Accede 发表于 2025-3-27 00:46:37

http://reply.papertrans.cn/47/4654/465349/465349_31.png

Thymus 发表于 2025-3-27 04:57:58

http://reply.papertrans.cn/47/4654/465349/465349_32.png

不愿 发表于 2025-3-27 08:19:23

Performance Evaluation of Java Card Bytecodesing the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode level. The first experimental results show that bytecode execution time isolation is possible.

Champion 发表于 2025-3-27 10:04:30

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart cards (contact and contactless) and wireless sensor network node technologies. The goal of this research was to determine “Security Lessons” learned from the world of smart cards that may be applied to wireless sensor network nodes and vice versa.

mortuary 发表于 2025-3-27 17:34:26

http://reply.papertrans.cn/47/4654/465349/465349_35.png

SLUMP 发表于 2025-3-27 18:01:38

http://reply.papertrans.cn/47/4654/465349/465349_36.png

GROVE 发表于 2025-3-28 02:00:31

http://reply.papertrans.cn/47/4654/465349/465349_37.png

窝转脊椎动物 发表于 2025-3-28 02:28:28

Survey and Benchmark of Stream Ciphers for Wireless Sensor Networksplatform of sensors some stream ciphers. First, we sum-up the security provided by the chosen stream ciphers (especially the ones dedicated to software uses recently proposed in the European Project Ecrypt, workpackage eStream ) and presents some implementation tests performed on the platform .

好开玩笑 发表于 2025-3-28 08:13:52

http://reply.papertrans.cn/47/4654/465349/465349_39.png

alcohol-abuse 发表于 2025-3-28 12:01:43

Conference proceedings 2007uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Informatio
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; First IFIP TC6 / WG Damien Sauveron,Konst