-
1
-
-
0003884049
-
-
Technical report, Technical Univ. Of Denmark, Mar
-
P. Bertelsen. Semantics of Java byte code. Technical report, Technical Univ. Of Denmark, Mar 1997. www.dina.kvl.dk/]˜pmb/.
-
(1997)
Semantics of Java Byte Code
-
-
Bertelsen, P.1
-
2
-
-
2342613971
-
-
Böblingen, Germany, second edition, Oct
-
OpenCard Consortium. OpenCard Framework – General Information Web Document. IBM Deutschland Entwicklung GmbH, Böblingen, Germany, second edition, Oct 1998. www.opencard.org.
-
(1998)
Opencard Framework – General Information Web Document
-
-
-
3
-
-
84947280931
-
Correctness of Java card method lookup via logical relations
-
E. Smolka, editor, Berlin, West Germany, Mar, Springer-Verlag, Berlin
-
E. Denney and Th. Jensen. Correctness of Java card method lookup via logical relations. In E. Smolka, editor, 9th European Symp.on programming (ESOP), LNCS 1782, pages 104–118, Berlin, West Germany, Mar 2000. Springer-Verlag, Berlin.
-
(2000)
9Th European Symp.On Programming (ESOP), LNCS 1782
, pp. 104-118
-
-
Denney, E.1
Jensen, T.H.2
-
5
-
-
84944235599
-
-
U. S. Dept. Of Commerce, National Bureau of Standards and Technology, May
-
Smart Card Security User Group. Smart Card Protection Profile. U. S. Dept. Of Commerce, National Bureau of Standards and Technology, May 2000. http://csrc.nist.gov/ cc/.
-
(2000)
Smart Card Protection Profile
-
-
-
6
-
-
0004610703
-
-
In, 6th Int.USENIX Security Symp.F ocusing on Applications of Cryptography, San Jose, California, Jul 1996. Usenix Association, Berkely, California
-
P. Gutmann. Secure deletion of data from magnetic and Solid-State memory. In 6th Int.USENIX Security Symp.F ocusing on Applications of Cryptography, pages 77–89, San Jose, California, Jul 1996. Usenix Association, Berkely, California.
-
Secure Deletion of Data from Magnetic and Solid-State Memory
, pp. 77-89
-
-
Gutmann, P.1
-
7
-
-
0033331740
-
LETOS – a lightweight execution tool for operational semantics
-
P. H. Hartel. LETOS – a lightweight execution tool for operational semantics. Software—practice and experience, 29(15):1379–1416, Sep 1999. www.ecs.soton.ac.uk/˜phh/letos.html.
-
(1999)
Software—practice and Experience
, vol.29
, Issue.15
, pp. 1379-1416
-
-
Hartel, P.H.1
-
8
-
-
84944222465
-
Formalising Java safety – an overview
-
J. Domingo-Ferrer, D. Chan, and A. Watson, editors, pages 115–134, Bristol, UK, Sep, Kluwer Academic Publishers, Boston
-
P. H. Hartel. Formalising Java safety – an overview. In J. Domingo-Ferrer, D. Chan, and A. Watson, editors, 4th Int.IFIP wg 8.8 Conf.Smart card research and advanced application (CARDIS), pages 115–134, Bristol, UK, Sep 2000. Kluwer Academic Publishers, Boston.
-
(2000)
4Th Int.Ifip Wg 8.8 Conf.Smart Card Research and Advanced Application (CARDIS)
-
-
Hartel, P.H.1
-
9
-
-
84881139171
-
Transacted memory for smart cards
-
page to appear, Berlin, Germany, Mar, Springer-Verlag, Berlin
-
P. H. Hartel, M. J. Butler, E. de Jong, and M. Longley. Transacted memory for smart cards. In 10th Formal Methods for Increasing Software Productivity (FME), LNCS, page to appear, Berlin, Germany, Mar 2001. Springer-Verlag, Berlin. www.dsse.ecs.soton.ac.uk/techreports/2000-9.html.
-
(2001)
10Th Formal Methods for Increasing Software Productivity (FME), LNCS
-
-
Hartel, P.H.1
Butler, M.J.2
De Jong, E.3
Longley, M.4
-
10
-
-
0011470810
-
Formal proof of smart card applets correctness
-
J.-J. Quisquater and B. Schneier, editors, Louvain la Neuve, Belgium, Univ. Catholique de Louvain la Neuve
-
J.-L. Lanet and A. Requet. Formal proof of smart card applets correctness. In J.-J. Quisquater and B. Schneier, editors, 3rd Int.Conf.Smart card research and advanced application (CARDIS 1998 preproceedings), Louvain la Neuve, Belgium, Sep 1998. Univ. Catholique de Louvain la Neuve.
-
(1998)
3Rd Int.Conf.Smart Card Research and Advanced Application (CARDIS 1998 Preproceedings)
-
-
Lanet, J.-L.1
Requet, A.2
-
11
-
-
78649639131
-
Secure object sharing in Java card
-
Chicago, Illinois, USENIX Assoc, Berkeley, California
-
M. Montgomery and K. Krishna. Secure object sharing in Java card. In USENIX Workshop on Smartcard Technology (Smartcard’99), pages 119–127, Chicago, Illinois, 1999. USENIX Assoc, Berkeley, California.
-
(1999)
USENIX Workshop on Smartcard Technology (Smartcard’99)
, pp. 119-127
-
-
Montgomery, M.1
Krishna, K.2
-
14
-
-
84944201521
-
-
In, 15th Annual Computer Security Applications Conference (ACSAC), Phoenix, Arizona, Dec 1999. IEEE Comput. Soc, Los Alamitos, California
-
M. Oestreicher. Transactions in Java card. In 15th Annual Computer Security Applications Conference (ACSAC), pages 291–298, Phoenix, Arizona, Dec 1999. IEEE Comput. Soc, Los Alamitos, California. www.acsac.org/1999/abstracts/thu-b-1500-marcus.html.
-
Transactions in Java card
, pp. 291-298
-
-
Oestreicher, M.1
-
15
-
-
85094860929
-
Object lifetimes in Java card
-
Chicago, Illinois, USENIX Assoc, Berkeley, California
-
M. Oestreicher and K. Krishna. Object lifetimes in Java card. In USENIX Workshop on Smartcard Technology (Smartcard’99), pages 129–37, Chicago, Illinois, 1999. USENIX Assoc, Berkeley, California.
-
(1999)
USENIX Workshop on Smartcard Technology (Smartcard’99)
, pp. 129-137
-
-
Oestreicher, M.1
Krishna, K.2
-
16
-
-
0003765587
-
-
U. S. Dept. of Commerce, National Bureau of Standards and Technology, Aug
-
National Institute of Standards and Technology. Common Criteria for Information Technology Security Evaluation. U. S. Dept. of Commerce, National Bureau of Standards and Technology, Aug 1999. http://csrc.nist.gov/cc/.
-
(1999)
Common Criteria for Information Technology Security Evaluation
-
-
-
17
-
-
84958764832
-
Byte code verification for Java smart cards based on model checking
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Louvain-la-Neuve, Belgium, Sep, Springer-Verlag, Berlin
-
J. Posegga and H. Vogt. Byte code verification for Java smart cards based on model checking. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, European Symposium on Research in Computer Security (ESORICS), LNCS 1485, pages 175–190, Louvain-la-Neuve, Belgium, Sep 1998. Springer-Verlag, Berlin.
-
(1998)
European Symposium on Research in Computer Security (ESORICS), LNCS 1485
, pp. 175-190
-
-
Posegga, J.1
Vogt, H.2
-
18
-
-
84944234166
-
Making sense of smart card security certifications
-
J. Domingo-Ferrer, D. Chan, and A. Watson, editors, pages, Bristol, UK, Sep, Kluwer Academic Publishers, Boston
-
J. Reid and M. Looi. Making sense of smart card security certifications. In J. Domingo-Ferrer, D. Chan, and A. Watson, editors, 4th Int.IFIP wg 8.8 Conf. Smart card research and advanced application (CARDIS), pages 225–240, Bristol, UK, Sep 2000. Kluwer Academic Publishers, Boston.
-
(2000)
4Th Int.Ifip Wg 8.8 Conf. Smart Card Research and Advanced Application (CARDIS)
, pp. 225-240
-
-
Reid, J.1
Looi, M.2
-
19
-
-
84944208424
-
-
In, OOPSLA’98 Workshop on Formal Underpinnings of Java (FUJ), Vancouver, Canada, Nov
-
E. Rose and K. H. Rose. Lightweight bytecode verification. In OOPSLA’98 Workshop on Formal Underpinnings of Java (FUJ), Vancouver, Canada, Nov 1998. www-dse.doc.ic.ac.uk/˜sue/oopsla/cfp.html.
-
(1998)
Lightweight Bytecode Verification
-
-
Rose, E.1
Rose, K.H.2
-
20
-
-
84944263036
-
-
Java Card 2.1 Applications Programming Interface
-
Sun. Java Card 2.1 Applications Programming Interface. Sun Micro systems Inc, Palo Alto, California, Jun 1999. http://java.sun.com/products/javacard/.
-
(1999)
Sun Micro Systems Inc, Palo Alto, California
-
-
-
21
-
-
0040027097
-
-
Sun Micro systems Inc, Palo Alto, California, Jun
-
Sun. Java Card 2.1 Runtime Environment (JCRE) Specification. Sun Micro systems Inc, Palo Alto, California, Jun 1999. http://java.sun.com/products/javacard/.
-
(1999)
Java Card 2.1 Runtime Environment (JCRE) Specification
-
-
-
22
-
-
0003539662
-
-
Sun Micro systems Inc, Palo Alto, California, Mar
-
Sun. Java Card 2.1 Virtual Machine Specification. Sun Micro systems Inc, Palo Alto, California, Mar 1999. http://java.sun.com/products/javacard/.
-
(1999)
Java Card 2.1 Virtual Machine Specification
-
-
|