nullify 发表于 2025-3-26 23:58:53
http://reply.papertrans.cn/87/8687/868604/868604_31.png清唱剧 发表于 2025-3-27 04:04:51
An Internet Authorization Scheme Using Smart-Card-Based Security Kernelsd through a fault- and intrusion-tolerant authorization server, and a local level implemented as a security kernel located on both the local host Java Virtual Machine (JVM) and on a Java Card connected to this host.Tonometry 发表于 2025-3-27 07:35:24
An Operational Semantics of the Java Card Firewalleld access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctness of tools for validating the security of Java Card applications.包庇 发表于 2025-3-27 13:00:47
Towards a Full Formal Specification of the JavaCard API of the JCSystem class, which deals with the . firewall, (atomic) transactions and transient objects. The JCSystem class seems to be the hardest class in the API to specify, and it is closely connected with some of the peculiarities of . as opposed to Java.Synchronism 发表于 2025-3-27 13:50:31
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cardsth timing and power measurements. Here we developed the continuation of his ideas by measuring the field radiated by the processor. Therefore we show that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account. Finally we enumerate countermeasures to be implemented.笨重 发表于 2025-3-27 18:01:52
Use of Biometrics for User Verification in Electronic Signature Smartcardsical data, then the smartcard has to verify that it is used by the legitimate cardholder. For this purpose, the user has usually to present a PEN. Since smartcards become more and more powerful, it is feasible to implement on-card matching algorithms allowing to perform a biometric user verification in the smartcard.prosperity 发表于 2025-3-28 00:23:28
ty (LCS). There is no one technique that answers all of the questions relative to an LCS, but we argue that the use of these techniques can both inform and complement more narrative approaches. Modellers, scenario builders and transitions analysts have argued over the last 30 years that analytical a脊椎动物 发表于 2025-3-28 04:19:49
http://reply.papertrans.cn/87/8687/868604/868604_38.png数量 发表于 2025-3-28 09:03:36
http://reply.papertrans.cn/87/8687/868604/868604_39.pngCURL 发表于 2025-3-28 11:34:42
Giampaolo Bellation of body fat prior to hibernation between adult and juvenile individuals. We investigated a population of free-ranging common hamsters in an urban area in southern Vienna, Austria. We applied capture-mark-recapture techniques and focal-animal-sampling for behavioural recordings. Body fat was cal