Results 11 to 20 of about 1,014 (107)

Secure remote health monitoring with unreliable mobile devices. [PDF]

open access: yesJ Biomed Biotechnol, 2012
As the nation’s healthcare information infrastructure continues to evolve, new technologies promise to provide readily accessible health information that can help people address personal and community health concerns. In particular, wearable and implantable medical sensors and portable computing devices present many opportunities for providing timely ...
Shin M.
europepmc   +2 more sources

Business Information Exchange System with Security, Privacy, and Anonymity

open access: yesJournal of Electrical and Computer Engineering, Volume 2016, Issue 1, 2016., 2016
Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e‐mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e‐mail, secure instant messaging, and secure sharing of business documents.
Sead Muftic   +3 more
wiley   +1 more source

基于JavaCard的移动代理安全模型研究

open access: yesTongxin xuebao, 2003
王汝传   +3 more
doaj   +3 more sources

A Formal Executable Semantics of the JavaCard Platform [PDF]

open access: yes, 2001
We present a formal executable specification of two crucial JavaCard platform components, namely the Java Card Virtual Machine (JCVM) and the ByteCode Verifier (BCV). Moreover, we relate both components by giving a proof of correctness of the ByteCode Verifier. Both formalisations and proofs have been machined-checked using the proof assistant Coq.
Gilles Barthe   +4 more
openaire   +1 more source

Towards Low-level Cryptographic Primitives for JavaCards

open access: yes, 2018
JavaCard is a multi-application security platform deployed to over twenty billion smartcards, used in applications ranging from secure payments to telecommunications. While the platform is a popular choice for established commercial use cases (e.g., SIM cards in telecommunication networks), it has notably low adoption rates in: 1) application scenarios
Mavroudis, Vasilios, Svenda, Petr
openaire   +2 more sources

Mobile Resource Guarantees for Smart Devices [PDF]

open access: yes, 2005
. We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds.
A. Appel   +13 more
core   +5 more sources

Secure Method Invocation in JASON [PDF]

open access: yes, 2002
We describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element ...
Brinkman, Richard, Hoepman, Jaap-Henk
core   +4 more sources

The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services [PDF]

open access: yes, 2004
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols.
, EU FP5 (Funder)   +15 more
core  

Imperative Object-based Calculi in (Co)Inductive Type Theories [PDF]

open access: yes, 2003
We discuss the formalization of Abadi and Cardelli's imps, a paradigmatic object-based calculus with types and side effects, in Co-Inductive Type Theories, such as the Calculus of (Co)Inductive Constructions (CC(Co)Ind). Instead of representing directly
E. Giménez   +11 more
core   +6 more sources

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy