systems, Proceedings of SPIE, Vol. 4677, January 2002

Menezes, Alfred J., Paul C. van Oorschot, Scott A. Vanstone (1997). Handbook of Applied Cryptography, CRC Press.

Mitchison, N., Wilikens, M., Breitbach, L., Urry, R., and Portesi, S. (2004). Identity Theft - A Discussion Paper, Technical Report EUR 21098 EN, European Commission - Joint Research Center.

Perl, M. (2003). It’s Not Always About the Money: Why the State Identity Theft Laws Fail To Adequately Address Criminal Record Identity Theft, Journal of Criminal Law and Criminology, Fall 2003, p. 169-208.

Pfitzmann, Andreas (2005). Security in IT Networks: Multilateral Security in Distributed and by Distributed Systems, Script; Dresden,

Pfitzmann, Andreas, Marit Hansen (2006). Unobservability, and Pseudonymity - A Proposal for Terminology, Version 0.27 at v0.27.pdf.

Potter E.J. (2002). Customer Authentication: The Evolution of Signature Verification in Financial Institutions, Journal of Economic Crime Management, Volume 1, Issue 1, Summer 2002.

Putte, Ton van der, Keuning, Jeroen (2000). Biometrical fingerprint recognition: don’t get your fingers burned, Proc. IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, Kluwer Academic Publishers, pp 289-303.

Rabin, M. and O’Donoghue, T. (2000). The Economics of Immediate Gratification, Journal of Behavioral Decision Making, 13(2), 233-250.

Ruuskanen, J.P. (2000). “Javacard”, SeminarJini and Advanced Features of Java at the department of computer science, University of Helsinki. This communication is available at

Sood, K. (2004). The UK Experience – What Measures are being taken and considered to combat identity fraud?, Brussels, EU Forum for the Prevention of Organised Crime, 2 February 2004.

Stubblebine, Stuart & Paul Syverson (2000). Authentic Attributes with Fine-Grained Anonymity Protection; Financial Cryptography, LNCS Series, Springer, Berlin.

Synovate, (2003). Identity Theft Survey Report., Technical report, Federal Trade Commission.

Thalheim, L., J. Krissler (2002). Body Check: Biometric Access Protection Devices and their Programs Put to the Test, CT Magazine, November 2002.

Tiné, S. (2004). Identity theft: a new threat for civil society, Brussels, EU Forum for the Prevention of Organised Crime, 2 February 2004.

UK Cabinet Office (2002). Identity Fraud: a Study, London.

Willox, N.A. (2000). Identity Theft: Authentication As A Solution, National Fraud Center, Inc. March 2000

Wright, T. (1994). Privacy Protection Makes Good Business Sense, Technical report, Information and Privacy Commissioner/Ontario.

Zuccato, A. (2004a). Holistic security requirement engineering for electronic commerce, Computers & Security, vol 23, issue 1, pp 63 - 76.

Zuccato, A. (2004b). Introducing privacy risks in a companies information system security risk analysis, In Duquenoy, P., Fischer-Hübner, S., Holvast, J., Rasmussen, L., and Zuccato, A., (eds), Proceeding for IFIP Summer School “Risk and Challenges of the Network Society”. IFIP WG 9.2, 9.6/11.7.





Towards combating the same thing  fidis-wp5-del5.2b.ID-related_crime_03.sxw  Annex
Denis Royer 42 / 44