咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 48 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 135 篇 工学
    • 109 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 27 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 153 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 7 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 119 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java Card"
153 条 记 录,以下是111-120 订阅
排序:
Recovering from a Lost Digital Wallet
Recovering from a Lost Digital Wallet
收藏 引用
15th IEEE International Conference on High Performance Computing and Communications (HPCC) /11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Mayes, Keith Univ Waikato Cyber Secur Lab Dept Comp Sci Waikato New Zealand Univ London Smart Card Ctr Informat Secur Grp Egham Surrey England
Multi-application smart cards enable a user to have multiple applications on her smart card. The growing trend of services convergence fuelled by the Near Field Communication and smartphones has made multi-application... 详细信息
来源: 评论
On-the-fly formal testing of a smart card applet
On-the-fly formal testing of a smart card applet
收藏 引用
20th International Information Security Conference
作者: van Weelden, A Oostdijk, M Frantzen, L Koopman, P Tretmans, J Radboud Univ Nijmegen Inst Comp & Informat Sci Nijmegen Netherlands
This paper presents a case study on the use of formal methods in specification-based, black-box testing of a smart card applet. The system under test is a simple electronic purse application running on a java card pla... 详细信息
来源: 评论
Architecture and Implementation for a System Enabling Smartphones to Access Smart card Based Healthcare Records
Architecture and Implementation for a System Enabling Smartp...
收藏 引用
11th International Conference on Informatics, Management, and Technology in Healthcare (ICIMTH)
作者: Karampelas, Vasilios Pallikarakis, Nicholas Mantas, John Univ Athens Fac Nursing 123 Papadiamantopoulou St Athens Greece Univ Patras Sch Med Rion Patras Greece
The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has... 详细信息
来源: 评论
Persistent Fault Injection Attack From White-box to Black-box  5
Persistent Fault Injection Attack From White-box to Black-bo...
收藏 引用
5th International Conference on Electrical Engineering - Boumerdes (ICEE-B)
作者: Mesbah, Abdelhak Mezghiche, Mohamed Lanet, Jean-louis Univ MHamed Bougara Fac Sci LIMOSE Lab Comp Sci Boumerdes Algeria INRIA LHS PEC Rennes France
Among the protection mechanisms that ensure the java card security, the Byte Code Verifier (BCV) is one of the most important security elements. In fact, embedded applets must be verified prior installation. This prev... 详细信息
来源: 评论
A secure channel protocol for multi-application smart cards based on public key cryptography
A secure channel protocol for multi-application smart cards ...
收藏 引用
8th Annual Conference on Communications and Multimedia Security
作者: Markantonakis, K Mayes, K Univ London Royal Holloway & Bedford New Coll Informat Secur Grp Smart Card Ctr Egham TW20 0EX Surrey England
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced b... 详细信息
来源: 评论
Model-Driven Code Generation for Secure Smart card Applications
Model-Driven Code Generation for Secure Smart Card Applicati...
收藏 引用
20th Australian Software Engineering Conference 2009
作者: Moebius, Nina Stenzel, Kurt Grandy, Holger Reif, Wolfgang Univ Augsburg Dept Software Engn & Programming Languages D-8900 Augsburg Germany
SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-dependent UML model of the system under development we generate a platform-specific m... 详细信息
来源: 评论
java type confusion and fault attacks
收藏 引用
3rd International Workshop on Fault Diagnosis and Tolerance in Cryptography
作者: Vertanen, Olli Univ Kuopio Dept Comp Sci Kuopio 70210 Finland
Virtual machines executing high level languages are nowadays found even in small secure embedded systems. We have studied properties of the java virtual machine and the java virtual machine language under certain faul... 详细信息
来源: 评论
Developing Efficient Blinded Attribute Certificates on Smart cards via Pairings
Developing Efficient Blinded Attribute Certificates on Smart...
收藏 引用
9th IFIP International Conference on Smart card Research and Advanced Application
作者: Batina, Lejla Hoepman, Jaap-Henk Jacobs, Bart Mostowski, Wojciech Vullers, Pim Radboud Univ Nijmegen Inst Comp & Informat Sci Nijmegen Netherlands
This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points o... 详细信息
来源: 评论
Smart cards: State-of-the-Art to Future Directions
Smart Cards: State-of-the-Art to Future Directions
收藏 引用
IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Univ Waikato Dept Comp Sci Cyber Secur Lab Hamilton New Zealand Univ London Royal Holloway Smart Card Ctr Informat Secur Grp Egham Surrey England
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, ... 详细信息
来源: 评论
A Portable TPM Based on USB Key  10
A Portable TPM Based on USB Key
收藏 引用
17th ACM Conference on Computer and Communications Security (CCS)
作者: Zhang, Dawei Han, Zhen Yan, Guangwen Beijing Jiaotong Univ Sch Comp & Informat Technol Beijing Peoples R China Beijing Watchdata Syst Co Div Res Beijing Peoples R China
Trusted computing technology aims to enhance the security of platform by the TPM. But there are some drawbacks of TCG's Trusted Computing architecture for user-based applications. This paper presents a new concept... 详细信息
来源: 评论