Academic literature on the topic 'Applets Java Card'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Applets Java Card.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Applets Java Card"

1

Roland, Michael, Josef Langer, and Rene Mayrhofer. "Managing the life cycle of Java Card applets in other Java virtual machines." International Journal of Pervasive Computing and Communications 10, no. 3 (August 26, 2014): 291–312. http://dx.doi.org/10.1108/ijpcc-06-2014-0036.

Full text
Abstract:
Purpose – The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and debugging. Today, it is difficult for developers to get access to a near field communication (NFC)-secure element in current smartphones. Moreover, the security constraints of smartcards make in-circuit emulation and debugging of applications impractical. Therefore, an environment that emulates a secure element brings significant advantages for developers. Design/methodology/approach – The authors' approach to such an environment is the emulation of Java Card applets on top of non-Java Card virtual machines (e.g. Android Dalvik VM), as this would facilitate the use of existing debugging tools. As the operation principle of the Java Card VM is based on persistent memory technology, the VM and applications running on top of it have a significantly different life cycle compared to other Java VMs. The authors evaluate these differences and their impact on Java VM-based Java Card emulation. They compare possible strategies to overcome the problems caused by these differences, propose a possible solution and create a prototypical implementation to verify the practical feasibility of such an emulation environment. Findings – While the authors found that the Java Card inbuilt persistent memory management is not available on other Java VMs, they present a strategy to model this persistence mechanism on other VMs to build a complete Java Card run-time environment on top of a non-Java Card VM. Their analysis of the performance degradation in a prototypical implementation caused by additional effort put into maintaining persistent application state revealed that the implementation of such an emulation environment is practically feasible. Originality/value – This paper addresses the problem of emulating a complete Java Card run-time environment on top of non-Java Card virtual machines which could open and significantly ease the development of NFC secure element applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Cao. "Research on the Design and Development of Mobil Identity Authentication." Applied Mechanics and Materials 687-691 (November 2014): 1983–86. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1983.

Full text
Abstract:
A mobile identity authentication scheme of e-commerce based on proposed to solve the problem that present merchant system's digital certificate carrier is not convenient to carry and specific device can only be used for' specific service. Java-SIM card technology has optimized PKI operations, and supports multiple applets running independently and securely on one card. Using the java-SIM Card to store private key and do digital signature operations, users can conveniently and securely enjoy any merchant's any online transaction service.
APA, Harvard, Vancouver, ISO, and other styles
3

Hölzl, Michael, Endalkachew Asnake, Rene Mayrhofer, and Michael Roland. "A password-authenticated secure channel for App to Java Card applet communication." International Journal of Pervasive Computing and Communications 11, no. 4 (November 2, 2015): 374–97. http://dx.doi.org/10.1108/ijpcc-09-2015-0032.

Full text
Abstract:
Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. Design/methodology/approach – A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications. Findings – To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time. Originality/value – By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.
APA, Harvard, Vancouver, ISO, and other styles
4

Minora, Leonardo Ataíde, Fellipe Araújo Aleixo, and Gleison Tavares Diolino. "SMART INTERFACE: FERRAMENTA DE AUXÍLIO AO DESENVOLVIMENTO DE APLICAÇÕES JAVA CARD." HOLOS 3 (May 23, 2008): 79. http://dx.doi.org/10.15628/holos.2007.131.

Full text
Abstract:
Com a evolução da tecnologia de microprocessadores, hoje é possível colocar um minúsculo chip em um cartão de plástico, nas dimensões de um cartão de crédito convencional. Chip este com capacidade de armazenamento de informação e processamento. Esse tipo de cartão é chamado de Smart Card. É possível desenvolver aplicações para esses cartões utilizando um subconjunto da plataforma Java – Java Card. O subconjunto da plataforma Java para o desenvolvimento de aplicações próprias para executar em Smart Cards é bastante limitado, em virtude das limitações do hardware envolvido. O desenvolvimento deste tipo de aplicação implica invariavelmente em se trabalhar no nível de bytes, pois toda a comunicação com o cartão acontece através de APDUs (Applicaion Protocol Data Unit) montadas como uma sequência de bytes. Para auxiliar nesse trabalho, foi desenvolvido o SMART SHELL: ferramenta, modo texto, que interpreta comandos para a interação com a aplicação gerente do cartão – card manager. Os objetivos deste trabalho são: aperfeiçoar as funcionalidades do SMART SHELL e desenvolver uma interface gráfica para o mesmo, denominada de SMART INTERFACE. A aplicação em questão visa oferecer ao desenvolvedor de aplicações Java Card um mecanismo simples e ágil para a realização de atividades comuns de manipulação de um cartão, tais como: (1) realizar o processo de autenticação para operar com o card manager, (2) listar as aplicações – applets Java Card – instalados em um cartão, (3) preparar uma aplicação para ser instalada em um cartão, (4) instalação de uma aplicação no cartão, (5) remoção de uma aplicação instalada no cartão, entre outras. Para a realização do trabalho serão seguida a seguinte metodologia: levantamento bibliográfico sobre o tema; definição dos aperfeiçoamentos necessários ao SMART SHELL; implementação dos aperfeiçoamentos propostos; e implementação da interface gráfica para o mesmo denominada de SMART INTERFACE. Palavras-chave: Smart Card, Java Card, Cartão inteligente.
APA, Harvard, Vancouver, ISO, and other styles
5

Choi, Won-Ho, Seung-Joon Seok, and Min-Soo Jung. "An efficient installation for applets to be post-issuance of Java Card system using an IC chip." IEICE Electronics Express 7, no. 20 (2010): 1509–14. http://dx.doi.org/10.1587/elex.7.1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oh, Se-Won, Seung-Joon Seok, and Min-Soo Jung. "An improvement for applets download speed using transaction buffer based on RAM memory of Java Card system using IC chip." IEICE Electronics Express 8, no. 10 (2011): 705–9. http://dx.doi.org/10.1587/elex.8.705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fredlund, Lars-Åke. "Guaranteeing Correctness Properties of a Java Card Applet." Electronic Notes in Theoretical Computer Science 113 (January 2005): 217–33. http://dx.doi.org/10.1016/j.entcs.2004.01.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Priyasta, Dwidharma, Wahyu Cesar, Yanti Susanti, and Juliati Junde. "Java Card Approach to Emulate The Indonesian National Electronic ID Smart Cards." Scientific Journal of Informatics 5, no. 2 (November 29, 2018): 224–34. http://dx.doi.org/10.15294/sji.v5i2.16347.

Full text
Abstract:
This paper presents a successful effort in emulating the Indonesian national electronic ID smart cards using Java Card. The aim is to provide theopportunity for other smart card products to contribute in the national electronic ID program. The life cycle status, the file system concept, commands and security procedures implemented in the Indonesian national electronic ID were reproduced and emulated ina Java Card applet. In the first stage, the emulator applet was tested using some test scenarios developed during the implementation phase. Later on, the emulator applet was tested in the real system under supervisioned by Direktorat Jenderal Kependudukan dan Pencatatan Sipil in order tomeasure its reliability as well as to determine that its behaviour is identical with the Indonesian national electronic ID. The results confirmed that this approach was fruitful.
APA, Harvard, Vancouver, ISO, and other styles
9

Yunita Laytno, Vennie, and I. Ketut Rai Setiabudhi. "Sinkronisasi Pengaturan Honorarium Jasa Notaris antara UUJN dengan Kode Etik Notaris." Acta Comitas 4, no. 1 (May 2, 2019): 22. http://dx.doi.org/10.24843/ac.2019.v04.i01.p03.

Full text
Abstract:
Research on synchronization of honorarium arrangements for notary services based on the synchrony of regulations in Article 36 paragraph (2) of UUJN which regulates the highest honorarium determined by notaries and Article 4 number 10 Notary Ethics Code regulates the lowest limit of honorarium set by notary associations. Based on this, the formulation of the problem: (1) What are the arrangements for the honorarium of notary services? (2) Is the sanction for a notary who does not comply with the Notary Code of Ethics regarding the rules regarding the honorarium of notary services? The purpose of this paper for know the arrangement of honorarium for notary services regulated in UUJN and Notary Code of Ethics; and to review and analyze sanctions for notaries who do not follow the rules of the Notary Ethics Code regarding regulations regarding the honorarium of notary services. The research is applied to review these legal rules, namely normative legal research carried out by applying the Statute Approach and Conceptual Approach. Legal materials are primary legal materials, secondary legal materials, and tertiary legal materials. The regulation about honorarium that applies to a notary is Article 36 paragraph (3) of the UUJN which is concerning the highest limit of the honorarium that may be accepted by a notary; and Notaries who do not comply with the regulations stated in Article 4 number 10 of the Notary Code of Ethics they should not be punished because based on an agreement between the notary and the viewers. Penelitian tentang sinkronisasi pengaturan honorarium jasa notaris berdasarkan ketidak sinkronan peraturan pada Pasal 36 ayat (2) UUJN yang mengatur tentang batas tertinggi honorarium yang ditentukan oleh notaris dan Pasal 4 angka 10 Kode Etik Notaris mengatur tentang batas terendah honorarium yang telah ditetapkan oleh perkumpulan notaris. Berdasarkan hal tersebut maka dirumuskan rumusan permasalahan, yaitu: (1) Bagaimanakah pengaturan tentang honorarium jasa notaris? (2) Apakah sanksi bagi notaris yang tidak mematuhi aturan Kode Etik Notaris terkait aturan mengenai honorarium jasa notaris? Tujuan dari penulisan ini yaitu untuk mengetahui dan memahami pengaturan honorarium jasa notaris yang diatur dalam UUJN dan Kode Etik Notaris; serta untuk mengkaji dan menganalisis sanksi bagi notaris yang tidak mengikuti aturan Kode Etik Notaris terkait peraturan mengenai honorarium jasa notaris. Penelitian dalam bidang hukum yang diterapkan untuk mengkaji aturan hukum ini yakni penelitian hukum yang bersifat normatif yang dilakukan dengan cara melakukan pendekatan perundang-undangan (The Statute Approach) serta pendekatan konseptual (Conceptual Approach). Bahan hukum dari penelitian ini adalah bahan hukum primer, bahan hukum sekunder, dan bahan hukum tersier. Pengaturan tentang honorarium yang berlaku bagi notaris adalah Pasal 36 ayat (3) UUJN yaitu mengenai batas tertinggi dari penetapan honorarium yang boleh diterima oleh notaris; dan Notaris yang tidak memenuhi peraturan yang tertera didalam Pasal 4 angka 10 Kode Etik Notaris terkait batas terendah dari honorarium yang telah ditetapkan oleh perkumpulan sepatutnya tidak dikenakan sanksi karena berdasarkan kesepakatan antara notaris dan para penghadap.
APA, Harvard, Vancouver, ISO, and other styles
10

Nusyirwan, Deny, Muhammad Bayu Purnama, and Prasetya Perwira Putra Perdana. "PROSES PERANCANGAN INOVASI FORM KAPALKU GUNA PENDATAAN KEPUASAN PENUMPANG KAPAL FERRY DARI PELABUHAN TANJUNGPINANG." Jurnal Terapan Abdimas 5, no. 2 (July 31, 2020): 207. http://dx.doi.org/10.25273/jta.v5i2.5992.

Full text
Abstract:
<p><strong><em>Abstract.</em></strong> <em>Passenger satisfaction is one of the important roles in companies and transportation services that are committed to social innovation. Maritime territories are areas which are mostly waters, in maritime areas, transportation services lead to the sea. The sea is a means of creating sea transportation called ships. The ship became one of the forms of transportation sophistication from the past until now. Ships are also one of the most reliable transportation in the maritime area, but at this time the problem arises because of the large number of ships and ship transportation services that are the livelihoods of the maritime community. That way the comparison between ships and ships is greatly improved, especially it can be concluded from the number of passengers and ship passenger charts. Today passenger satisfaction is given priority, especially in supporting facilities such as comfortable seats, conducive air conditioning, and good service. But the research method used in this innovation is the observation method which includes collecting data on user testing and user experience at that stage. The Kapalku Form is one of the innovations that applies passenger satisfaction data collection based on </em><em>information system</em><em>, the way it works is to press the selection button according to the colors provided, namely red, yellow, and green in each passenger seat. The incoming data will be calculated according to how many passengers press the button. Red means not satisfied, green means satisfied, and yellow means very satisfied. That way, data obtained through the sensitivity of the button will be sent via Bluetooth to Android. Furthermore, the data listed on android will appear on the monitor that can be accessed via Google form. The results of this study can be seen from the Google form data graph which is the android data transition through the sensitivity of the button, so that it can easily find out the level of service satisfaction on the ship in accordance with the criteria and improving the quality of the ship</em><em>.</em><em></em></p><p><strong>Abstrak.</strong> Kepuasan penumpang menjadi salah satu peran penting didalam perusahaan maupun jasa transportasi yang berdominan kepada inovasi sosial. Wilayah maritim adalah wilayah yang sebagaian besarnya adalah perairan, didalam wilayah maritim jasa transportasi mengarah kepada laut. Laut menjadi sarana terciptanya transportasi laut yang dinamakan kapal. Kapal menjadi salah satu bentuk kecanggihan transportasi dari dahulu hingga sekarang. Kapal juga menjadi salah satu transportasi yang dapat diandalkan tertuama di wilayah maritim, namun pada saat ini masalah muncul karena banyaknya kapal dan jasa transportasi kapal yang menjadi mata pencaharian masyarakat maritim. Dengan begitu perbandingan antara kapal dengan kapal sangat meningkat, tertutama bisa disimpulkan dari banyaknya penumpang dan grafik penumpang kapal. Dimasa sekarang kepuasan penumpang sangat diutamakan, terutama pada fasilitas yang mendukung seperti kursi yang nyaman, pendingin udara yang kondunsif, dan pelayanan yang baik. Namun metode penelitian yan digunakan pada inovasi ini adalah metode observasi yang mencakup pada pengambilan data pada user testing dan user experience pada tahapnya. Form Kapalku menjadi salah satu inovasi yang menerapkan pendataan kepuasan penumpang berbasis sistem informasi yang cara kerjanya adalah menekan tombol pilihan sesuai warna yang disediakan yaitu merah, kuning, dan hijau di masing-masing kursi penumpang. Data yang masuk akan di hitung sesuai dengan seberpaa banyak penumpang menekan tombol tersebut. Merah artinya tidak puas, hijau artinya puas, dan kuning artinya sangat puas. Dengan begitu, data yang didapatkan melalui kepekaan tombol akan dikirim melalui Bluetooth ke android. Selanjutnya data yang tertera di android akan tampil pada monitor yang dapat diakses melalui google form. Hasil dari penelitian ini dapat dilihat dari grafik data google form yang merupakan transisi data android melalui kepekaan tombol, sehingga dapat dengan mudah mengetahui tingkat kepuasan pelayanan pada kapal sesuai dengan kiteria dan peningkatan mutu kualitas kapal tersebut.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Applets Java Card"

1

Martin, Hugues. "Une méthodologie de génération automatique de suites de tests pour applets Java Card." Lille 1, 2001. https://pepite-depot.univ-lille.fr/RESTREINT/Th_Num/2001/50376-2001-9.pdf.

Full text
Abstract:
L'utilisation d'objectifs de tests pour vérifier la conformité des applications par rapport à leurs spécifications s'avère être une des solutions les plus prometteuses pour le domaine de la carte à puce. En effet, elle permet d'allier à la fois rigueur et risques, non seulement en tirant profit des techniques de génération automatique de tests, mais également en permettant au testeur d'éliminer les tests qui ne lui semblent pas pertinents. Cependant, tant que cette élimination est implicite, le testeur ne peut pas réellement maîtriser les risques. Pour répondre à ce besoin, nous proposons une méthodologie de test d'applications embarquées dans les Java Card. Cette méthodologie s'appuie sur des travaux de recherche menés autour de la génération de suites de tests à partir d'UML. Elle tire ainsi profit de techniques de génération automatique optimisées, ainsi que de techniques de combinaisons automatiques d'objectifs de tests. Elle apporte en plus une méthode de génération d'objectifs de tests qui guide le testeur tout au long de ce processus. Enfin, elle fournit au testeur les moyens de gérer explicitement les risques pris, en justifiant tous ses choix lors de l'élimination explicite de certains objectifs ou ensemble d'objectifs de tests.
APA, Harvard, Vancouver, ISO, and other styles
2

Rousset, Nicolas. "Automatisation de la Spécification et de la Vérification d'applications Java Card." Paris 11, 2008. http://www.theses.fr/2008PA112065.

Full text
Abstract:
Ce travail concerne la vérification statique de programmes Java Card annotés formellement, par des méthodes déductives. Il contribue à rendre cette approche praticable dans un contexte industriel. Ce travail a donné lieu à des implantations au sein du prototype Krakatoa, et des expérimentations sur des applets industrielles. La première partie concerne le renforcement du degré d'automatisation de l'étape de vérification. La première contribution est l'interprétation fine de traits de la sémantique du langage Java Card: transactions et arrachage de la carte. La deuxième contribution propose une politique de références non-null par défaut qui permet de vérifier la validité des accès mémoire par typage statique. La troisième contribution est une analyse inter-procédurale d'inférence d'annotations par interprétation abstraite, qui permet d'obtenir des invariants de boucle, ainsi que des préconditions et des postconditions de méthodes. La seconde partie concerne la phase amont c'est-à-dire la conception des spécifications. La première contribution propose des liens entre les annotations à la JML et des spécifications abstraites. Des propriétés fonctionnelles sont exprimées à l'aide de spécifications algébriques, dont le lien avec un programme annoté est défini par une relation de raffinement. La deuxième contribution propose une utilisation structurée de diagrammes UML permettant d'engendrer des annotations, pour vérifier des propriétés de sûreté spécifiques (e. G. Invariants de structure, utilisation de protocoles). Enfin, une perspective est ouverte sur la définition et la propagation automatique d'annotations pour aider à l'audit de sécurité des applets Java Card
This work is about static verification of formally-annotated Java Card programs, by deductive methods. It aims at making such an approach practicable in an industrial setting. Implementations have been performed inside the Krakatoa prototype, and experiments were conducted on industrial applets. The first part concerns the improvement of the automation in the verification step. The first contribution is a precise interpretation of the semantics of the Java Card language: transactions and card tear. The second contribution proposes a policy of non-null references, allowing to verify the validity of memory accesses by static typing. The third contribution is an interprocedural analysis for inferring annotations, by abstract interpretation, allowing to obtain loop invariants, and pre- and post-conditions for methods. The second part is about the design of specifications. The first contribution proposes links between JML-like annotations and abstract specifications. Functional properties are expressed using algebraic specifications, whose link with the program is defined by a refinement relation. The second contribution proposes a structured use of UML diagrams allowing to generate annotations, to verify specific safety properties (e. G. Structural invariants, protocol descriptions). Finally, a perspective is opened towards the definition and the automatic propagation of annotations to assist security audits of Java Card applets
APA, Harvard, Vancouver, ISO, and other styles
3

Meluzín, Ivo. "Multiaplikační čipové karty." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219350.

Full text
Abstract:
The goal of the first part of the thesis is to describe the options of wide usage of chip cards in different segments of our life. Consequently it is necessary to mention hardware and software equipment of smart card, its communication with terminal and data security. In this thesis we focus on Java Card environment in which we will try to create two applications, one for electronic purse and the second for user identification. Basically, we need to mention multiapplicational rules of sharing data and objects. At the end of the thesis we are focusing on the possibility of mutual interference between the applications and on protection against attacks. Also future applications of this technology are described.
APA, Harvard, Vancouver, ISO, and other styles
4

Trbušek, Pavel. "Implementace moderních hašovacích funkcí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218253.

Full text
Abstract:
Master's thesis analyses modern hash functions. The requirements for these features and briefly outlined some of the types of attacks are given in the first part. The second part focuses on the specication Skein hash function, which is among the candidates for the new SHA-3 standard, and a description of the JCOP platform, which is a function implemented. In the last part of the work there are discussed implementation problematic parts and evaluation of the selected solution.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Applets Java Card"

1

Almaliotis, Vasilios, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, and Diomidis Spinellis. "Static Program Analysis for Java Card Applets." In Smart Card Research and Advanced Applications, 17–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85893-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Martin, Hugues, and Lydie du Bousquet. "Automatic Test Generation for Java Card Applets." In Lecture Notes in Computer Science, 121–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45165-x_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vermoen, Dennis, Marc Witteman, and Georgi N. Gaydadjiev. "Reverse Engineering Java Card Applets Using Power Analysis." In Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, 138–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72354-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hubbers, Engelbert, Martijn Oostdijk, and Erik Poll. "From Finite State Machines to Provably Correct Java Card Applets." In Security and Privacy in the Age of Uncertainty, 465–70. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35691-4_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kähkönen, Kari, Roland Kindermann, Keijo Heljanko, and Ilkka Niemelä. "Experimental Comparison of Concolic and Random Testing for Java Card Applets." In Model Checking Software, 22–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16164-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coglio, Alessandro, and Cordell Green. "A Constructive Approach to Correctness, Exemplified by a Generator for Certified Java Card Applets." In Verified Software: Theories, Tools, Experiments, 57–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69149-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lancia, Julien, and Guillaume Bouffard. "Java Card Virtual Machine Compromising from a Bytecode Verified Applet." In Smart Card Research and Advanced Applications, 75–88. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31271-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dietl, Werner, Peter Müller, and Arnd Poetzsch-Heffter. "A Type System for Checking Applet Isolation in Java Card." In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, 129–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30569-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Loizidis, Alexandros, Vasilios Almaliotis, and Panagiotis Katsaros. "Static Program Analysis of Multi-Applet JavaCard Applications." In Software Engineering for Secure Systems, 286–304. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-837-1.ch011.

Full text
Abstract:
Java Card provides a framework of classes and interfaces that hide the details of the underlying smart card interface and make it possible to load and run on the same card several applets, from different application providers with complex trust relationships. This fact paves the way for new business applications, but the card issuer has to secure absence of malicious or faulty card applets. He has to be able to check that (i) applets do not cause illicit method invocations that violate temporal restrictions of inter-applet communication, (ii) applets protect themselves from unwanted information flow to third parties and (iii) it is not possible for an unhandled Java Card API exception to leave an applet in an unpredictable state that is potentially dangerous for the application’s security. The authors explore recent advances in theory and tool support of static program analysis and they present an approach for automatic verification of smart card applications that by definition are security critical.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Applets Java Card"

1

Pham, Tuan-Hung, Anh-Hoang Truong, Ninh-Thuan Truong, and Wei-Ngan Chin. "A Fast Algorithm to Compute Heap Memory Bounds of Java Card Applets." In 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods. IEEE, 2008. http://dx.doi.org/10.1109/sefm.2008.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choi, Won-Ho, Se-Won Oh, Gwang Jung, and Min-Soo Jung. "A Novel Scheme for Efficient Installation of Applets for Advanced Java Card System." In 2009 WRI World Congress on Computer Science and Information Engineering. IEEE, 2009. http://dx.doi.org/10.1109/csie.2009.867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Choi, Won-Ho, Se-Won Oh, Gwang Jung, and Min-Soo Jung. "Efficient execution of application applets based on persistent object caching in Java card system." In the 2009 International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1644993.1645045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morana, Giovanni, Emiliano Tramontana, and Daniele Zito. "Detecting Attacks on Java Cards by Fingerprinting Applets." In 2013 IEEE 22nd International Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises (WETICE). IEEE, 2013. http://dx.doi.org/10.1109/wetice.2013.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hölzl, Michael, Endalkachew Asnake, René Mayrhofer, and Michael Roland. "Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel." In MoMM '14: The 12th International Conference on Advances in Mobile Computing and Multimedia. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2684103.2684128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Q. Z., and W. F. Lu. "Development of a J2EE Web Application for STEP-Based Design Conformance Checking." In ASME 2004 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/detc2004-57522.

Full text
Abstract:
Product design needs great team efforts from multi-disciplinary participants, even external partners, for collaborative problem solving. Design conflicts within and between functional teams do occur in such a collaborative design process. Detection and resolution of design conflicts through design conformance checking therefore becomes a critical activity in the joint design problem solving. This paper presents the development of a J2EE application prototype to support the STEP-based design conformance checking. A STEP-compliant information model has been specified to represent 3D CAD objects and other design information, while a knowledge representation model been proposed to describe design rules and constraints. The STEP objects and rule objects are managed and processed by the enterprise Java beans of a J2EE application server, which continuously applies the rule objects to the STEP objects and finally draws a conclusion for the design conformance checking. Application scenarios are discussed in the paper to illustrate the effectiveness of both the STEP/rule objects modeling approaches and the prototype system for support of the design compliance checking in distributed environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography