咨询与建议

限定检索结果

文献类型

  • 20 篇 期刊文献
  • 11 篇 会议
  • 8 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 29 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 9 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 网络空间安全
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 哲学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 40 篇 javacard
  • 7 篇 智能卡
  • 5 篇 处理器
  • 4 篇 smart card
  • 3 篇 security
  • 2 篇 multos
  • 2 篇 一卡通
  • 2 篇 java
  • 2 篇 smartcard
  • 2 篇 安全性
  • 2 篇 移动代理
  • 2 篇 aes
  • 2 篇 applet
  • 2 篇 rfid
  • 1 篇 arm trustzone
  • 1 篇 显式选择
  • 1 篇 data breach
  • 1 篇 ssca
  • 1 篇 线性检测
  • 1 篇 internet of thin...

机构

  • 3 篇 南京邮电学院
  • 3 篇 中国科学技术大学
  • 2 篇 masaryk univ brn...
  • 2 篇 中国科技大学
  • 1 篇 masaryk univ cro...
  • 1 篇 ibm corp zurich ...
  • 1 篇 国防科学技术大学
  • 1 篇 中国科学院研究生...
  • 1 篇 复旦大学
  • 1 篇 andalusian ctr i...
  • 1 篇 广州电信研究院
  • 1 篇 西安交通大学
  • 1 篇 兰州大学
  • 1 篇 浙江经贸职业技术...
  • 1 篇 ucl england
  • 1 篇 上海计算机软件技...
  • 1 篇 北京智芯微电子科...
  • 1 篇 智能信息处理与实...
  • 1 篇 univ franche com...
  • 1 篇 清华大学

作者

  • 5 篇 张德学
  • 4 篇 傅忠谦
  • 4 篇 郭立
  • 3 篇 guo li
  • 3 篇 svenda petr
  • 2 篇 王汝传
  • 2 篇 zhang de-xue
  • 2 篇 孙开翠
  • 2 篇 fu zhong-qian
  • 2 篇 何力
  • 1 篇 zaoral lukas
  • 1 篇 邓莉
  • 1 篇 jacobs b
  • 1 篇 guo zhengwei
  • 1 篇 senciales jose-c...
  • 1 篇 宫萍
  • 1 篇 sedlacek vladimi...
  • 1 篇 傅俊
  • 1 篇 许晶
  • 1 篇 崔建琪

语言

  • 25 篇 中文
  • 15 篇 英文
检索条件"主题词=JavaCard"
40 条 记 录,以下是21-30 订阅
排序:
Standards in the smart card world
收藏 引用
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING 2001年 第4期36卷 473-487页
作者: Husemann, D IBM Corp Zurich Res Lab Div Res CH-8803 Ruschlikon Switzerland
In this paper, I take you on a guided tour through the world of smart card standards. We briefly touch ISO 7816, the defining standards for smart cards;then we take a longer look at current de-facto standards for smar... 详细信息
来源: 评论
Security Improvement Based on Fingerprint Match-on-card for Access Control Protocol in ePassports
Security Improvement Based on Fingerprint Match-on-card for ...
收藏 引用
4th European Conference on Information Management and Evaluation
作者: Lopez, Cristobal Navas, Francisco Senciales, Jose-Carlos Salinas, Jose Andalusian Ctr Innovat Informat & Commun Technol Malaga Spain
Nowadays e-passports base their security on Basic Access Control (BAC) protocol, whose encryption keys are derived from the Machine Readable Zone (MRZ) characters of the document. MRZ data has very low entropy, thus t... 详细信息
来源: 评论
WooKey: Designing a Trusted and Efficient USB Device  19
WooKey: Designing a Trusted and Efficient USB Device
收藏 引用
35th Annual Computer Security Applications Conference (ACSA)
作者: Benadjila, Ryad Michelizza, Arnauld Renard, Mathieu Thierry, Philippe Trebuchet, Philippe ANSSI Paris France
The work presented in this paper takes place in the design initiatives that have emerged to thwart BadUSB threats [59]. Though many attempts were focusing on the host side, by enhancing the operating system's USB ... 详细信息
来源: 评论
The case for a secure multi-application smart card operating system  1st
The case for a secure multi-application smart card operating...
收藏 引用
1st International Workshop on Information Security (ISW 97)
作者: Markantonakis, C Univ London Royal Holloway & Bedford New Coll Dept Comp Sci Informat Secur Grp Egham TW20 0EX Surrey England
The idea of a multi-application smart card operating system is not a new one, but only recently the smart card industry is catching up with proper software and hardware architectures that contribute in the anticipated... 详细信息
来源: 评论
Implementation Aspects of Mobile and Embedded Trusted Computing
收藏 引用
International Conference on the Technical and Socio-Economic Aspects of Trusted Computing (Trust 2009)
作者: Dietrich, Kurt Winter, Johannes Inst Appl Informat Proc & Commun A-8010 Graz Austria
Nowadays, trusted platform modules (TPMs) are usually deployed together with desktop PCs and notebooks. However, these platforms are not the only ones that can host TPMs. Mobile and embedded platforms like cell phones... 详细信息
来源: 评论
TrustBox: A Security Architecture for Preventing Data Breaches
TrustBox: A Security Architecture for Preventing Data Breach...
收藏 引用
19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP)
作者: Schmidt, Matthias Fahl, Sascha Schwarzkopf, Roland Freisleben, Bernd Univ Marburg Dept Math & Comp Sci Hans Meerwein Str 3 D-35032 Marburg Germany
In this paper, a novel approach to prevent accidental or deliberate data breaches is presented. The proposed approach provides platform, network and offline security. Data is categorized as sensitive or insensitive, a... 详细信息
来源: 评论
Safety property driven test generation from JML specifications
收藏 引用
1st Joint International Workshop on FATES/RV
作者: Bouquet, Fabrice Dadeau, Frederic Groslambert, Julien Julliand, Jacques Univ Franche Comte LIFE CNRS INRIA 16 Route Gray F-25030 Besancon France
This paper describes the automated generation of test sequences derived from a JML specification and a safety property written in an ad hoc language, named JTPL. The functional JML model is animated to build the test ... 详细信息
来源: 评论
Fooling Primality Tests on Smartcards  25th
Fooling Primality Tests on Smartcards
收藏 引用
25th European Symposium on Research in Computer Security (ESORICS)
作者: Sedlacek, Vladimir Jancar, Jan Svenda, Petr Masaryk Univ Brno Czech Republic Ca Foscari Univ Venice Venice Italy
We analyse whether the smartcards of the javacard platform correctly validate primality of domain parameters. The work is inspired by Albrecht et al. [1], where the authors analysed many open-source libraries and cons... 详细信息
来源: 评论
Using MTMs to Secure Electronic Signatures Generation
Using MTMs to Secure Electronic Signatures Generation
收藏 引用
9th International Conference on Communications (COMM)
作者: Serb, Mihai Patriciu, Victor Valeriu Mil Tech Acad Doctoral Sch Bucharest Romania
In an ever growing number of countries, electronic signatures can produce the same legal effects as handwritten signatures, if certain conditions are met. But these rules do not alleviate the risk of an attacker tampe... 详细信息
来源: 评论
javacardAPI的安全性测试方法
收藏 引用
中国集成电路 2019年 第4期28卷 81-84,93页
作者: 左捷 上海计算机软件技术开发中心 上海201112 上海市计算机软件评测重点实验室 上海201112
随着现代生活中对于智能卡多应用需求的不断提升,Java Card得到了越来越广泛的使用。Java Card标准API的定义是将平台和应用开发进行了分离,使得开发应用更为便利。同时,Java Card提供的这种通用且开放的模式也使得Java Card API的安全... 详细信息
来源: 评论