找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices; International Worksh Gilles Barthe,Lilian Burdy,Traian Muntean

[复制链接]
楼主: 空隙
发表于 2025-3-26 23:50:37 | 显示全部楼层
发表于 2025-3-27 03:54:22 | 显示全部楼层
Zusammenfassung, Kritik und Ausblick,namic checks in the Java Card Virtual Machine. This paper describes a refined type system for Java Card that enables static checking of applet isolation. With this type system, firewall violations are detected at compile time. Only a special kind of downcast requires dynamic checks.
发表于 2025-3-27 08:18:25 | 显示全部楼层
Zusammenfassung, Kritik und Ausblick,ification of . programs considerably more difficult, because they cannot be formalised in a logic based on pre- and postconditions. The KeY system includes an interactive theorem prover for . source code that models the full . standard including transactions. Based on a case study of realistic size
发表于 2025-3-27 11:56:27 | 显示全部楼层
发表于 2025-3-27 15:12:09 | 显示全部楼层
Geschichte der Unterdruck-Flotation, environments are two among a lot of challenging issues. Next generation smart cards, so-called smart devices, are regarded as personal devices providing a secured execution and storage environment for application tasks and sensitive privacy information, respectively. Hardware evolution of smart dev
发表于 2025-3-27 20:25:25 | 显示全部楼层
发表于 2025-3-27 22:07:29 | 显示全部楼层
Diskussion der Versuchsergebnisse,he establish safety properties on it. After the first design step, we automatically translate the synthesizable VHDL into a functional form. The combination of symbolic simulation, automatic transfer function extraction, and theorem proving is used to show that the VHDL design is functionally compli
发表于 2025-3-28 02:19:50 | 显示全部楼层
https://doi.org/10.1007/978-3-322-99153-9n computing devices, next generation cards will consist in embedded Java micro-server platforms. Those platforms will be able to serve various types of services and applications thanks to two important system features: adaptability and maintainability. Two features that have to be carefully taken in
发表于 2025-3-28 09:53:09 | 显示全部楼层
发表于 2025-3-28 14:15:27 | 显示全部楼层
History-Based Access Control and Secure Information Flow,ypes dependent on permission state. We also show that in contrast to stack inspection, confidential information can be leaked by the history-based access control mechanism itself. The analysis ensures a noninterference property formalizing confidentiality.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-23 15:22
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表