咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 1 册 图书

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 安全科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 环境科学与工程(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 地理学
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 9 篇 smart cards
  • 4 篇 java
  • 4 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 computer languag...
  • 2 篇 smart contract
  • 2 篇 information secu...
  • 2 篇 steganography
  • 2 篇 java programming...
  • 1 篇 object oriented ...
  • 1 篇 javacard
  • 1 篇 performance
  • 1 篇 sec-inte
  • 1 篇 access control
  • 1 篇 software enginee...
  • 1 篇 multi-applicatio...
  • 1 篇 public-private k...
  • 1 篇 programming
  • 1 篇 objects

机构

  • 3 篇 computer science...
  • 1 篇 univ vienna fac ...
  • 1 篇 department of in...
  • 1 篇 natl aerosp univ...
  • 1 篇 automated reason...
  • 1 篇 gemplus res labs...
  • 1 篇 lab lsr imag f-3...
  • 1 篇 dept. of compute...
  • 1 篇 visa int serv as...
  • 1 篇 charles universi...
  • 1 篇 dept. of electro...
  • 1 篇 delft univ techn...
  • 1 篇 univ bordeaux 1 ...
  • 1 篇 univ nijmegen de...
  • 1 篇 institute for te...
  • 1 篇 university of l’...
  • 1 篇 univ notre dame ...
  • 1 篇 off natl etud & ...
  • 1 篇 nasa software en...
  • 1 篇 computer enginee...

作者

  • 2 篇 steger christian
  • 2 篇 m. shirali-shahr...
  • 2 篇 berlach reinhard
  • 2 篇 lackner michael
  • 1 篇 ghindici dorina
  • 1 篇 jacobs b
  • 1 篇 truszkowski walt
  • 1 篇 butler tom
  • 1 篇 mirakhorli mehdi
  • 1 篇 brewer d
  • 1 篇 reddy p. v. g. d...
  • 1 篇 henry muccini
  • 1 篇 hartel pieter h.
  • 1 篇 loiseaux c
  • 1 篇 paradinas pierre
  • 1 篇 karos thomas
  • 1 篇 wilhelm stephan
  • 1 篇 yolnasdi
  • 1 篇 woehrer maximili...
  • 1 篇 ferdinand christ...

语言

  • 43 篇 英文
检索条件"任意字段=1st International Workshop on Java on Smart Cards - Programming and Security"
43 条 记 录,以下是11-20 订阅
排序:
Trust in smart contracts is a process, as well  21st
收藏 引用
21st international workshops on Financial Cryptography and Data security, FC 2017 held in conjuction with 5th workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, 4th workshop on Bitcoin and Blockchain Research, BITCOIN 2017, 2nd workshop on Advances in Secure Electronic Voting Schemes, VOTING 2017, 1st workshop on Trusted smart Contracts, WTSC 2017 and 1st workshop on Targeted Attacks, TA 2017
作者: Al Khalil, Firas Butler, Tom O’Brien, Leona Ceci, Marcello Governance Risk and Compliance Technology Center University College Cork Cork Ireland
Distributed ledger technologies are rising in popularity, mainly for the host of financial applications they potentially enable, through smart contracts. Several implementations of distributed ledgers have been propos... 详细信息
来源: 评论
CEUR workshop Proceedings
CEUR Workshop Proceedings
收藏 引用
Gemeinsamer Tagungsband der workshops der Tagung Software Engineering 2016 - workshops of the Conference on Software Engineering, SE-WS 2016
The proceedings contain 28 papers. The topics discussed include: a parser generator system for level-based programming languages;higher-order causal stream functions in sig from first principles;parametric DeltaJ 1.5:...
来源: 评论
An Empirical study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks  1st
收藏 引用
1st international Conference on Information and Communication Technology for Intelligent Systems (ICTIS)
作者: Sahadevaiah, Kuncha Ramakrishnaiah, Nagendla Reddy, P. V. G. D. Prasad Jawaharlal Nehru Technol Univ Univ Coll Engn Dept Comp Sci & Engn Kakinada 533003 Andhra Pradesh India Andhra Univ Coll Engn Dept Comp Sci & Syst Engn Visakhapatnam 530003 Andhra Pradesh India
The design and implementation of a cryptographic scheme in a mobile ad hoc network (MANET) is highly complicated than the traditional networks. This is due to several reasons, like-unavailable central infrastructure s... 详细信息
来源: 评论
Assessment of Access Control Systems Using Mutation Testing  1
Assessment of Access Control Systems Using Mutation Testing
收藏 引用
international workshop on TEchnical and LEgal aspects of data pRIvacy and security
作者: Daoudagh, Said Lonetti, Francesca Marchetti, Eda CNR Ist Sci & Tecnol Informaz A Faedo Pisa Italy
In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language. Mutation analysis has been applied on access control policies f... 详细信息
来源: 评论
The gateway security model in the java Electronic Commerce Framework  1st
收藏 引用
1st international Conference on Financial Cryptography, FC 1997
作者: Goldstein, Theodore Sun Microsystems Laboratories / JavaSoft United States
This paper describes an extension to the current java security model called the "Gateway" and why it was necessary to create it. This model allows secure applications, such as those used in electronic commer... 详细信息
来源: 评论
Countering type confusion and buffer overflow attacks on java smart cards by data type sensitive obfuscation  14
Countering type confusion and buffer overflow attacks on Jav...
收藏 引用
1st workshop on Cryptography and security in Computing Systems, CS2 2014
作者: Lackner, Michael Berlach, Reinhard Weiss, Reinhold steger, Christian Institute for Technical Informatics Graz University of Technology Graz Austria
java enabled smart cards protect security-related code and data by a sandbox concept. Unfortunately, this sandbox can be bypassed by fault attacks. Therefore, there is a substantial need for transparent, effective, an... 详细信息
来源: 评论
Memory-efficient on-card byte code verification for java cards  14
Memory-efficient on-card byte code verification for java car...
收藏 引用
1st workshop on Cryptography and security in Computing Systems, CS2 2014
作者: Berlach, Reinhard Lackner, Michael steger, Christian Loinig, Johannes Haselsteiner, Ernst Institute for Technical Informatics Graz University of Technology Austria NXP Semiconductors Netherlands
java enabled smart cards are widely used to store confidential information in a trusted and secure way in an untrusted and insecure environment, for example the credit card in your briefcase. In this environment the o... 详细信息
来源: 评论
EFFICIENT IMPLEMENTATION OF ANONYMOUS CREDENTIALS ON java CARD smart cards
EFFICIENT IMPLEMENTATION OF ANONYMOUS CREDENTIALS ON JAVA CA...
收藏 引用
1st IEEE international workshop on Information Forensics and security
作者: sterckx, Michael Gierlichs, Benedikt Preneel, Bart Verbauwhede, Ingrid Katholieke Univ Leuven ESAT SCD COSIC Kasteelpark Arenberg 10 B-3001 Louvain Belgium
The Direct Anonymous Attestation scheme allows to map procedures with an imperative requirement for anonymity, such as voting, to the electronic world while offering provable security. However, the scheme is complex a... 详细信息
来源: 评论
Reverse engineering java card applets using power analysis
收藏 引用
1st international workshop on Information security Theory and Practice
作者: Vermoen, Dennis Witteman, Marc Gaydadjiev, Georgi N. Delft Univ Technol Delft Netherlands Riscure Bv Delft Netherlands
Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for java Card applets reverse engineering. Because power analysis alone doe... 详细信息
来源: 评论
Performance evaluation of java card bytecodes
收藏 引用
1st international workshop on Information security Theory and Practice
作者: Paradinas, Pierre Cordry, Julien Bouzefrane, Samia INRIA Rocquencourt F-78150 Le Chesnay France CNAM F-75003 Paris France
The advent of the java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucia... 详细信息
来源: 评论