咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 47 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 108 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 27 篇 电气工程
    • 21 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 152 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 6 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 118 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java Card"
152 条 记 录,以下是81-90 订阅
排序:
Recovering from a lost digital wallet: A smart cards perspective extended abstract
收藏 引用
PERVASIVE AND MOBILE COMPUTING 2016年 29卷 113-129页
作者: Akrama, Raja Naeem Markantonakis, Konstantinos Sauveron, Damien Univ London Royal Holloway Informat Secur Grp Smart Card Ctr Egham Surrey England Univ Limoges XLIM UMR CNRS 7252 Dept Math & Informat Limoges France
Multi-application smart cards enable a user to potentially have a diverse set of applications on her smart card. The growing trend of services convergence fuelled by Near Field Communication and smart phones has made ... 详细信息
来源: 评论
When time meets test
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2018年 第4期17卷 395-409页
作者: Lanet, Jean-Louis Le Bouder, Helene Benattou, Mohammed Legay, Axel INRIA RBA LHS PEC Campus Beaulieu263 Ave Gen Leclerc F-35042 Rennes France Univ Ibn Tofail Lab LARIT Kenitra Morocco
One of the main challenges in system's development is to give a proof of evidence that its functionalities are correctly implemented. This objective is mostly achieved via testing techniques, which include softwar... 详细信息
来源: 评论
The MAOS trap
收藏 引用
COMPUTING & CONTROL ENGINEERING JOURNAL 2001年 第1期12卷 4-10页
作者: Elliott, J mobEcom
One of the most frequent questions I am asked in my work is 'how do the three multi-application operating system smart card platforms (java card, MULTOS and Windows for Smart card) compare?'. There is so much ... 详细信息
来源: 评论
Bytecode verification on java smart cards
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2002年 第4期32卷 319-340页
作者: Leroy, X Inst Natl Rech Informat & Automat F-78153 Le Chesnay France Trusted Log F-78000 Versailles France
This article presents a novel approach to the problem of bytecode verification for java card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requ... 详细信息
来源: 评论
Tool-assisted specification and verification of typed low-level languages
收藏 引用
JOURNAL OF AUTOMATED REASONING 2005年 第4期35卷 295-354页
作者: Barthe, Gilles Courtieu, Pierre Dufay, Guillaume De Sousa, Simao Melo INRIA Sophia Antipolis Sophia Antipolis France Univ Orleans F-45067 Orleans France Univ Ottawa Ottawa ON K1N 6N5 Canada Univ Beira Interior Covilha Portugal
Bytecode verification is one of the key security functions of several architectures for mobile and embedded code, including java, java card, and .NET. Over the past few years, its formal correctness has been studied e... 详细信息
来源: 评论
Using control dependencies for space-aware bytecode verification
收藏 引用
COMPUTER JOURNAL 2006年 第2期49卷 234-248页
作者: Bernardeschi, C Lettieri, G Martini, L Masci, P Univ Pisa Dipartimento Ingn Informaz I-56100 Pisa Italy
java applets run on a Virtual Machine that checks code integrity and correctness before execution using a module called the Bytecode Verifier. java card technology allows java applets to run on smart cards. The large ... 详细信息
来源: 评论
Trend of smart card (IC card) in security fields in Japan
收藏 引用
NEC RESEARCH & DEVELOPMENT 2002年 第3期43卷 208-212页
作者: Kosugi, S
In recent years, the systems applying Smart cards or IC cards are gradually reaching the stage of genuine practical use. In this paper, the expression "IC card" is used for "Smart card." An IC card... 详细信息
来源: 评论
A hybrid user authentication protocol for mobile IPTV service
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2013年 第2期65卷 283-296页
作者: Kim, Soo-Cheol Yeo, Sang-Soo Kim, Sung Kwon Chung Ang Univ Div Comp Sci & Engn Seoul 156756 South Korea Mokwon Univ Div Comp Engn Taejon South Korea
IPTV, a technological convergence that combines communication and broadcasting technologies, delivers customized, interactive TV content and other multimedia information over wired and wireless connections. Providing ... 详细信息
来源: 评论
Virus in a smart card: Myth or reality?
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2013年 第2-3期18卷 130-137页
作者: Hamadouche, Samiya Lanet, Jean-Louis Univ Mhamed Bougara Boumerdes Fac Sci LIMOSE Lab Boumerdes 35000 Algeria Univ Limoges 123 Rue Albert Thomas F-87000 Limoges France
Smart cards are often the target of software or hardware attacks. The most recent attacks are based on fault injection which modifies the behavior of the application. We demonstrate that it is possible to design appli... 详细信息
来源: 评论
A cost-effective add-on-value card-assisted firewall over Taiwan's NHIVPN framework
收藏 引用
MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE 2007年 第2期32卷 103-116页
作者: Huang, Jyh-Win Hou, Ting-Wei Natl Cheng Kung Univ Dept Engn Sci Tainan 701 Taiwan Natl Penghu Univ Penghu Taiwan
Besides the overall budget for building the infrastructure of a healthcare- service- based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 pl... 详细信息
来源: 评论