Results 201 to 210 of about 81,045 (237)
Some of the next articles are maybe not open access.

Chronicle of a Java Card death

Journal of Computer Virology and Hacking Techniques, 2016
Various attacks are designed to gain access to the assets of JavaCard Platforms. These attacks use software, hardware or a combination ofboth. Manufacturers have improved their countermeasures to protect card as-sets from these attacks. In this paper, we attempt to gain access to assets of arecent Java Card Platform by combining various logical attacks.
Jean-Louis lanet
exaly   +3 more sources

Evaluation of Java Card Performance [PDF]

open access: yesLecture Notes in Computer Science, 2008
With the growing acceptance of the Java Card standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode and API levels.
Samia Bouzefrane
exaly   +3 more sources

Java bytecode verification on Java cards

Proceedings of the 2004 ACM symposium on Applied computing, 2004
A Java program is usually translated into an intermediate language, known as Java Virtual Machine Language (JVML), which is then executed by a Java Virtual Machine (JVM). Before its execution a JVML program is verified to prevent a wide range of run-time errors.
BARBUTI, ROBERTO, CATAUDELLA S.
openaire   +2 more sources

Implementation of Java card Virtual Machine

Journal of Computer Science and Technology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mao Zhigang, Ye Yizheng
exaly   +2 more sources

Transactions in Java Card

Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 2003
A smart-card run-time environment must provide proper transaction support for the reliable updating of data, especially on multi-application cards like the Java Card. The transaction mechanism must meet these demands by means of the applications and the system itself, within the minimal resources offered by current smart-card hardware.
openaire   +1 more source

Performance Evaluation of Java Card Bytecodes [PDF]

open access: yesLecture Notes in Computer Science, 2007
resume
Samia Bouzefrane
exaly   +3 more sources

Developing ECC applications in Java Card

2013 9th International Conference on Information Assurance and Security (IAS), 2013
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. Given its mathematical characteristics, ECC is currently one of the best options for protecting sensitive information. The lastest version of the Java Card platform includes several classes related to elliptic curves.
V. Gayoso Martínez   +1 more
openaire   +1 more source

Java card technology and security

Information Security Technical Report, 1998
Abstract The idea of a multi-application smartcard operating system is not a new one, but only recently the smartcard industry is catching up with proper software and hardware architectures that contribute in the anticipated evolution. In this article we survey the major proposed architecture, the Java Card API, and comment on its applicability and ...
openaire   +1 more source

Home - About - Disclaimer - Privacy