Results 1 to 10 of about 1,012 (106)
Detection of Non-declared Capabilities of JavaCard Applications
At this paper authors describe the methodic of detecting non-declared capabilities of JavaCard software, which can disclose privacy of secret key.
Sergey Sergeevich Agafyin +2 more
doaj +1 more source
Privacy Requirements Implemented with a JavaCard [PDF]
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solutions, this paper describes an analytic and generic approach to protect personal data by anonymization. This approach is then applied to some representative scenarios.
Abou El Kalam, Anas, Deswarte, Yves
openaire +2 more sources
Message Queuing Telemetry Transport (MQTT) Security: A Cryptographic Smart Card Approach
The Message Queuing Telemetry Transport (MQTT) protocol is one of the most extended protocols on the Internet of Things (IoT). However, this protocol does not implement a strong security scheme by default, which does not allow a secure authentication ...
Eduardo Buetas Sanjuan +3 more
doaj +1 more source
Specification of the Javacard API in JML [PDF]
This paper reports on an effort to increase the reliability of JavaCard-based smart cards by means of formal specification and verification of JavaCard source code. As a first step, lightweight formal interface specifications, written in the specification language JML, have been developed for all the classes in the JavaCard API (version 2.1). They make
Erik Poll, Joachim Berg, Bart Jacobs
openaire +3 more sources
ECC programming in Java Card [PDF]
9 páginas, 3 figuras, 3 listingElliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of el- liptic curves.
Gayoso Martínez, Víctor +1 more
core +1 more source
Enabling distributed Corba access to smart card applications [PDF]
2001-2002 > Academic research: refereed > Publication in refereed journalVersion of ...
Cao, J, Chan, ATS, Leong, HV, Tse, F
core +1 more source
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets [PDF]
The JavaCard multi-application platform is now deployed to over twenty billion smartcards, used in various applications ranging from banking payments and authentication tokens to SIM cards and electronic documents. In most of those use cases, access to various cryptographic primitives is required.
Vasilios Mavroudis, Petr Svenda
openaire +1 more source
A cooperative cellular and broadcast conditional access system for Pay-TV systems [PDF]
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted.
Cosmas, J, Cutts, D, Shirazi, H
core +1 more source
Heap . . . Hop! Heap Is Also Vulnerable [PDF]
International audienceSeveral logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion.
Bouffard, Guillaume +3 more
core +3 more sources
Statically checking confidentiality via dynamic labels [PDF]
This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a
Jacobs, B.P.F., Pieters, W., Warnier, M.
core +3 more sources

