Showing 1 - 20 of 49

1

Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis
Akram, Raja Naeem ; Markantonakis, Konstantinos ; Mayes, Keith ; et al.
5th International Conference on New Technologies, Mobility and Security (NTMS)

Smart Cards AES HMAC Faculty of Science\Mathe... Research Groups and Cent... Java Cards
Academic journal
Save to List
2

On the security of Java Card platforms against hardware attacks
De la sécurité des plateformes Java Card face aux attaques matérielles

Barbu, Guillaume ; Oberthur Technologies ; Laboratoire Traitement et Communication de l'Information (LTCI) ; et al.
Cryptography and Security [cs.CR]. Telecom ParisTech, 2012. English. ⟨NNT : 2012-ENST-037⟩

Smartcards Hardware attacks Software attacks Combined attacks Countermeasures Cartes à puce
Dissertation/ Thesis
Save to List
3

Current directions in smart cards
Domingo-Ferrer, J. ; Hartel, P. H.
Computer Networks. 36:377-379

Standards Authentication SCS-Cybersecurity Electronic cash EWI-931 Cryptography
Academic journal
Save to List
4

The Software Infrastructure of a Java Card Based Security Platform for
Distributed Applications Serge ; Serge Chaumette ; Achraf Karray ; et al.
http://damien.sauveron.free.fr/publications/WOSIS2006.pdf.

Smart Cards Java Cards Distributed Systems
Academic journal
Save to List
5

A model-based approach to integrating security policies for embedded devices
Michael Mcdougall ; Rajeev Alur ; Carl A. Gunter ; et al.
http://www.cecs.uci.edu/~papers/emsoft0405/docs04/p211.pdf.

thematical Logic and For... Formal Languages General... Theory Verification Keywords Po... Model Based Design Smartcards
Academic journal
Save to List
6

Supervisors: Research Director Dr. Elena Trichina
In Smart Card Environment ; The Pennsylvania State University CiteSeerX Archives
http://www.cs.uku.fi/~khiouppe/masters.pdf.

bytecode verification smart cards Java cards Java Card Technology MAC codes constrained devices
Academic journal
Save to List
7

Integration of Java processor core JSM into SmartDev(ices)
Frank Golatowski ; Stephan Preuss ; Hagen Ploog ; et al.
http://wwwiuk.informatik.uni-rostock.de/~spr/SmartDev/SmartDevJSM_194-II.pdf.

Smart cards and hence Java Cards are a special category o...
Academic journal
Save to List
8

University authentication system based on Java card and digital X.509 certificate
Sánchez García, Sergio ; Ortega, María T.
IJCSI International Journal of Computer Science Issues, ISSN 1694-0814, 2012-07, Vol. 9, iss, No. 3
Archivo Digital UPM
Universidad Politécnica de Madrid

X.509 Certificate Informática Authentication PKI Telecomunicaciones Smart Cards
Academic journal
Save to List
9

Analysis of computational complexity for HT-based fingerprint alignment algorithms on java card environment
Mlambo, CS ; Shabalala, MB ; Nelwamondo, Fulufhelo V

Fingerprint alignment Java cards Hough transform Smart cards Time complexity
Conference
Save to List
10

Smart Card Research and Advanced Applications
Grimaud, Gilles ; Standaert, François-Xavier ; Université de Lille 1 ; et al.

RFID security RSA Embedded security Hash based cryptography Information security Java cards
Book
Save to List
11

A Model-Based Approach to Integrating Security Policies for Embedded Devices
McDougall, Michael ; Alur, Rajeev ; Gunter, Carl A
211 ; 219 ; 185 ; Departmental Papers (CIS) ; Proceedings of the Fourth ACM International Conference on Embedded Software (EMSOFT 2004) ; published

CPS Model-Based Design CPS Formal Methods policy integration model based design smartcards java cards
Conference
Save to List
12

On the security of Java Card platforms against hardware attacks ; De la sécurité des plateformes Java Card face aux attaques matérielles
Barbu, Guillaume ; Oberthur Technologies ; Laboratoire Traitement et Communication de l'Information (LTCI) ; et al.
https://theses.hal.science/tel-00798693 ; Cryptography and Security [cs.CR]. Telecom ParisTech, 2012. English. ⟨NNT : 2012-ENST-037⟩.

Smartcards Hardware attacks Software attacks Combined attacks Countermeasures Cartes à puce
Dissertation/ Thesis
Save to List
13

Some security problems raised by open multiapplication
Serge Chaumette ; Damien Sauveron ; The Pennsylvania State University CiteSeerX Archives
http://www.fi.muni.cz/~xvyborny/DMsouhrn/papers/java/chaumette_nordsec.pdf.

Smart Cards Java Cards Open Multiapplication Ca...
Academic journal
Save to List
15

Formal Languages
Michael Mcdougall ; Rajeev Alur ; Carl A. Gunter ; et al.
http://www.cis.upenn.edu/~alur/Emsoft04.pdf.

General Terms Design Theory Verification Keywords Policy Integration Model Based design
Academic journal
Save to List
16

A Grid of Java Cards to Deal with Security Demanding Application Domains
Eve Atallah ; Serge Chaumette ; Frank Darrigade ; et al.
http://damien.sauveron.free.fr/publications/e-smart05.pdf.

Java Cards Distributed Secure Envir... Security of Applications
Academic journal
Save to List
17

New Security Problems Raised by Open Multiapplication Smart Cards
Serge Chaumette ; Damien Sauveron ; The Pennsylvania State University CiteSeerX Archives
http://damien.sauveron.free.fr/publications/RR-133204.pdf.

Java Cards
Academic journal
Save to List
18

University Authentication System Based on Java Card and Digital X.509 Certificate
Maria Ortega ; Sergio Sánchez ; The Pennsylvania State University CiteSeerX Archives
http://www.ijcsi.org/papers/IJCSI-9-4-3-23-29.pdf.

Authentication Java Cards PKI Smart Cards X.509 Certificate
Academic journal
Save to List
19

Silná kryptografie na čipových kartách ; Strong Cryptography on Smart Cards
Konečný, Jakub ; Malina, Lukáš ; Burda, Karel

čipové karty Java karty Basic karty MultOS NET karty protokol PACE
Dissertation/ Thesis
Save to List
20

Moderní autentizace předmětem a znalostí ; Modern Token-based and Knowledge-based Authentication
Ševčík, Michal ; Malina, Lukáš ; Pust, Radim

Autentizace Asymetrická kryptografie... USB tokeny Čipové karty Java karty NET karty
Dissertation/ Thesis
Save to List

Filter