咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 49 篇 期刊文献
  • 25 篇 学位论文

馆藏范围

  • 154 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 136 篇 工学
    • 110 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 27 篇 电气工程
    • 18 篇 信息与通信工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 5 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 154 篇 java card
  • 36 篇 smart card
  • 12 篇 security
  • 12 篇 smart cards
  • 11 篇 java
  • 9 篇 android
  • 8 篇 智能卡
  • 8 篇 multos
  • 7 篇 bytecode verific...
  • 6 篇 globalplatform
  • 6 篇 trusted computin...
  • 6 篇 cryptography
  • 6 篇 fault attack
  • 5 篇 performance
  • 5 篇 authentication
  • 5 篇 secure element
  • 5 篇 text
  • 5 篇 jcvm
  • 4 篇 runtime verifica...
  • 4 篇 jml

机构

  • 6 篇 brno university ...
  • 5 篇 北京邮电大学
  • 4 篇 graz univ techno...
  • 3 篇 hubei provincial...
  • 3 篇 inria lhs pec 26...
  • 3 篇 school of automa...
  • 2 篇 univ limoges dep...
  • 2 篇 北京交通大学
  • 2 篇 radboud univ nij...
  • 2 篇 infineon technol...
  • 2 篇 beijing jiaotong...
  • 2 篇 natl cheng kung ...
  • 2 篇 graz univ techno...
  • 2 篇 ain shams univ c...
  • 2 篇 nxp semicond aus...
  • 2 篇 inria sophia ant...
  • 2 篇 inria rocquencou...
  • 2 篇 univ london smar...
  • 2 篇 inria rba lhs pe...
  • 2 篇 radboud univ nij...

作者

  • 12 篇 lanet jean-louis
  • 7 篇 steger christian
  • 7 篇 markantonakis ko...
  • 6 篇 akram raja naeem
  • 5 篇 weiss reinhold
  • 4 篇 mesbah abdelhak
  • 4 篇 mezghiche mohame...
  • 4 篇 raschke wolfgang
  • 4 篇 loinig johannes
  • 4 篇 zilli massimilia...
  • 4 篇 sauveron damien
  • 4 篇 bouffard guillau...
  • 3 篇 paradinas pierre
  • 3 篇 jean-louis lanet
  • 3 篇 cordry julien
  • 3 篇 jung min-soo
  • 3 篇 sobh mohamed
  • 3 篇 bouzefrane samia
  • 3 篇 barbu guillaume
  • 3 篇 liang junling

语言

  • 120 篇 英文
  • 23 篇 中文
  • 11 篇 其他
检索条件"主题词=Java card"
154 条 记 录,以下是111-120 订阅
排序:
Cross-Platform Application Sharing Mechanism
Cross-Platform Application Sharing Mechanism
收藏 引用
Int Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Mayes, Keith Royal Holloway Univ London Informat Secur Grp Smart Card Ctr Egham Surrey England
The application sharing mechanism in multi-application smart cards facilitates corroborative schemes between applications in a secure and reliable manner. Traditional application sharing can only be realised if both a... 详细信息
来源: 评论
Secure and Trusted Execution: Past, Present and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems  15
Secure and Trusted Execution: Past, Present and Future - A C...
收藏 引用
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA)
作者: Shepherd, Carlton Arfaoui, Ghada Gurulian, Iakovos Lee, Robert P. Markantonakis, Konstantinos Akram, Raja Naeem Sauveron, Damien Conchon, Emmanuel Royal Holloway Univ London ISG SCC Egham Surrey England Univ Limoges Dept Math Informat CNRS XLIMUMR 7252 Limoges France Univ Bordeaux CNRS UMR 5800 LaBRI Talence France Orange Labs Chatillon France
Notions like security, trust, and privacy are crucial in the digital environment and in the future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical Systems (CPS), their importance ... 详细信息
来源: 评论
A secure channel protocol for multi-application smart cards based on public key cryptography
A secure channel protocol for multi-application smart cards ...
收藏 引用
8th Annual Conference on Communications and Multimedia Security
作者: Markantonakis, K Mayes, K Univ London Royal Holloway & Bedford New Coll Informat Secur Grp Smart Card Ctr Egham TW20 0EX Surrey England
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced b... 详细信息
来源: 评论
Model-Driven Code Generation for Secure Smart card Applications
Model-Driven Code Generation for Secure Smart Card Applicati...
收藏 引用
20th Australian Software Engineering Conference 2009
作者: Moebius, Nina Stenzel, Kurt Grandy, Holger Reif, Wolfgang Univ Augsburg Dept Software Engn & Programming Languages D-8900 Augsburg Germany
SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-dependent UML model of the system under development we generate a platform-specific m... 详细信息
来源: 评论
java type confusion and fault attacks
收藏 引用
3rd International Workshop on Fault Diagnosis and Tolerance in Cryptography
作者: Vertanen, Olli Univ Kuopio Dept Comp Sci Kuopio 70210 Finland
Virtual machines executing high level languages are nowadays found even in small secure embedded systems. We have studied properties of the java virtual machine and the java virtual machine language under certain faul... 详细信息
来源: 评论
Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA)  21
Enabling Anonymous Authenticated Encryption with a Novel Ano...
收藏 引用
21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Schermann, Raphael Urian, Rainer Toegl, Ronald Bock, Holger Steger, Christian Graz Univ Technol Inst Tech Informat Graz Austria Infineon Technol AG Augsburg Germany Infineon Technol AG Dev Ctr Graz Graz Austria
Anonymous credential schemes based on elliptic curve pairings are often used to implement privacy-friendly cryptographic protocols, with Direct Anonymous Attestation and Enhanced Privacy IDentification being the most ... 详细信息
来源: 评论
Smart cards: State-of-the-Art to Future Directions
Smart Cards: State-of-the-Art to Future Directions
收藏 引用
IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Univ Waikato Dept Comp Sci Cyber Secur Lab Hamilton New Zealand Univ London Royal Holloway Smart Card Ctr Informat Secur Grp Egham Surrey England
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, ... 详细信息
来源: 评论
Developing Efficient Blinded Attribute Certificates on Smart cards via Pairings
Developing Efficient Blinded Attribute Certificates on Smart...
收藏 引用
9th IFIP International Conference on Smart card Research and Advanced Application
作者: Batina, Lejla Hoepman, Jaap-Henk Jacobs, Bart Mostowski, Wojciech Vullers, Pim Radboud Univ Nijmegen Inst Comp & Informat Sci Nijmegen Netherlands
This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points o... 详细信息
来源: 评论
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager  13
Collaborative and Ubiquitous Consumer Oriented Trusted Servi...
收藏 引用
13th IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom)
作者: Akram, Raja Naeem Markantonakis, Konstantinos Sauveron, Damien Univ Waikato Dept Comp Sci Waikato New Zealand Univ London ISG Smart Card Ctr Royal Holloway Egham Surrey England Univ Limoges Dept Math Informat CNRS XLIMUMR 7252 Limoges France
Near Field Communication (NFC) enables a mobile phone to emulate a contactless smart card. This has rein-vigorated the multiapplication smart card initiative. Trusted Service Manager (TSM) is an entity that is trusted... 详细信息
来源: 评论
A Portable TPM Based on USB Key  10
A Portable TPM Based on USB Key
收藏 引用
17th ACM Conference on Computer and Communications Security (CCS)
作者: Zhang, Dawei Han, Zhen Yan, Guangwen Beijing Jiaotong Univ Sch Comp & Informat Technol Beijing Peoples R China Beijing Watchdata Syst Co Div Res Beijing Peoples R China
Trusted computing technology aims to enhance the security of platform by the TPM. But there are some drawbacks of TCG's Trusted Computing architecture for user-based applications. This paper presents a new concept... 详细信息
来源: 评论