咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 47 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 108 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 27 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 152 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 6 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 118 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java Card"
152 条 记 录,以下是71-80 订阅
排序:
Type classification against Fault Enabled Mutant in java based Smart card
Type classification against <i>Fault Enabled Mutant</i> in J...
收藏 引用
7th International Conference on Availability, Reliability and Security (ARES)
作者: Dubreuil, Jean Bouffard, Guillaume Lanet, Jean-Louis Cartigny, Julien Univ Limoges XLIM Labs Secure Smart Devices SSD Team F-87060 Limoges France
Smart card are often the target of software or hardware attacks. For instance the most recent attacks are based on fault injection which can modify the behavior of applications loaded in the card, changing them as mut... 详细信息
来源: 评论
Side Channel Analysis of a java--based Contactless Smart card
Side Channel Analysis of a Java--based Contactless Smart Car...
收藏 引用
作者: Mateos Santillan, Edgar University of Waterloo
学位级别:master
Smart cards are widely used in different areas of modern life including identification, banking, and transportation cards. Some types of cards are able to store data and process information as well. A number of them c... 详细信息
来源: 评论
Design and Implementation of A Low Power java Coprocessor for Dual-interface IC Bank card
Design and Implementation of A Low Power Java Coprocessor fo...
收藏 引用
2011 IEEE 9th International Conference on ASIC(2011年第九届IEEE国际专用集成电路大会)
作者: Junwei He Liji Wu Xiangmin Zhang Institute of Microelectronics Tsinghua National Laboratory for Information Science and Technology. Tsinghua University Beijing 100084 China
java card Coprocessor is used for implementing java card Virtual Machine by hardware. java card needs to run with low power consumption, especially in the field of contactless java card. In this paper, a previous desi... 详细信息
来源: 评论
Load time code validation for mobile phone java cards
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2013年 第2-3期18卷 108-129页
作者: Gadyatskaya, Olga Massacci, Fabio Nguyen, Quang-Huy Chetali, Boutheina Univ Trento Dept Informat Engn & Comp Sci Via Sommarive 14 I-38123 Trento Italy Trusted Labs F-78000 Versailles France
Over-the-air (OTA) application installation and updates have become a common experience for many end-users of mobile phones. In contrast, OTA updates for applications on the secure elements (such as smart cards) are s... 详细信息
来源: 评论
New Countermeasures against Fault and Software Type Confusion Attacks on java cards
New Countermeasures against Fault and Software Type Confusio...
收藏 引用
8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP)
作者: Barbu, Guillaume Giraud, Christophe Oberthur Technol Cryptog & Secur Grp F-33600 Pessac France
Attacks based on type confusion against java card platforms have been widely studied in the literature over the past few years. Until now, no generic countermeasure has ever been proposed to cover simultaneously and e... 详细信息
来源: 评论
Detecting Attacks on java cards by Fingerprinting Applets
Detecting Attacks on Java Cards by Fingerprinting Applets
收藏 引用
22nd IEEE International WETICE Conference (WETICE)
作者: Morana, Giovanni Tramontana, Emiliano Zito, Daniele Univ Catania Dipartimento Matemat & Informat I-95124 Catania Italy
Differently from classical JVMs, generally javacard Virtual Machines (JCVMs) rely only on limited amount of resources typical of smart cards. Recently, several mixes of logical and physical manoeuvres have been devise... 详细信息
来源: 评论
Application-Replay Attack on java cards: When the Garbage Collector Gets Confused  12
Application-Replay Attack on Java Cards: When the Garbage Co...
收藏 引用
4th International Symposium on Engineering Secure Software and Systems
作者: Barbu, Guillaume Hoogvorst, Philippe Duc, Guillaume Inst Telecom Telecom ParisTech CNRS LTCI Dept COMELEC F-75634 Paris 13 France
java card 3.0 specifications have brought many new features in the java card world, amongst which a true garbage collection mechanism. In this paper, we show how one could use this specific feature to predict the refe... 详细信息
来源: 评论
Detecting Attacks on java cards by Fingerprinting Applets
Detecting Attacks on Java Cards by Fingerprinting Applets
收藏 引用
IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
作者: Giovanni Morana Emiliano Tramontana Daniele Zito Dipartimento di Matematica e Informatica University of Catania
Differently from classical JVMs, generally javaC-ard Virtual Machines (JCVMs) rely only on limited amount of resources typical of smart cards. Recently, several mixes of logical and physical manoeuvres have been devis... 详细信息
来源: 评论
A novel consumer-centric card management architecture and potential security issues
收藏 引用
INFORMATION SCIENCES 2015年 321卷 150-161页
作者: Akram, Raja Naeem Markantonakis, Konstantinos Sauveron, Damien Univ London Smart Card Ctr Informat Secur Grp Egham Surrey England Univ Limoges UMR 7252 XLIM CNRSDept Math Informat Limoges France
Multi-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from different application providers on a single smart c... 详细信息
来源: 评论
A model driven architecture for the development of smart card software
收藏 引用
COMPUTER LANGUAGES SYSTEMS & STRUCTURES 2014年 第2期40卷 53-72页
作者: Saritas, Hidayet Burak Kardas, Geylani Ege Univ Uluslararasi Bilgisayar Enstitusu TR-35100 Izmir Turkey
Smart cards are portable integrated devices that store and process data. Speed, security and portability properties enable smart cards to have a widespread usage in various fields including telecommunication, transpor... 详细信息
来源: 评论