Results 21 to 30 of about 1,014 (107)

Automated verification of termination certificates [PDF]

open access: yes, 2012
In order to increase user confidence, many automated theorem provers provide certificates that can be independently verified. In this paper, we report on our progress in developing a standalone tool for checking the correctness of certificates for the ...
Blanqui, Frédéric, Ly, Kim Quyen
core   +2 more sources

Retrenching the Purse: Finite Exception Logs, and Validating the Small

open access: yes, 2006
The Mondex Electronic Purse is an outstanding example of industrial scale formal refinement, and was the first verification to achieve ITSEC level E6 certification.
Banach, Richard   +3 more
core   +3 more sources

Plataforma para el acceso a servicios desde dispositivos móviles utilizando parámetros de autenticación basados en SIM Card [PDF]

open access: yes, 2007
El acceso seguro a servicios desde terminales móviles implica un equilibrio entre el grado de seguridad requerido y las capacidades de los dispositivos, tanto a nivel hardware como de usabilidad.
Francisco Martínez   +4 more
core   +2 more sources

A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography [PDF]

open access: yes, 2013
Microcontroller can be easily adopted in various applications with a variety of peripherals due to its merits of small size, simple architecture and etc. However, the limited computing power restricts its application in cryptography.
Chim, TW   +6 more
core  

Formal specification of the JavaCard API in JML: the APDU class [PDF]

open access: yesComputer Networks, 2001
This paper reports on an eort to increase the reliability of JavaCard-based smart cards by means of formal specication and verication of JavaCard source code. As a rst step, formal interface specications, written in the specication language JML, have been developed for all the classes that make up the JavaCard API.
Poll, E.   +4 more
openaire   +2 more sources

Verification System of Removable Key Carriers Software

open access: yesБезопасность информационных технологий, 2013
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it. That’
Sergey Sergeevich Agafyin   +1 more
doaj  

Identity Management Technology [PDF]

open access: yes, 2008
This offer comes from researchers and professors from a Spanish University. They offer solutions in Identity Management for human beings (from Identification Cards to Biometrics).
Sánchez Reíllo, Raúl
core   +1 more source

Memory Forensics of a Java Card Dump [PDF]

open access: yes, 2014
International audienceNowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card.
Bouffard, Guillaume   +6 more
core   +3 more sources

The KRAKATOA tool for certificationof JAVA/JAVACARD programs annotated in JML

open access: yesThe Journal of Logic and Algebraic Programming, 2004
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Marché, Claude   +2 more
openaire   +2 more sources

Theorem proving support in programming language semantics [PDF]

open access: yes, 2007
We describe several views of the semantics of a simple programming language as formal documents in the calculus of inductive constructions that can be verified by the Coq proof system.
Bertot, Yves
core   +3 more sources

Home - About - Disclaimer - Privacy