Results 201 to 210 of about 81,045 (237)
Study protocol for a randomised controlled trial evaluating the efficacy of dietary modulation of probiotics on nutritional status and antibody response to SARS-CoV-2 in Indonesian adolescents: gut-lung axis (DIVINE). [PDF]
Agustina R +10 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Chronicle of a Java Card death
Journal of Computer Virology and Hacking Techniques, 2016Various attacks are designed to gain access to the assets of JavaCard Platforms. These attacks use software, hardware or a combination ofboth. Manufacturers have improved their countermeasures to protect card as-sets from these attacks. In this paper, we attempt to gain access to assets of arecent Java Card Platform by combining various logical attacks.
Jean-Louis lanet
exaly +3 more sources
Evaluation of Java Card Performance [PDF]
With the growing acceptance of the Java Card standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode and API levels.
Samia Bouzefrane
exaly +3 more sources
Java bytecode verification on Java cards
Proceedings of the 2004 ACM symposium on Applied computing, 2004A Java program is usually translated into an intermediate language, known as Java Virtual Machine Language (JVML), which is then executed by a Java Virtual Machine (JVM). Before its execution a JVML program is verified to prevent a wide range of run-time errors.
BARBUTI, ROBERTO, CATAUDELLA S.
openaire +2 more sources
Implementation of Java card Virtual Machine
Journal of Computer Science and Technology, 2000zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mao Zhigang, Ye Yizheng
exaly +2 more sources
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 2003
A smart-card run-time environment must provide proper transaction support for the reliable updating of data, especially on multi-application cards like the Java Card. The transaction mechanism must meet these demands by means of the applications and the system itself, within the minimal resources offered by current smart-card hardware.
openaire +1 more source
A smart-card run-time environment must provide proper transaction support for the reliable updating of data, especially on multi-application cards like the Java Card. The transaction mechanism must meet these demands by means of the applications and the system itself, within the minimal resources offered by current smart-card hardware.
openaire +1 more source
Performance Evaluation of Java Card Bytecodes [PDF]
resume
Samia Bouzefrane
exaly +3 more sources
Developing ECC applications in Java Card
2013 9th International Conference on Information Assurance and Security (IAS), 2013Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. Given its mathematical characteristics, ECC is currently one of the best options for protecting sensitive information. The lastest version of the Java Card platform includes several classes related to elliptic curves.
V. Gayoso MartÃnez +1 more
openaire +1 more source
Java card technology and security
Information Security Technical Report, 1998Abstract The idea of a multi-application smartcard operating system is not a new one, but only recently the smartcard industry is catching up with proper software and hardware architectures that contribute in the anticipated evolution. In this article we survey the major proposed architecture, the Java Card API, and comment on its applicability and ...
openaire +1 more source

