Results 21 to 30 of about 1,014 (107)
Automated verification of termination certificates [PDF]
In order to increase user confidence, many automated theorem provers provide certificates that can be independently verified. In this paper, we report on our progress in developing a standalone tool for checking the correctness of certificates for the ...
Blanqui, Frédéric, Ly, Kim Quyen
core +2 more sources
Retrenching the Purse: Finite Exception Logs, and Validating the Small
The Mondex Electronic Purse is an outstanding example of industrial scale formal refinement, and was the first verification to achieve ITSEC level E6 certification.
Banach, Richard +3 more
core +3 more sources
Plataforma para el acceso a servicios desde dispositivos móviles utilizando parámetros de autenticación basados en SIM Card [PDF]
El acceso seguro a servicios desde terminales móviles implica un equilibrio entre el grado de seguridad requerido y las capacidades de los dispositivos, tanto a nivel hardware como de usabilidad.
Francisco Martínez +4 more
core +2 more sources
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography [PDF]
Microcontroller can be easily adopted in various applications with a variety of peripherals due to its merits of small size, simple architecture and etc. However, the limited computing power restricts its application in cryptography.
Chim, TW +6 more
core
Formal specification of the JavaCard API in JML: the APDU class [PDF]
This paper reports on an eort to increase the reliability of JavaCard-based smart cards by means of formal specication and verication of JavaCard source code. As a rst step, formal interface specications, written in the specication language JML, have been developed for all the classes that make up the JavaCard API.
Poll, E. +4 more
openaire +2 more sources
Verification System of Removable Key Carriers Software
Removable key carriers are most widespread devices for cryptographic key systems. The most popular platform for them is JavaCard. However, an on-card bytecode verifier is only optional on JavaCard smartcards, and indeed most cards do not include it. That’
Sergey Sergeevich Agafyin +1 more
doaj
Identity Management Technology [PDF]
This offer comes from researchers and professors from a Spanish University. They offer solutions in Identity Management for human beings (from Identification Cards to Biometrics).
Sánchez Reíllo, Raúl
core +1 more source
Memory Forensics of a Java Card Dump [PDF]
International audienceNowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card.
Bouffard, Guillaume +6 more
core +3 more sources
The KRAKATOA tool for certificationof JAVA/JAVACARD programs annotated in JML
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Marché, Claude +2 more
openaire +2 more sources
Theorem proving support in programming language semantics [PDF]
We describe several views of the semantics of a simple programming language as formal documents in the calculus of inductive constructions that can be verified by the Coq proof system.
Bertot, Yves
core +3 more sources

