Results 91 to 100 of about 1,014 (107)
Some of the next articles are maybe not open access.

A novel JavaCard-based authentication system for secured transactions on the Internet

Proceedings IEEE International Conference on Networks 2000 (ICON 2000). Networking Trends and Challenges in the New Millennium, 2002
This paper presents a novel authentication system, that will find applications on the Internet like e-commerce and areas where secure communication is mandatory. It consists of a set of authentication protocols-JavaCard authentication protocol (JCAP) and a secure crypto-module-random symmetric authentication module (RSAM). The JCAP is used to establish
null Li Huang Ng, D.T. Tan
openaire   +1 more source

Spontaneous networking with CORBA, Jini and JavaCards in RoamX, a mobile X-desktop

Proceedings DOA'00. International Symposium on Distributed Objects and Applications, 2002
RoamX provides support for the user-controlled management of a distributed X desktop, potentially spanning multiple administrative domains. Instead of terminating X-based applications and restarting them manually elsewhere, applications can be suspended and restored selectively on different machines while preserving their context and state.
S. Rothkugel, P. Strum
openaire   +1 more source

Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform

2014 Ninth International Conference on Availability, Reliability and Security, 2014
Digital signature is one of the most common ways of determining the origin of a document in a digital way. To ensure authenticity, integrity and non-repudiation when such signatures are used, many countries have their standards and regulations. In EU, a signature that complies with those regulations is called 'Qualified Electronic Signature' (QES ...
Jakub Breier, Adam Pomothy
openaire   +1 more source

RSAM: novel JavaCard-based authentication system for secured transactions on the Internet

2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119), 2002
Most practical authentication systems today, notably SSL, make use of both symmetric and asymmetric cryptosystems to provide secure communication in the Internet. Although SSL is regarded as secure, it is still susceptible to certain vulnerabilities such as brute force attack; this is so especially when short key length is used coupled with the rapid ...
null Li Huang Ng, D.T.H. Tan
openaire   +1 more source

Towards a Full Formal Specification of the JavaCard API

2001
This paper reports on ongoing work to develop a formal specification of the JAVACARD API using the specification language JML. It discusses the specification of the JCSystem class, which deals with the JAVACARD firewall, (atomic) transactions and transient objects.
Hans Meijer, Erik Poll
openaire   +1 more source

JavaCard-based Two-Level User Key Management for IP Conditional Access Systems

2007 15th IEEE International Conference on Networks, 2007
To prohibit the unauthorized accesses on premium contents of the Pay-TV system, a conditional access system (CAS) scrambles the contents with a scrambling key. In order to securely send the scrambling key for descrambling, the CAS transmits the scrambling key after encrypting it with another encryption key. The encryption keys are generally transmitted
Jinyoung Moon   +2 more
openaire   +1 more source

A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines

2002
Many formal specifications of the JavaCard Virtual Machine are defensive, in that they perform type-checking at run-time. In this paper, we show how to construct from such a defensive virtual machine an offensive one that does not perform type-checking at run-time.
Gilles Barthe   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy