A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations
暂无分享,去创建一个
[1] Ksheerabdhi Krishna,et al. Secure object sharing in java card , 1999 .
[2] Marcus Oestreicher. Transactions in Java Card , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[3] Guy L. Steele,et al. The Java Language Specification , 1996 .
[4] Jason Reid,et al. Making Sense of Smart Card Security Certifications , 2000, CARDIS.
[5] Pieter H. Hartel,et al. Formalising Java Safety - An overview , 2001, CARDIS.
[6] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[7] Marcus Oestreicher,et al. The Advanced Computing Systems Association Object Lifetimes in Java Card , 2022 .
[8] Joachim Posegga,et al. Byte Code Verification for Java Smart Card Based on Model Checking , 1998, ESORICS.
[9] Pieter H. Hartel,et al. Transacted Memory for Smart Cards , 2001, FME.
[10] Jean-Louis Lanet,et al. Formal Proof of Smart Card Applets Correctness , 1998, CARDIS.
[11] Ewen Denney,et al. Correctness of Java Card Method Lookup via Logical Relations , 2000, ESOP.
[12] Flemming Nielson,et al. Semantics with applications - a formal introduction , 1992, Wiley professional computing.
[13] Pieter H. Hartel,et al. LETOS – a lightweight execution tool for operational semantics , 1999 .