咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 48 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 135 篇 工学
    • 109 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 27 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 153 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 7 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 119 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java Card"
153 条 记 录,以下是101-110 订阅
排序:
A Friendly Framework for Hidding fault enabled virus for java Based Smartcard
A Friendly Framework for Hidding <i>fault enabled virus</i> ...
收藏 引用
26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec)
作者: Razafindralambo, Tiana Bouffard, Guillaume Lanet, Jean-Louis Univ Limoges Secure Smart Devices SSD Team XLIM F-87060 Limoges France
Smart cards are the safer device to execute cryptographic algorithms. Applications are verified before being loaded into the card. Recently, the idea of combined attacks to bypass byte code verification has emerged. I... 详细信息
来源: 评论
An abstraction and optimization approach using HW/SW co-design techniques to get power aware smart card solutions
An abstraction and optimization approach using HW/SW co-desi...
收藏 引用
International Conference on Embedded Systems and Applications (ESA 05)
作者: Neffe, U Rothbart, K Steger, C Weiss, R Rieger, E Muehlberger, A Graz Tech Univ Inst Tech Informat A-8010 Graz Austria
Power and energy,consumption is an essential design constraint for passive embedded mobile devices. These devices, e.g. smart cards, do not contain an integrated power supply and often provide only limited resources. ... 详细信息
来源: 评论
The Hell Forgery Self Modifying Codes Shoot Again  15th
The Hell Forgery Self Modifying Codes Shoot Again
收藏 引用
15th International Conference on Smart card Research and Advanced Applications (cardIS)
作者: Mesbah, Abdelhak Regnaud, Leo Lanet, Jean-Louis Mezghiche, Mohamed Univ Mohamed Bougara Boumerdes LIMOSE Lab Comp Sci Dept Fac Sci Boumerdes Algeria Univ Limoges 123 Ave T Thomas F-87000 Limoges France INRIA RBA LHS PEC Campus Beaulieu263 Ave Gen Leclerc F-35042 Rennes France
We present in this paper a new approach to gain access to assets of a smart card. It is based on the concept of reference forgery and array extension. We characterize the metadata of the objects and we use a weakness ... 详细信息
来源: 评论
Cross-Platform Application Sharing Mechanism
Cross-Platform Application Sharing Mechanism
收藏 引用
Int Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Mayes, Keith Royal Holloway Univ London Informat Secur Grp Smart Card Ctr Egham Surrey England
The application sharing mechanism in multi-application smart cards facilitates corroborative schemes between applications in a secure and reliable manner. Traditional application sharing can only be realised if both a... 详细信息
来源: 评论
A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography
A Simple and Efficient Way to Combine Microcontrollers with ...
收藏 引用
World Congress on Engineering and Computer Science
作者: Zhang, Echo P. Fang, Junbin Li, Delta C. C. Ching, Michael W. H. Chim, T. W. Hui, Lucas C. K. Yiu, S. M. Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China
Microcontroller can be easily adopted in various applications with a variety of peripherals due to its merits of small size, simple architecture and etc. However, the limited computing power restricts its application ... 详细信息
来源: 评论
NFC Based Secure Mobile Healthcare System
NFC Based Secure Mobile Healthcare System
收藏 引用
6th International Conference on Communication Systems and Networks (COMSNETS)
作者: Sethia, Divyashikha Gupta, Daya Mittal, Tanuj Arora, Ujjwal Saran, Huzur Delhi Technol Univ Dept Comp Engn New Delhi India Indian Inst Technol Dept Comp Engn New Delhi India
With the recent increase in usage of mobile devices especially in developing countries, they can be used for an efficient healthcare management. In this work, we have proposed a novel architecture for improving health... 详细信息
来源: 评论
Protection of Systems Against Fuzzing Attacks  11th
Protection of Systems Against Fuzzing Attacks
收藏 引用
11th International Symposium on Foundations and Practice of Security (FPS)
作者: Ouairy, Leopold Le-Bouder, Helene Lanet, Jean-Louis INRIA Rennes France IMT Atlantique Rennes France
A fuzzing attack enables an attacker to gain access to restricted resources by exploiting a wrong specification implementation. Fuzzing attack consists in sending commands with parameters out of their specification ra... 详细信息
来源: 评论
Towards a More Flexible IoT SAFE Implementation  24
Towards a More Flexible IoT SAFE Implementation
收藏 引用
24th Euromicro Conference on Digital System Design (DSD)
作者: Pirker, Dominic Fischer, Thomas Reiter, Christoph Witschnig, Harald Steger, Christian Graz Univ Technol Inst Tech Informat Graz Austria Infineon Technol AG Dev Ctr Graz Graz Austria
The Internet of Things (IoT) is disseminating our daily life and gets ubiquitous not only in industry. With this growth, device and communications security is increasingly important. Hardware Security Modules (HSMs) a... 详细信息
来源: 评论
An asymmetric cryptography secure channel protocol for smart cards
收藏 引用
19th International Information Security Conference held at the 18th World Computer Congress
作者: Rantos, K Markantonakis, K Univ London Royal Holloway & Bedford New Coll Informat Secur Grp Egham TW20 0EX Surrey England
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overbeads introduced in the underlying smart card microprocessors and the complexities introduced b... 详细信息
来源: 评论
On Development of Inspection System for Biometric Passports Using java
On Development of Inspection System for Biometric Passports ...
收藏 引用
Joint International Conference on Biometric ID Management and Multimodal Communication (BioID-MultiComm)
作者: Teran, Luis Drygajlo, Andrzej Swiss Fed Inst Technol Lausanne EPFL Speech Proc & Biometr Grp Lausanne Switzerland
Currently it is possible to implement Biometric Passport applets according to ICAO specifications. In this paper. an ePassport java card applet, according to ICAO specifications Using the Basic Access Control security... 详细信息
来源: 评论