Results 11 to 20 of about 1,014 (107)
Secure remote health monitoring with unreliable mobile devices. [PDF]
As the nation’s healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely ...
Shin M.
europepmc +2 more sources
Business Information Exchange System with Security, Privacy, and Anonymity
Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e‐mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e‐mail, secure instant messaging, and secure sharing of business documents.
Sead Muftic +3 more
wiley +1 more source
A Formal Executable Semantics of the JavaCard Platform [PDF]
We present a formal executable specification of two crucial JavaCard platform components, namely the Java Card Virtual Machine (JCVM) and the ByteCode Verifier (BCV). Moreover, we relate both components by giving a proof of correctness of the ByteCode Verifier. Both formalisations and proofs have been machined-checked using the proof assistant Coq.
Gilles Barthe +4 more
openaire +1 more source
Towards Low-level Cryptographic Primitives for JavaCards
JavaCard is a multi-application security platform deployed to over twenty billion smartcards, used in applications ranging from secure payments to telecommunications. While the platform is a popular choice for established commercial use cases (e.g., SIM cards in telecommunication networks), it has notably low adoption rates in: 1) application scenarios
Mavroudis, Vasilios, Svenda, Petr
openaire +2 more sources
Mobile Resource Guarantees for Smart Devices [PDF]
. We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds.
A. Appel +13 more
core +5 more sources
Secure Method Invocation in JASON [PDF]
We describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element ...
Brinkman, Richard, Hoepman, Jaap-Henk
core +4 more sources
The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services [PDF]
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols.
, EU FP5 (Funder) +15 more
core
Imperative Object-based Calculi in (Co)Inductive Type Theories [PDF]
We discuss the formalization of Abadi and Cardelli's imps, a paradigmatic object-based calculus with types and side effects, in Co-Inductive Type Theories, such as the Calculus of (Co)Inductive Constructions (CC(Co)Ind). Instead of representing directly
E. Giménez +11 more
core +6 more sources
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source

