Results 51 to 60 of about 1,014 (107)

SMART SECURITY MANAGEMENT IN SECURE DEVICES [PDF]

open access: yes, 2015
International audienceAmong other threats, secure components are subjected tophysical attacks whose aim is to recover the secret information theystore. Most of the work carried out to protect these components generally consists in developing protections (
Agoyan, Michel   +6 more
core   +6 more sources

Constructive and destructive use of compilers in elliptic curve cryptography [PDF]

open access: yes, 2009
Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge.
A. Moss   +14 more
core   +1 more source

Procedure-modular specification and verification of temporal safety properties [PDF]

open access: yes, 2015
This paper describes ProMoVer, a tool for fully automated procedure-modular verification of Java programs equipped with method-local and global assertions that specify safety properties of sequences of method invocations.
Gurov, Dilian   +2 more
core   +3 more sources

Next-Generation Computing realized by Java. Electronic Commerce System using JavaCard.

open access: yesJournal of Information Processing and Management, 1998
Sun Microsystemsが開発したJavaは単に新しいプログラミング言語ではなく,ネットワークコンピューティングを実現するキーワードでもある。また,常時携帯できる最小のJava実行環境としてJavaCardがあり,このカードを使用すれば複数のプログラムを1枚のカードに安全に格納・実行することができる。CTC J-KIOSK開発チームは,Java・JavaCardの特徴を取り入れたインターネット上での電子決済システムのデモを作成し,Javaの実用性と可能性を証明した。
Masato TAKIZAWA, Takeomi SHIOTA
openaire   +2 more sources

Pendekatan konstruktif dalam inovasi pengajaran dan pembelajaran Bahasa Melayu di Kolej Vokasional [PDF]

open access: yes, 2008
Pendekatan konstruktif adalah pendekatan pengajaran dan pembelajaran yang berpusatkan pelajar manakala inovasi pengajaran pula dikaitkan dengan kaedah pengajaran yang terbaru demi mengukuhkan pemahaman pelajar.
Omar, Zakaria
core  

Near Field Communication Applications [PDF]

open access: yes, 2015
Near Field Communication (NFC) is a short-range, low power contactless communication between NFC-enabled devices that are held in the closed proximity to each other.
Akman, Özgen
core  

Static versus Dynamic Verification in Why3, Frama-C and SPARK 2014 [PDF]

open access: yes, 2016
International audienceWhy3 is an environment for static verification, generic in the sense that it is used as an intermediate tool by different front-ends for the verification of Java, C or Ada programs.
Kosmatov, Nikolai   +3 more
core   +1 more source

Verification of JavaCard programs

open access: yes, 2005
This report is concerned with the formal verification of JavaCard programs, or sequentiel Java programs. A calculus in dynamic logic is presented. This calculus is implemented in KIV, and ready for use. It is the first implemented proof system for JavaCard.
openaire   +1 more source

Formal specification and verification of JavaCard's application identifier class [PDF]

open access: yes, 2000
9 p.
Berg, J.A.G.M. van den   +2 more
openaire  

Testing a Java Card applet using the LIME Interface Test Bench : a case study [PDF]

open access: yes, 2009
The LIME Interface Test Bench is a collection of tools that allow to compile programs in a way such that they monitor interface specifications at runtime in Java and C programs. Specifications can be made using the LIME specification language.
Kindermann, Roland
core  

Home - About - Disclaimer - Privacy