Results 1 to 10 of about 1,012 (106)

Detection of Non-declared Capabilities of JavaCard Applications

open access: yesБезопасность информационных технологий, 2013
At this paper authors describe the methodic of detecting non-declared capabilities of JavaCard software, which can disclose privacy of secret key.
Sergey Sergeevich Agafyin   +2 more
doaj   +1 more source

Privacy Requirements Implemented with a JavaCard [PDF]

open access: yes21st Annual Computer Security Applications Conference (ACSAC'05), 2006
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solutions, this paper describes an analytic and generic approach to protect personal data by anonymization. This approach is then applied to some representative scenarios.
Abou El Kalam, Anas, Deswarte, Yves
openaire   +2 more sources

Message Queuing Telemetry Transport (MQTT) Security: A Cryptographic Smart Card Approach

open access: yesIEEE Access, 2020
The Message Queuing Telemetry Transport (MQTT) protocol is one of the most extended protocols on the Internet of Things (IoT). However, this protocol does not implement a strong security scheme by default, which does not allow a secure authentication ...
Eduardo Buetas Sanjuan   +3 more
doaj   +1 more source

Specification of the Javacard API in JML [PDF]

open access: yes, 2000
This paper reports on an effort to increase the reliability of JavaCard-based smart cards by means of formal specification and verification of JavaCard source code. As a first step, lightweight formal interface specifications, written in the specification language JML, have been developed for all the classes in the JavaCard API (version 2.1). They make
Erik Poll, Joachim Berg, Bart Jacobs
openaire   +3 more sources

ECC programming in Java Card [PDF]

open access: yes, 2014
9 páginas, 3 figuras, 3 listingElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of el- liptic curves.
Gayoso Martínez, Víctor   +1 more
core   +1 more source

Enabling distributed Corba access to smart card applications [PDF]

open access: yes, 2014
2001-2002 > Academic research: refereed > Publication in refereed journalVersion of ...
Cao, J, Chan, ATS, Leong, HV, Tse, F
core   +1 more source

JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets [PDF]

open access: yes2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020
The JavaCard multi-application platform is now deployed to over twenty billion smartcards, used in various applications ranging from banking payments and authentication tokens to SIM cards and electronic documents. In most of those use cases, access to various cryptographic primitives is required.
Vasilios Mavroudis, Petr Svenda
openaire   +1 more source

A cooperative cellular and broadcast conditional access system for Pay-TV systems [PDF]

open access: yes, 2010
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted.
Cosmas, J, Cutts, D, Shirazi, H
core   +1 more source

Heap . . . Hop! Heap Is Also Vulnerable [PDF]

open access: yes, 2014
International audienceSeveral logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion.
Bouffard, Guillaume   +3 more
core   +3 more sources

Statically checking confidentiality via dynamic labels [PDF]

open access: yes, 2005
This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a
Jacobs, B.P.F., Pieters, W., Warnier, M.
core   +3 more sources

Home - About - Disclaimer - Privacy