\relax 
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax 
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\citation{0-abs:privacy_preserving_electronic_petitions}
\citation{0-abs:daa_protocol}
\@writefile{toc}{\contentsline {chapter}{Contents}{9}{Doc-Start}}
\citation{0-abs:privacy_preserving_electronic_petitions}
\citation{4:smartcard}
\citation{4:smartcardtech}
\citation{4:belgian-eid}
\citation{4:seek-for-android}
\citation{4:chicago-jc}
\citation{4:blogjc}
\citation{Helpforsure}
\@writefile{toc}{\contentsline {chapter}{List of Figures}{13}{Doc-Start}}
\citation{IBM_software:information_centre}
\citation{6:linux-journal}
\citation{Android_Developers}
\@writefile{toc}{\contentsline {chapter}{List of Tables}{15}{Doc-Start}}
\@writefile{toc}{\contentsline {chapter}{List of Abbreviations}{17}{Doc-Start}}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Introduction}{19}{chapter.1}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:introduction}{{1}{19}{Introduction\relax }{chapter.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Motivation of the thesis}{19}{section.1.1}}
\newlabel{sec:motivationof the thesis}{{1.1}{19}{Motivation of the thesis\relax }{section.1.1}{}}
\citation{0-abs:privacy_preserving_electronic_petitions}
\citation{0-abs:privacy_preserving_electronic_petitions}
\@writefile{lof}{\contentsline {figure}{\numberline {1.1}{\ignorespaces E-petition system architecture and protocols, from ``Privacy preseving electronic petitions'' \cite  {0-abs:privacy_preserving_electronic_petitions}}}{20}{figure.1.1}}
\newlabel{fig:esquema}{{1.1}{20}{E-petition system architecture and protocols, from ``Privacy preseving electronic petitions'' \cite {0-abs:privacy_preserving_electronic_petitions}\relax }{figure.1.1}{}}
\citation{0-abs:daa_protocol}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Goals of the thesis}{21}{section.1.2}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Structure of the thesis}{21}{section.1.3}}
\citation{2-ep:scottish}
\citation{2-ep:queensland}
\citation{2-ep:germany}
\citation{2-ep:housecommons}
\citation{2-ep:british-prime-minister}
\citation{2-ep:european-parliament}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Electronic Petitions}{23}{chapter.2}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Electronic Petitions}{{2}{23}{Electronic Petitions\relax }{chapter.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Introduction}{23}{section.2.1}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Historic frame}{23}{section.2.2}}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Security challenges}{24}{section.2.3}}
\@writefile{toc}{\contentsline {section}{\numberline {2.4}Legal background}{25}{section.2.4}}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}DAA protocol}{27}{chapter.3}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:DAA protocol}{{3}{27}{DAA protocol\relax }{chapter.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}Notation}{27}{section.3.1}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Abstract Algebra}{28}{section.3.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.1}Groups}{28}{subsection.3.2.1}}
\newlabel{3:binary_operation}{{3.2.1}{28}{Groups\relax }{subsection.3.2.1}{}}
\newlabel{3:group}{{3.2.1}{28}{Groups\relax }{subsection.3.2.1}{}}
\newlabel{3:subgroup}{{3.2.1}{29}{Groups\relax }{Item.21}{}}
\newlabel{3:euler-phi-function}{{3.2.1}{29}{Groups\relax }{Item.21}{}}
\newlabel{3:integers-mod-n}{{3.2.1}{29}{Groups\relax }{Item.24}{}}
\newlabel{3:multiplicative-inverse}{{3.2.1}{29}{Groups\relax }{Item.24}{}}
\newlabel{3:division}{{3.2.1}{29}{Groups\relax }{Item.24}{}}
\newlabel{3:multiplicative-group}{{3.2.1}{29}{Groups\relax }{Item.24}{}}
\newlabel{3:order}{{3.2.1}{30}{Groups\relax }{Item.24}{}}
\newlabel{3:generator}{{3.2.1}{30}{Groups\relax }{Item.24}{}}
\newlabel{3:quadratic-residue}{{3.2.1}{30}{Groups\relax }{Item.24}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2.2}Strong RSA Assumption}{30}{subsection.3.2.2}}
\newlabel{3:RSA-modulus}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\newlabel{3:RSA-modulus}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\newlabel{3:RSA-assumption}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\newlabel{3:safe-prime}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\newlabel{3:Sepecial-RSA-modulus}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\newlabel{3:Strong-RSA-assumption}{{3.2.2}{30}{Strong RSA Assumption\relax }{subsection.3.2.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Signature Schemes}{30}{section.3.3}}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}Commitment schemes}{31}{section.3.4}}
\newlabel{3-comschemes}{{3.4}{31}{Commitment schemes\relax }{section.3.4}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Non-interactive commitment scheme'}}{33}{figure.3.1}}
\newlabel{fig:3-commitment}{{3.1}{33}{Non-interactive commitment scheme'\relax }{figure.3.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Zero knowledge proofs}{33}{section.3.5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}ZK proofs about discrete logarithms}{34}{subsection.3.5.1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.5.1.1}Schnorr protocol}{34}{subsubsection.3.5.1.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Schnorr protocol}}{35}{figure.3.2}}
\newlabel{3-schnorr}{{3.2}{35}{Schnorr protocol\relax }{figure.3.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.5.1.2}The Schnorr protocol based on the group $QR_n$}{35}{subsubsection.3.5.1.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Schnorr protocol based on the group $QR_n$}}{36}{figure.3.3}}
\newlabel{3-schnorr-qr}{{3.3}{36}{Schnorr protocol based on the group $QR_n$\relax }{figure.3.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Anonymous credentials}{36}{section.3.6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Camenisch-Lysyanskaya signature}{37}{subsection.3.6.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.2}Camenisch-Lysyanskaya anonymous credential scheme}{38}{subsection.3.6.2}}
\@writefile{toc}{\contentsline {section}{\numberline {3.7}Simplified DAA protocol}{38}{section.3.7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.1}Introduction}{38}{subsection.3.7.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Architecture of DAA scheme}}{39}{figure.3.4}}
\newlabel{3-daa-scheme}{{3.4}{39}{Architecture of DAA scheme\relax }{figure.3.4}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.7.1.1}Pseudonyms}{40}{subsubsection.3.7.1.1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.7.1.2}Secret value}{40}{subsubsection.3.7.1.2}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.7.1.3}Signature}{40}{subsubsection.3.7.1.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.7.2}Final design}{41}{subsection.3.7.2}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.7.2.1}Key generation}{41}{subsubsection.3.7.2.1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.7.2.2}Join protocol}{42}{subsubsection.3.7.2.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces DAA's Join Protocol}}{42}{figure.3.5}}
\newlabel{3-join-protocol}{{3.5}{42}{DAA's Join Protocol\relax }{figure.3.5}{}}
\citation{4:smartcard}
\citation{4:smartcard}
\citation{4:eurosmart}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}SmartCard}{45}{chapter.4}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:SmartCard}{{4}{45}{SmartCard\relax }{chapter.4}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}Introduction}{45}{section.4.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces Example of a typical Smart Card. Figure taken from Pallisade, Application Security Intelligence \cite  {4:smartcard}}}{45}{figure.4.1}}
\newlabel{fig:4-smart-cards}{{4.1}{45}{Example of a typical Smart Card. Figure taken from Pallisade, Application Security Intelligence \cite {4:smartcard}\relax }{figure.4.1}{}}
\citation{4:sd-association}
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Picture of a micro SD card.}}{46}{figure.4.2}}
\newlabel{fig:4-micro-sd}{{4.2}{46}{Picture of a micro SD card}{figure.4.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Types of Smart Card}{47}{section.4.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.1}Memory Cards}{47}{subsection.4.2.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.2}Microprocessor cards}{47}{subsection.4.2.2}}
\citation{4:smartcardtech}
\citation{4:smartcardtech}
\citation{4:iso7814}
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Elements of a smart card}{48}{section.4.3}}
\newlabel{fig:4-architecture}{{4.3}{48}{Elements of a smart card\relax }{section.4.3}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Architecture of a Smart Card. Figure taken from SmartCardTech \cite  {4:smartcardtech}}}{48}{figure.4.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}Smart card file system}{49}{subsection.4.3.1}}
\newlabel{fig:4-file_structure}{{4.3.1}{49}{Smart card file system\relax }{subsection.4.3.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces Smart Card file system}}{49}{figure.4.4}}
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Multiapplication smart card}{49}{section.4.4}}
\citation{4:iso7816-5}
\citation{4:globalplatform}
\citation{4:multos}
\citation{4:basiccard}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4.1}Application Identifier}{50}{subsection.4.4.1}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Global Platforms}{50}{section.4.5}}
\citation{4:gsm}
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Data Transmission}{51}{section.4.6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.1}Transmission protocols: ``T=0'' and ``T=1''}{51}{subsection.4.6.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.2}Application protocol data unit }{51}{subsection.4.6.2}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.2.1}Command APDU's}{51}{subsubsection.4.6.2.1}}
\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Structure of Command-APDU}}{52}{table.4.1}}
\newlabel{tab:command-apu}{{4.1}{52}{Structure of Command-APDU\relax }{table.4.1}{}}
\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Fields of Command-APDU}}{52}{table.4.2}}
\newlabel{tab:fields-command-apdu}{{4.2}{52}{Fields of Command-APDU\relax }{table.4.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.6.2.2}Response APDU}{52}{subsubsection.4.6.2.2}}
\@writefile{lot}{\contentsline {table}{\numberline {4.3}{\ignorespaces Structure of Response-APDU}}{52}{table.4.3}}
\newlabel{tab:response-apu}{{4.3}{52}{Structure of Response-APDU\relax }{table.4.3}{}}
\@writefile{lot}{\contentsline {table}{\numberline {4.4}{\ignorespaces Table of the most important Smart Card return codes}}{53}{table.4.4}}
\newlabel{tab:return-code}{{4.4}{53}{Table of the most important Smart Card return codes\relax }{table.4.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6.3}Logic channels}{53}{subsection.4.6.3}}
\citation{4:belgian-eid}
\citation{4:belgian-eid}
\citation{4:national_register}
\@writefile{toc}{\contentsline {section}{\numberline {4.7}Belgium eID Card}{54}{section.4.7}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.7.1}Card Descrption}{54}{subsection.4.7.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Belgian eID card's visual aspects. Figure taken from The Belgian Electronic Identity Card, Danny De Cock, Christopher Wolf, and Bart Preneel \cite  {4:belgian-eid}}}{54}{figure.4.5}}
\newlabel{4:belgiun-eid}{{4.5}{54}{Belgian eID card's visual aspects. Figure taken from The Belgian Electronic Identity Card, Danny De Cock, Christopher Wolf, and Bart Preneel \cite {4:belgian-eid}\relax }{figure.4.5}{}}
\citation{4:seek-for-android}
\citation{4:seek-for-android}
\citation{4:seek-for-android}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces eID for Android Application screenshot. Figure taken from Seek for Android project \cite  {4:seek-for-android}}}{55}{figure.4.6}}
\newlabel{4:eid-android}{{4.6}{55}{eID for Android Application screenshot. Figure taken from Seek for Android project \cite {4:seek-for-android}\relax }{figure.4.6}{}}
\citation{4:ssl}
\citation{4:.jc_specification}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.7.2}Cryptographic Details}{56}{subsection.4.7.2}}
\@writefile{toc}{\contentsline {section}{\numberline {4.8}Java Card}{56}{section.4.8}}
\newlabel{section_smartcard}{{4.8}{56}{Java Card\relax }{section.4.8}{}}
\citation{4:chicago-jc}
\citation{4:chicago-jc}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.1}Java Card JVM}{57}{subsection.4.8.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.7}{\ignorespaces Java Card Virtual Machine architecture. Figure taken from People UChicago, ``Java Cards'', \cite  {4:chicago-jc}}}{58}{figure.4.7}}
\newlabel{4:parts-jcvm}{{4.7}{58}{Java Card Virtual Machine architecture. Figure taken from People UChicago, ``Java Cards'', \cite {4:chicago-jc}\relax }{figure.4.7}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.2}Java Card Applet}{58}{subsection.4.8.2}}
\citation{4:blogjc}
\citation{4:blogjc}
\@writefile{lof}{\contentsline {figure}{\numberline {4.8}{\ignorespaces Applet development and deployment. Figure taken from Its Shakthydoss, ``Technical Blog'', \cite  {4:blogjc}}}{59}{figure.4.8}}
\newlabel{4:blog-jc}{{4.8}{59}{Applet development and deployment. Figure taken from Its Shakthydoss, ``Technical Blog'', \cite {4:blogjc}\relax }{figure.4.8}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.9}{\ignorespaces Lifecycle of the Applet}}{60}{figure.4.9}}
\newlabel{fig:applet_lifecycle}{{4.9}{60}{Lifecycle of the Applet\relax }{figure.4.9}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.8.3}Security and visibility}{60}{subsection.4.8.3}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.8.3.1}Package javacard.security}{60}{subsubsection.4.8.3.1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.8.3.2}Package javacardx.crypto}{61}{subsubsection.4.8.3.2}}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Secure Socket Layer}{63}{chapter.5}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Secure Socket Layer}{{5}{63}{Secure Socket Layer\relax }{chapter.5}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.1}Description}{63}{section.5.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces SSL protocol in OSI model}}{64}{figure.5.1}}
\newlabel{fig:ssl_layer}{{5.1}{64}{SSL protocol in OSI model\relax }{figure.5.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.2}Operation}{64}{section.5.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces SSL handshake}}{65}{figure.5.2}}
\newlabel{fig:ssl_handhakle}{{5.2}{65}{SSL handshake\relax }{figure.5.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {5.3}Digital certificates}{66}{section.5.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}X.509 certificates}{66}{subsection.5.3.1}}
\citation{Helpforsure}
\citation{Helpforsure}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}Elements of a X.509 v3 certificate}{67}{subsection.5.3.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {5.3}{\ignorespaces Structure of a x.509 certificate. Figure taken from the site: Helpforsure: Microsoft Windows Experts \cite  {Helpforsure}}}{67}{figure.5.3}}
\newlabel{fig:certificate-x509-structure}{{5.3}{67}{Structure of a x.509 certificate. Figure taken from the site: Helpforsure: Microsoft Windows Experts \cite {Helpforsure}\relax }{figure.5.3}{}}
\citation{IBM_software:information_centre}
\citation{IBM_software:information_centre}
\@writefile{lof}{\contentsline {figure}{\numberline {5.4}{\ignorespaces Example of a x.509 certificate. Figure taken from IBM: Software Information Centre \cite  {IBM_software:information_centre}}}{69}{figure.5.4}}
\newlabel{fig:certificate-example}{{5.4}{69}{Example of a x.509 certificate. Figure taken from IBM: Software Information Centre \cite {IBM_software:information_centre}\relax }{figure.5.4}{}}
\citation{6:linux-journal}
\@writefile{toc}{\contentsline {chapter}{\numberline {6}Google Android}{71}{chapter.6}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Google Android}{{6}{71}{Google Android\relax }{chapter.6}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.1}What is Android?}{71}{section.6.1}}
\@writefile{toc}{\contentsline {section}{\numberline {6.2}Android architecture}{71}{section.6.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}Linux Kernel}{71}{subsection.6.2.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}Core Libraries}{71}{subsection.6.2.2}}
\citation{6:symbian}
\citation{6:apple}
\citation{6:dalvik}
\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Android architecture. From Linux Journal \cite  {6:linux-journal}}}{72}{figure.6.1}}
\newlabel{fig:Android architecture}{{6.1}{72}{Android architecture. From Linux Journal \cite {6:linux-journal}\relax }{figure.6.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}Dalv\IeC {\'\i }k Virtual Machine}{72}{subsection.6.2.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.4}Libraries}{72}{subsection.6.2.4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.5}Application framework}{73}{subsection.6.2.5}}
\@writefile{toc}{\contentsline {section}{\numberline {6.3}Android SDK}{73}{section.6.3}}
\@writefile{toc}{\contentsline {section}{\numberline {6.4}Functionalities used in the project}{73}{section.6.4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}Browser pop-up}{73}{subsection.6.4.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.2}{\ignorespaces Browsing the e-petitions page and selecting a petition}}{74}{figure.6.2}}
\newlabel{fig:pick-petition}{{6.2}{74}{Browsing the e-petitions page and selecting a petition\relax }{figure.6.2}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.4.1.1}Intents}{74}{subsubsection.6.4.1.1}}
\citation{Jayway}
\@writefile{lof}{\contentsline {figure}{\numberline {6.3}{\ignorespaces Pop-up window for selecting the application to use}}{75}{figure.6.3}}
\newlabel{fig:browser-signer}{{6.3}{75}{Pop-up window for selecting the application to use\relax }{figure.6.3}{}}
\citation{6:android:tether}
\citation{6:gd}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {6.1}Information carried by the intent received from the Browser}{76}{lstlisting.6.1}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {6.2}Definition of Intent Filters in AndroidManisfest.xml}{76}{lstlisting.6.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}Android Wi-Fi Tether}{76}{subsection.6.4.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {6.4}{\ignorespaces  Android Wireless Tether}}{77}{figure.6.4}}
\newlabel{fig:Android Thether}{{6.4}{77}{Android Wireless Tether\relax }{figure.6.4}{}}
\@writefile{toc}{\contentsline {section}{\numberline {6.5}Smart cards in Android}{77}{section.6.5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.5.1}Development Kit's modules}{77}{subsection.6.5.1}}
\citation{6:pcsc}
\citation{6:linux-mid}
\citation{6:secu-sma}
\@writefile{lof}{\contentsline {figure}{\numberline {6.5}{\ignorespaces Overview of the modules}}{78}{figure.6.5}}
\newlabel{fig:Smartcard architecture}{{6.5}{78}{Overview of the modules\relax }{figure.6.5}{}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.5.1.1}Smartcard API}{78}{subsubsection.6.5.1.1}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.5.1.2}PC/SC lite}{78}{subsubsection.6.5.1.2}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {6.5.1.3}MSC IFD Handler}{78}{subsubsection.6.5.1.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.5.2}Security Considerations}{79}{subsection.6.5.2}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {6.3}Smart card access permission in AndroidManisfest.xml}{79}{lstlisting.6.3}}
\@writefile{toc}{\contentsline {chapter}{\numberline {7}Designing an ePetitioning system with SmartCard Support}{81}{chapter.7}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Designing an ePetitioning system with SmartCard Support}{{7}{81}{Designing an ePetitioning system with SmartCard Support\relax }{chapter.7}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.1}Building up the system}{81}{section.7.1}}
\@writefile{toc}{\contentsline {section}{\numberline {7.2}Overview of main operation}{82}{section.7.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.1}{\ignorespaces Getting a credential}}{83}{figure.7.1}}
\newlabel{fig:7:getcred}{{7.1}{83}{Getting a credential\relax }{figure.7.1}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {7.2}{\ignorespaces Signing a petition}}{83}{figure.7.2}}
\newlabel{fig:7:sign}{{7.2}{83}{Signing a petition\relax }{figure.7.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {7.3}Implementation}{84}{section.7.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.1}Credential Issuer}{84}{subsection.7.3.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.2}Petition Server}{84}{subsection.7.3.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.3}Host}{84}{subsection.7.3.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.3.4}Smart card applet}{84}{subsection.7.3.4}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {7.3.4.1}Configuring Tomcat}{84}{subsubsection.7.3.4.1}}
\@writefile{toc}{\contentsline {chapter}{\numberline {A}Android Applications}{85}{chapter.1}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Android Applications}{{A}{85}{Android Applications\relax }{chapter.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {A.1}Application components}{85}{section.1.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.1.1}Activity}{85}{subsection.1.1.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.1.2}Service}{86}{subsection.1.1.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.1.3}BroadcastReceiver}{86}{subsection.1.1.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.1.4}ContentProvider}{86}{subsection.1.1.4}}
\@writefile{toc}{\contentsline {section}{\numberline {A.2}Types of application}{87}{section.1.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.2.1}Task}{87}{subsection.1.2.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.2.2}Process}{87}{subsection.1.2.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {A.2.3}Thread}{87}{subsection.1.2.3}}
\@writefile{toc}{\contentsline {section}{\numberline {A.3}Android Manifests}{88}{section.1.3}}
\@writefile{toc}{\contentsline {section}{\numberline {A.4}Application Lifecycle}{88}{section.1.4}}
\citation{Android_Developers}
\@writefile{lof}{\contentsline {figure}{\numberline {A.1}{\ignorespaces Application lifecycle. From Android Developers \cite  {Android_Developers}}}{90}{figure.1.1}}
\newlabel{fig:Activity lifecycle}{{A.1}{90}{Application lifecycle. From Android Developers \cite {Android_Developers}\relax }{figure.1.1}{}}
\@writefile{toc}{\contentsline {chapter}{\numberline {B}Bouncy Castle}{91}{chapter.2}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha:Bouncy Castle}{{B}{91}{Bouncy Castle\relax }{chapter.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}Security providers}{91}{section.2.1}}
\@writefile{toc}{\contentsline {section}{\numberline {B.2}Bouncy Castle main features}{92}{section.2.2}}
\@writefile{toc}{\contentsline {chapter}{\numberline {C}How to set a client/server authenticated channel}{93}{chapter.3}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\newlabel{cha: Tomcat}{{C}{93}{How to set a client/server authenticated channel\relax }{chapter.3}{}}
\@writefile{toc}{\contentsline {section}{\numberline {C.1}What is Tomcat?}{93}{section.3.1}}
\@writefile{toc}{\contentsline {section}{\numberline {C.2}Directories}{93}{section.3.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.1}{\ignorespaces Default Tomcat home page}}{94}{figure.3.1}}
\newlabel{fig:tomcat}{{C.1}{94}{Default Tomcat home page\relax }{figure.3.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {C.3}Server.xml}{94}{section.3.3}}
\@writefile{toc}{\contentsline {section}{\numberline {C.4}Setting up a HTTPS connection}{95}{section.3.4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {C.4.1}Tomcat's connector}{95}{subsection.3.4.1}}
\@writefile{lol}{\contentsline {lstlisting}{\numberline {C.1}Definition of the Connector of the port 8443 for establishing a HTTPS connection}{95}{lstlisting.3.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {C.4.2}Host}{96}{subsection.3.4.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {C.4.3}Generation and issuing of certificates}{96}{subsection.3.4.3}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.2}{\ignorespaces Creation of server's keystore}}{97}{figure.3.2}}
\newlabel{fig:b1}{{C.2}{97}{Creation of server's keystore\relax }{figure.3.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.3}{\ignorespaces Exporting a server's public certificate}}{97}{figure.3.3}}
\newlabel{fig: b2}{{C.3}{97}{Exporting a server's public certificate\relax }{figure.3.3}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.4}{\ignorespaces Creation of client's keystore}}{98}{figure.3.4}}
\newlabel{fig:b3}{{C.4}{98}{Creation of client's keystore\relax }{figure.3.4}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.5}{\ignorespaces Setting a client's self signed certificate}}{98}{figure.3.5}}
\newlabel{fig:b4}{{C.5}{98}{Setting a client's self signed certificate\relax }{figure.3.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.6}{\ignorespaces Exporting a server's public certificate}}{98}{figure.3.6}}
\newlabel{fig:b5}{{C.6}{98}{Exporting a server's public certificate\relax }{figure.3.6}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.7}{\ignorespaces Importing client's public certificate in server's truststore}}{99}{figure.3.7}}
\newlabel{fig:b6}{{C.7}{99}{Importing client's public certificate in server's truststore\relax }{figure.3.7}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.8}{\ignorespaces Importing server's public certificate in client's truststore}}{99}{figure.3.8}}
\newlabel{fig:b7}{{C.8}{99}{Importing server's public certificate in client's truststore\relax }{figure.3.8}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {C.9}{\ignorespaces Server's stored certificates}}{99}{figure.3.9}}
\newlabel{fig:b8}{{C.9}{99}{Server's stored certificates\relax }{figure.3.9}{}}
\bibstyle{unstr}
\@writefile{lof}{\contentsline {figure}{\numberline {C.10}{\ignorespaces Client's stored certificates}}{100}{figure.3.10}}
\newlabel{fig:b9}{{C.10}{100}{Client's stored certificates\relax }{figure.3.10}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {C.4.4}Belgian electronic identity card's certificates}{100}{subsection.3.4.4}}
\bibcite{0-abs:privacy_preserving_electronic_petitions}{1}
\bibcite{0-abs:daa_protocol}{2}
\bibcite{network_ilustrated}{3}
\bibcite{2-ep:scottish}{4}
\bibcite{2-ep:queensland}{5}
\bibcite{2-ep:germany}{6}
\bibcite{2-ep:housecommons}{7}
\bibcite{2-ep:british-prime-minister}{8}
\bibcite{2-ep:european-parliament}{9}
\bibcite{3:cave_example}{10}
\bibcite{4:smartcard}{11}
\bibcite{4:eurosmart}{12}
\@writefile{toc}{\contentsline {chapter}{Bibliography}{101}{subsection.3.4.4}}
\bibcite{4:sd-association}{13}
\bibcite{4:smartcardtech}{14}
\bibcite{4:iso7814}{15}
\bibcite{4:iso7816-5}{16}
\bibcite{4:globalplatform}{17}
\bibcite{4:multos}{18}
\bibcite{4:basiccard}{19}
\bibcite{4:gsm}{20}
\bibcite{4:belgian-eid}{21}
\bibcite{4:national_register}{22}
\bibcite{4:seek-for-android}{23}
\bibcite{4:ssl}{24}
\bibcite{4:.jc_specification}{25}
\bibcite{4:chicago-jc}{26}
\bibcite{4:blogjc}{27}
\bibcite{Android_Developers}{28}
\bibcite{6:symbian}{29}
\bibcite{6:apple}{30}
\bibcite{6:dalvik}{31}
\bibcite{6:linux-journal}{32}
\bibcite{Jayway}{33}
\bibcite{6:android:tether}{34}
\bibcite{6:gd}{35}
\bibcite{6:pcsc}{36}
\bibcite{6:linux-mid}{37}
\bibcite{6:secu-sma}{38}
\bibcite{Helpforsure}{39}
\bibcite{IBM_software:information_centre}{40}
