咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 47 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 108 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 27 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 152 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 6 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 118 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java Card"
152 条 记 录,以下是21-30 订阅
排序:
A Fault Attack Emulation Environment to Evaluate java card Virtual-Machine Security  17
A Fault Attack Emulation Environment to Evaluate Java Card V...
收藏 引用
17th Euromicro Conference on Digital System Design (DSD)
作者: Lackner, Michael Berlach, Reinhard Hraschan, Michael Weiss, Reinhold Steger, Christian Graz Univ Technol Inst Tech Informat A-8010 Graz Austria
java-enabled smart cards are used in different fields of application, such as access control, electronic banking, and passports. On these cards, a standardized virtual machine runs, which protects the security-critica... 详细信息
来源: 评论
Implementing FISCIC card specification and developing health care application using java card
Implementing FISCIC card specification and developing health...
收藏 引用
International Symposium on Multimedia Software Engineering
作者: Ma, TY Hou, TW Natl Cheng Kung Univ Dept Engn Sci Tainan 701 Taiwan
java card specification extends java technology into smart card. FISC IC card specification is the only financial smart card standard in Taiwan. In the Peng-Hu Health Care IC card Project, we adopted FISC-compatible I... 详细信息
来源: 评论
A java card Based Approach for Smart Meter Gateway Security
A Java Card Based Approach for Smart Meter Gateway Security
收藏 引用
IEEE Conference on Innovative Smart Grid Technologies - Asia (ISGT Asia)
作者: Piska, Srinivas Shetty, Manasa Infineon Technol India Pvt Ltd Bangalore Karnataka India
Smart Meter Gateway is the central communication component in the Smart Grid Infrastructure. It needs an easy-to-maintain and updatable security provider. The SMGW system secures its operations utilizing the services ... 详细信息
来源: 评论
PhiAttack Rewriting the java card Class Hierarchy  20th
PhiAttack Rewriting the Java Card Class Hierarchy
收藏 引用
20th International Conference on Smart card Research and Advanced Applications (cardIS)
作者: Dubreuil, Jean Bouffard, Guillaume Serma Safety & Secur Pessac France Natl Cybersecur Agcy France ANSSI Paris France PSL Univ CNRS DIENS Ecole Normale Super Informat Secur Grp Paris France
Compiling java card applets is based on the assumption that export files used to translate java class item to java card CAP tokens are legitimate. Bouffard et al. [2] reversed the translation mechanism. Based on malic... 详细信息
来源: 评论
Evaluation of java card performance
Evaluation of Java Card performance
收藏 引用
8th International Conference on Smart card Research and Advanced Applications
作者: Bouzefrane, Samia Cordry, Julien Meunier, Herve Paradinas, Pierre Conservatoire Natl Arts & Metiers 292 Rue St Martin F-75003 Paris France INRIA POPS Parc Scientifique Haute Borne F-70478 Villeneuve Dascq France INRIA F-78150 Le Chesnay France
With the growing acceptance of the java card standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables pe... 详细信息
来源: 评论
Implementation conditional access system for pay TV based on java card
Implementation conditional access system for pay TV based on...
收藏 引用
3rd International Conference on Computational Electromagnetics and its Applications
作者: Prasertsatid, N King Monkuts Inst Technol Dept Telecommun Engn Ladkrabang Thailand
This paper presents implementation conditional access system for pay TV based on java card Conditional access system (CA) is widely used to control user access to system and protect the pay TV programs. This java smar... 详细信息
来源: 评论
High Performance java card Operating System  8
High Performance Java Card Operating System
收藏 引用
8th International Conference on Software Security and Reliability (SERE)
作者: Eletriby, Mohammad R. Sobh, Mohamed Bahaa-Eldin, Ayman M. Fahmy, Hossam M. A. Ain Shams Univ Comp & Syst Engn Dept Cairo Egypt
Due to the fast evolving of trusted computing environments and internet-of-things an eager need has been established for open platforms which support interchangeable technologies to co-exist without threatening system... 详细信息
来源: 评论
Performance evaluation of java card bytecodes
收藏 引用
1st International Workshop on Information Security Theory and Practice
作者: Paradinas, Pierre Cordry, Julien Bouzefrane, Samia INRIA Rocquencourt F-78150 Le Chesnay France CNAM F-75003 Paris France
The advent of the java card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucia... 详细信息
来源: 评论
Design and Implementation of a Zero-Knowledge Authentication Framework for java card
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2011年 第3期5卷 1-18页
作者: Patel, Ahmed Kalajdzic, Kenan Golafshan, Laleh Taghavi, Mona Univ Kebangsaan Malaysia Comp Sci Bangi Malaysia Kingston Univ Kingston Upon Thames Surrey England Ctr Comp Educ Tuzla Bosnia & Herceg Islamic Azad Univ Dept Comp Engn & IT Sci & Res Branch Fars Iran Islamic Azad Univ Dept Comp Sci & Res Branch Tehran Iran
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart ... 详细信息
来源: 评论
An Application Specific Processor for Enhancing Dictionary Compression in java card Environment  5
An Application Specific Processor for Enhancing Dictionary C...
收藏 引用
5th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)
作者: Zilli, Massimiliano Raschke, Wolfgang Loinig, Johannes Weiss, Reinhold Steger, Christian Graz Univ Technol Inst Tech Informat Inffeldgasse 16-I Graz Austria NXP Semicond Austria GmbH Business Unit Identificat Gratkorn Austria
Smart cards are low-end embedded systems used in the fields of telecommunications, banking and identification. java card is a reduced set of the java standard designed for these systems. In a context of scarce resourc... 详细信息
来源: 评论