Results 211 to 220 of about 80,615 (252)

Anaemia Profile and Inflammation Markers in Stunted Children Under Two Years in Indonesia. [PDF]

open access: yesChildren (Basel)
Budiailmiawan L   +6 more
europepmc   +1 more source

Chronicle of a Java Card death

Journal of Computer Virology and Hacking Techniques, 2016
Various attacks are designed to gain access to the assets of JavaCard Platforms. These attacks use software, hardware or a combination ofboth. Manufacturers have improved their countermeasures to protect card as-sets from these attacks. In this paper, we attempt to gain access to assets of arecent Java Card Platform by combining various logical attacks.
Mozhdeh, Farhadi, Lanet, Jean-Louis
openaire   +4 more sources

Java card: Internet computing on a smart card

IEEE Internet Computing, 1997
The smart card-which offers Internet programmers a truly safe place to generate and store a private encryption key-will soon be recognized as a useful component of Internet computing. Until now the security precautions surrounding smart-card technology have effectively prevented its use in general computing systems, but the recent implementation of the
openaire   +3 more sources

Java bytecode verification on Java cards

Proceedings of the 2004 ACM symposium on Applied computing, 2004
A Java program is usually translated into an intermediate language, known as Java Virtual Machine Language (JVML), which is then executed by a Java Virtual Machine (JVM). Before its execution a JVML program is verified to prevent a wide range of run-time errors.
BARBUTI, ROBERTO, CATAUDELLA S.
openaire   +2 more sources

Home - About - Disclaimer - Privacy