Application Management Framework in User Centric Smart Card Ownership Model
暂无分享,去创建一个
[1] Douglas Comer. Internetworking with Tcp/ip, Vol 1 , 2005 .
[2] Douglas E. Comer,et al. Internetworking with TCP/IP - Principles, Protocols, and Architectures, Fourth Edition , 1988 .
[3] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[4] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[5] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[6] Kousha Etessami,et al. Analysis of Recursive Game Graphs Using Data Flow Equations , 2004, VMCAI.
[7] Xavier Leroy,et al. Bytecode verification on Java smart cards , 2002 .
[8] Lilian Burdy,et al. Formal development of an embedded verifier for Java Card byte code , 2002, Proceedings International Conference on Dependable Systems and Networks.
[9] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[10] Gilles Grimaud,et al. Proceedings of the 2nd Workshop on Industrial Experiences with Systems Software Building an "impossible" Verifier on a Java Card , 2022 .
[11] Douglas E. Comer,et al. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition , 2000 .
[12] Douglas Comer,et al. Internetworking with TCP/IP , 1988 .
[13] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[14] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[15] Douglas Comer,et al. Principles, protocols, and architecture , 1995 .
[16] Gilles Barthe,et al. A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines , 2002, VMCAI.