咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 1 册 图书

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 32 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 安全科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 环境科学与工程(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 地理学
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 9 篇 smart cards
  • 4 篇 java
  • 4 篇 cryptography
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 computer languag...
  • 2 篇 smart contract
  • 2 篇 information secu...
  • 2 篇 steganography
  • 2 篇 java programming...
  • 1 篇 object oriented ...
  • 1 篇 javacard
  • 1 篇 performance
  • 1 篇 sec-inte
  • 1 篇 access control
  • 1 篇 software enginee...
  • 1 篇 multi-applicatio...
  • 1 篇 public-private k...
  • 1 篇 programming
  • 1 篇 objects

机构

  • 3 篇 computer science...
  • 1 篇 univ vienna fac ...
  • 1 篇 department of in...
  • 1 篇 natl aerosp univ...
  • 1 篇 automated reason...
  • 1 篇 gemplus res labs...
  • 1 篇 lab lsr imag f-3...
  • 1 篇 dept. of compute...
  • 1 篇 visa int serv as...
  • 1 篇 charles universi...
  • 1 篇 dept. of electro...
  • 1 篇 delft univ techn...
  • 1 篇 univ bordeaux 1 ...
  • 1 篇 univ nijmegen de...
  • 1 篇 institute for te...
  • 1 篇 university of l’...
  • 1 篇 univ notre dame ...
  • 1 篇 off natl etud & ...
  • 1 篇 nasa software en...
  • 1 篇 computer enginee...

作者

  • 2 篇 steger christian
  • 2 篇 m. shirali-shahr...
  • 2 篇 berlach reinhard
  • 2 篇 lackner michael
  • 1 篇 ghindici dorina
  • 1 篇 jacobs b
  • 1 篇 truszkowski walt
  • 1 篇 butler tom
  • 1 篇 mirakhorli mehdi
  • 1 篇 brewer d
  • 1 篇 reddy p. v. g. d...
  • 1 篇 henry muccini
  • 1 篇 hartel pieter h.
  • 1 篇 loiseaux c
  • 1 篇 paradinas pierre
  • 1 篇 karos thomas
  • 1 篇 wilhelm stephan
  • 1 篇 yolnasdi
  • 1 篇 woehrer maximili...
  • 1 篇 ferdinand christ...

语言

  • 43 篇 英文
检索条件"任意字段=1st International Workshop on Java on Smart Cards - Programming and Security"
43 条 记 录,以下是21-30 订阅
排序:
An information flow verifier for small embedded systems
收藏 引用
1st international workshop on Information security Theory and Practice
作者: Ghindici, Dorina Grimaud, Gilles Simplot-Ryl, Isabelle Univ Lille 1 CNRS UMR 8022 LIFLCite Sci F-59655 Villeneuve Dascq France
Insecurity arising from illegal information flow represents a real threat in small computing environments allowing code sharing, dynamic class loading and overloading. We introduce a verifier able to certify at loadin... 详细信息
来源: 评论
A smart card based distributed identity management infrastructure for mobile ad hoc networks
收藏 引用
1st international workshop on Information security Theory and Practice
作者: Atallah, Eve Chaumette, Serge Univ Bordeaux 1 LaBRI 351 Cours Liberat F-33405 Talence France Univ Limoges XLIM F-87060 Limoges France
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the nodes, in these so called Mobile Ad ... 详细信息
来源: 评论
1st IFIP TC6 /WG8.8 /WG11.2 international workshop on Information security Theory and Practices, WIstP 2007
收藏 引用
1st IFIP TC6 /WG8.8 /WG11.2 international workshop on Information security Theory and Practices, WIstP 2007
The proceedings contain 20 papers. The special focus in this conference is on Mobility, Hardware and Cryptography I. The topics include: A smart card based distributed identity management infrastructure for mobile Ad ...
来源: 评论
A new approach to Persian/Arabic text steganography
A new approach to Persian/Arabic text steganography
收藏 引用
5th IEEE/ACIS international Conference on Computer and Information Science, ICIS 2006. In conjunction with 1st IEEE/ACIS international workshop on Component-Based Software Engineering, Software Architecture and Reuse, COMSAR 2006
作者: Shirali-Shahreza, M. Hassan Shirali-Shahreza, Mohammad Computer Eng. Department Yazd University Yazd Iran Computer Science Department Sharif University of Technology Tehran Iran
Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of... 详细信息
来源: 评论
A New Approach to Persian/Arabic Text steganography
A New Approach to Persian/Arabic Text Steganography
收藏 引用
international Conference on Computer and Information Science (ACIS)
作者: M.H. Shirali-Shahreza M. Shirali-Shahreza Computer Engineering Department Yazd University Yazd Iran Computer Science Department Sharif University of Technology Tehran Iran
Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of... 详细信息
来源: 评论
Collage steganography
Collage Steganography
收藏 引用
international Conference on Computer and Information Science (ACIS)
作者: M. Shirali-Shahreza S. Shirali-Shahreza Computer Science Department Sharif University of Technology Tehran Iran Computer Engineering Department Sharif University of Technology Tehran Iran
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden commun... 详细信息
来源: 评论
A study on fast JCVM with new transaction mechanism and caching-buffer based on java Card objects with a high locality
收藏 引用
EUC 2005 workshops: 2nd international Symposium on Ubiquitous Intelligence and smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous Systems, NCUS 2005, 1st international workshop on security in Ubiquitous Computing Systems, SecUbiq 2005, 1st international workshop on RFID and Ubiquitous Sensor Networks, USN 2005 and international workshop on Trusted and Autonomic Ubiquitous and Embedded Systems, TAUES 2005 held in conjunction with the IFIP international Conference on Embedded and Ubiquitous Computing, 2005
作者: Jin, Min-Sik Choi, Won-Ho Yang, Yoon-Sim Jung, Min-Soo Dept of Computer Engineering Kyungnam University Masan Korea Republic of Kyungnam University Korea Republic of
java Card is now a mature and accepted standard for smart card and SIM technology. java Card is distinguished primarily by its independence from hardware platforms and portability and is now the most important open st... 详细信息
来源: 评论
EUC 2005 workshops: 2nd international Symposium on Ubiquitous Intelligence and smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous Systems, NCUS 2005, 1st international workshop on security in Ubiquitous Computing Systems, SecUbiq 2005, 1st international workshop on RFID and Ubiquitous Sensor Networks, USN 2005 and international workshop on Trusted and Autonomic Ubiquitous and Embedded Systems, TAUES 2005 held in conjunction with the IFIP international Conference on Embedded and Ubiquitous Computing, 2005
收藏 引用
EUC 2005 workshops: 2nd international Symposium on Ubiquitous Intelligence and smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous Systems, NCUS 2005, 1st international workshop on security in Ubiquitous Computing Systems, SecUbiq 2005, 1st international workshop on RFID and Ubiquitous Sensor Networks, USN 2005 and international workshop on Trusted and Autonomic Ubiquitous and Embedded Systems, TAUES 2005 held in conjunction with the IFIP international Conference on Embedded and Ubiquitous Computing, 2005
The proceedings contain 134 papers. The special focus in this conference is on Ubiquitous intelligence and smart worlds. The topics include: Human activity recognition based on surrounding things;a service management ...
来源: 评论
Towards formal specification and generation of autonomic policies
收藏 引用
EUC 2005 workshops: 2nd international Symposium on Ubiquitous Intelligence and smart Worlds, UISW 2005, IFIP international Symposium on Network-Centric Ubiquitous Systems, NCUS 2005, 1st international workshop on security in Ubiquitous Computing Systems, SecUbiq 2005, 1st international workshop on RFID and Ubiquitous Sensor Networks, USN 2005 and international workshop on Trusted and Autonomic Ubiquitous and Embedded Systems, TAUES 2005 held in conjunction with the IFIP international Conference on Embedded and Ubiquitous Computing, 2005
作者: sterritt, Roy Hinchey, Michael G. Rash, James L. Truszkowski, Walt Rouff, Christopher A. Gracanin, Denis University of Ulster Ireland NASA Software Engineering Laboratory NASA Goddard Space Flight Center GreenbeltMD20771 United States Advanced Architectures and Automation Branch NASA Goddard Space Flight Center GreenbeltMD20771 United States Advanced Concepts Business Unit Science Applications International Corp McLeanVA22102 United States Virginia Tech Department of Computer Science BlacksburgVA United States
Autonomic Computing (AC), self-management based on high level guidance from humans, is increasingly gaining momentum as the way forward in designing reliable systems to hide complexity and conquer IT management costs.... 详细信息
来源: 评论
CardKt: Automated multi-modal deduction on java cards for multi-application security  1st
收藏 引用
1st international workshop on java cards, javaCard 2000
作者: Goré, Rajeev Nguyen, Lan Duy Automated Reasoning Group Computer Sciences Laboratory Res. Sch. Of Inf. Sci. And Eng. Institute of Advanced Studies Australian National University Australia Formal Methods Group Dept. of Computer Science Australian National University Australia
We describe an implementation of a java program to perform automated deduction in propositional multi-modal logics on a java smart card. The tight space limits of java smart cards make the implementation non-trivial. ... 详细信息
来源: 评论