Results 261 to 270 of about 548,955 (324)

Chronicle of a Java Card death

Journal of Computer Virology and Hacking Techniques, 2016
Various attacks are designed to gain access to the assets of JavaCard Platforms. These attacks use software, hardware or a combination ofboth. Manufacturers have improved their countermeasures to protect card as-sets from these attacks. In this paper, we attempt to gain access to assets of arecent Java Card Platform by combining various logical attacks.
Mozhdeh, Farhadi, Lanet, Jean-Louis
semanticscholar   +4 more sources

Verifying Java Card Programs

Deductive Software Verification, 2016
This chapter presents the extension of KeY and JavaDL to handle a particular and peculiar dialect of Java, namely Java Card, for programming smart cards. The necessary extensions to the logic and the specification language are discussed, followed by a number of small case studies.
Wojciech Mostowski
openaire   +2 more sources

Java card competitive product analysis method and device

2023 IEEE International Conference on Control, Electronics and Computer Technology (ICCECT), 2023
This article explains the methods and devices of Java Card competitive product analysis from many aspects, such as function, performance, reliability.
Bin Zhou, Xuesong Bai, Lili Fu
semanticscholar   +1 more source

Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java Card

2021 4th International Conference of Computer and Informatics Engineering (IC2IE), 2021
Data theft and manipulation are threats that often occur in the use of smart cards. The data stored on the smart card will be changed when the data exchange is carried out, so that data with different contents will be received by the recipient ...
H. Nurwarsito, Sarah Kusuma Ayu
semanticscholar   +1 more source

Java bytecode verification on Java cards

Proceedings of the 2004 ACM symposium on Applied computing, 2004
A Java program is usually translated into an intermediate language, known as Java Virtual Machine Language (JVML), which is then executed by a Java Virtual Machine (JVM). Before its execution a JVML program is verified to prevent a wide range of run-time errors.
BARBUTI, ROBERTO, CATAUDELLA S.
openaire   +2 more sources

Java Card and OCF

2002
In this chapter, we present a sample Java Card applet together with the basic concepts of on-card programming for Java Cards. We explain the associated off-card programming and show how OCF brings off-card and on-card parts together. You can find a brief introduction to the Java Card platform in Section 2.3.2 “Java Card”.
Uwe Hansmann   +4 more
openaire   +1 more source

Transactions in Java Card

Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 2003
A smart-card run-time environment must provide proper transaction support for the reliable updating of data, especially on multi-application cards like the Java Card. The transaction mechanism must meet these demands by means of the applications and the system itself, within the minimal resources offered by current smart-card hardware.
openaire   +1 more source

Home - About - Disclaimer - Privacy