Results 11 to 20 of about 81,045 (237)
ECC programming in Java Card [PDF]
9 páginas, 3 figuras, 3 listingElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of el- liptic curves.
Gayoso Martínez, Víctor +1 more
core +3 more sources
Formalizing the safety of Java, the Java virtual machine, and Java card [PDF]
We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards. The conclusion is that although a lot of good work has been done, a more concerted effort is needed to build a coherent set of machine-readable formal models of the whole of Java and its ...
Pieter H. Hartel, Luc Moreau 0001
openaire +2 more sources
An Efficient Small Sized On-Card Verifier for Java Card [PDF]
Smart Card technology has been a promising one, because it can handle, protect and manage data within a small sized chip. Java card is the major platform for Smart card, because of its platform independence and secure mechanism. But as a limit of hardware, many functions of Java Virtual Machine are not supported.
Jeung-Bo Cho, Min-Soo Jung, Sung-Ik Jun
+4 more sources
Smart Tools for Java Cards [PDF]
This article describes a Java Card programming environment which to a large extent is generated from formal specifications of the syntax and semantics of Java Card, the JCRE (Java Card Runtime Environment), and the Java Card APIs. The resulting environment consists of a set of tightly integrated and somewhat smart tools, such as a Java specific ...
Attali, I. +4 more
openaire +2 more sources
A programming and a modelling perspective on the evaluation of Java card implementations [PDF]
Java Card Technology has provided a huge step forward in programming smart cards: from assembler to using a high level Object Oriented language. However, the authors have found some differences between the current Java Card version (2.1) and main stream ...
E. Denney +15 more
core +2 more sources
Anonymous credentials on a standard java card [PDF]
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time user-centric identity management gains acceptance. Anonymous credential schemes are the optimal realization of user-centricity. However, on inexpensive hardware platforms, typically used for eID cards, these schemes could not be made to meet the ...
Bichsel P. +3 more
openaire +2 more sources
Heap . . . Hop! Heap Is Also Vulnerable [PDF]
International audienceSeveral logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion.
Bouffard, Guillaume +3 more
core +3 more sources
Bytecode verification on Java smart cards [PDF]
AbstractThis article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off‐card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post‐issuance ...
Reinhard Berlach +4 more
openaire +3 more sources
This research was motivated by the policies of the Central Java provincial government in overcoming the problem of distributing subsidized fertilizers through the farm card program, which in the implementation still had problems, especially at the farmer
Ryan Satya Jorgi +2 more
doaj +1 more source
The application of character in the school environment still needs to be developed further. This research tries to implement character values into the learning process.
Zainuddin, Ahmad Shiddiq, Putri Agustina
doaj +1 more source

