Results 31 to 40 of about 1,014 (107)
Applicable to Key Carrier Attacks
At this paper the author describes attacks for removable key devices platforms.
Sergey Sergeevich Agafyin +1 more
doaj
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks [PDF]
Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her ...
Akram, Raja Naeem +2 more
core +1 more source
Security Functions of Removable Key Carriers
At this paper the author describes removable key devices platforms and their security functions.
Sergey Sergeevich Agafyin
doaj
Determination of Non-declared Capabilities of Key Carriers Software
In this paper, the author describes methods of determination of non-declared capabilities in key devices software.
Sergey Sergeevich Agafyin +1 more
doaj
The Mondex case study: from specifications to code [PDF]
In this paper we introduce three different implementations for the Mondex electronic purse verification challenge [Woo06] [SCW00]. In previous work ([SGHR06] [SGH+07] and [HSGR06]) we verified security and correctness properties of the Mondex money ...
Bischof, Markus +6 more
core
Smart cards: State-of-the-art to future directions [PDF]
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements.
Akram, Raja Naeem, Markantonakis, K
core +2 more sources
WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface) [PDF]
International audienceThis article presents the WOLF (Wallet Open Library Framework) platform which supports an original interface for NFC developers called " SE-QL ".
Edouard, Amosse +3 more
core +1 more source
Timing Aware Information Flow Security for a JavaCard-like Bytecode
AbstractCommon protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even ...
Hedin, Daniel, Sands, David
openaire +1 more source
Seguridad basada en parámetros SIM para entornos de comercio electrónico móvil
Los requerimientos de seguridad son los más exigentes en el dominio del comercio electrónico. Cuando se ha-bla de comercio electrónico móvil los requisitos a nivel de seguridad no solo conservan su nivel de exigencia, sino que se debe mantener un ...
Francisco Orlando Martínez Pabón +4 more
doaj
Safety Property Driven Test Generation from {JML} Specifications [PDF]
International audienceThis paper describes the automated generation of test sequences derived from a JML specification and a safety property written in an ad hoc language, named JTPL. The functional JML model is animated to build the test sequences w.r.t.
Bouquet, Fabrice +3 more
core +3 more sources

