Results 31 to 40 of about 1,014 (107)

Applicable to Key Carrier Attacks

open access: yesБезопасность информационных технологий, 2014
At this paper the author describes attacks for removable key devices platforms.
Sergey Sergeevich Agafyin   +1 more
doaj  

Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks [PDF]

open access: yes, 2015
Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her ...
Akram, Raja Naeem   +2 more
core   +1 more source

Security Functions of Removable Key Carriers

open access: yesБезопасность информационных технологий, 2014
At this paper the author describes removable key devices platforms and their security functions.
Sergey Sergeevich Agafyin
doaj  

Determination of Non-declared Capabilities of Key Carriers Software

open access: yesБезопасность информационных технологий, 2014
In this paper, the author describes methods of determination of non-declared capabilities in key devices software.
Sergey Sergeevich Agafyin   +1 more
doaj  

The Mondex case study: from specifications to code [PDF]

open access: yes, 2006
In this paper we introduce three different implementations for the Mondex electronic purse verification challenge [Woo06] [SCW00]. In previous work ([SGHR06] [SGH+07] and [HSGR06]) we verified security and correctness properties of the Mondex money ...
Bischof, Markus   +6 more
core  

Smart cards: State-of-the-art to future directions [PDF]

open access: yes, 2013
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements.
Akram, Raja Naeem, Markantonakis, K
core   +2 more sources

WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface) [PDF]

open access: yes, 2014
International audienceThis article presents the WOLF (Wallet Open Library Framework) platform which supports an original interface for NFC developers called " SE-QL ".
Edouard, Amosse   +3 more
core   +1 more source

Timing Aware Information Flow Security for a JavaCard-like Bytecode

open access: yesElectronic Notes in Theoretical Computer Science, 2005
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even ...
Hedin, Daniel, Sands, David
openaire   +1 more source

Seguridad basada en parámetros SIM para entornos de comercio electrónico móvil

open access: yesIngeniería e Investigación, 2007
Los requerimientos de seguridad son los más exigentes en el dominio del comercio electrónico. Cuando se ha-bla de comercio electrónico móvil los requisitos a nivel de seguridad no solo conservan su nivel de exigencia, sino que se debe mantener un ...
Francisco Orlando Martínez Pabón   +4 more
doaj  

Safety Property Driven Test Generation from {JML} Specifications [PDF]

open access: yes, 2006
International audienceThis paper describes the automated generation of test sequences derived from a JML specification and a safety property written in an ad hoc language, named JTPL. The functional JML model is animated to build the test sequences w.r.t.
Bouquet, Fabrice   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy