找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Smart Card Programming and Security; International Confer Isabelle Attali,Thomas Jensen Conference proceedings 2001 Springer-Verlag Berlin

[复制链接]
楼主: 是消毒
发表于 2025-3-26 23:58:53 | 显示全部楼层
发表于 2025-3-27 04:04:51 | 显示全部楼层
An Internet Authorization Scheme Using Smart-Card-Based Security Kernelsd through a fault- and intrusion-tolerant authorization server, and a local level implemented as a security kernel located on both the local host Java Virtual Machine (JVM) and on a Java Card connected to this host.
发表于 2025-3-27 07:35:24 | 显示全部楼层
An Operational Semantics of the Java Card Firewalleld access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics. Such a description is necessary for formally arguing the correctness of tools for validating the security of Java Card applications.
发表于 2025-3-27 13:00:47 | 显示全部楼层
Towards a Full Formal Specification of the JavaCard API of the JCSystem class, which deals with the . firewall, (atomic) transactions and transient objects. The JCSystem class seems to be the hardest class in the API to specify, and it is closely connected with some of the peculiarities of . as opposed to Java.
发表于 2025-3-27 13:50:31 | 显示全部楼层
ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cardsth timing and power measurements. Here we developed the continuation of his ideas by measuring the field radiated by the processor. Therefore we show that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account. Finally we enumerate countermeasures to be implemented.
发表于 2025-3-27 18:01:52 | 显示全部楼层
Use of Biometrics for User Verification in Electronic Signature Smartcardsical data, then the smartcard has to verify that it is used by the legitimate cardholder. For this purpose, the user has usually to present a PEN. Since smartcards become more and more powerful, it is feasible to implement on-card matching algorithms allowing to perform a biometric user verification in the smartcard.
发表于 2025-3-28 00:23:28 | 显示全部楼层
ty (LCS). There is no one technique that answers all of the questions relative to an LCS, but we argue that the use of these techniques can both inform and complement more narrative approaches. Modellers, scenario builders and transitions analysts have argued over the last 30 years that analytical a
发表于 2025-3-28 04:19:49 | 显示全部楼层
发表于 2025-3-28 09:03:36 | 显示全部楼层
发表于 2025-3-28 11:34:42 | 显示全部楼层
Giampaolo Bellation of body fat prior to hibernation between adult and juvenile individuals. We investigated a population of free-ranging common hamsters in an urban area in southern Vienna, Austria. We applied capture-mark-recapture techniques and focal-animal-sampling for behavioural recordings. Body fat was cal
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-25 23:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表