共 50 条
- [1] Checking secure interactions of smart card applets COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 1 - 16
- [2] Compositional verification for secure loading of smart card applets SECOND ACM AND IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR CO-DESIGN, PROCEEDINGS, 2004, : 211 - 222
- [3] Developing a Trojan applets in a smart card JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (04): : 343 - 351
- [4] Formal proof of smart card applets correctness SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 85 - 97
- [5] A secure PLAN (Extended version) DARPA ACTIVE NETWORKS CONFERENCE AND EXPOSITION, PROCEEDINGS, 2002, : 224 - 237
- [6] Secure smart card reader design 2008 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2008, : 276 - +
- [7] A Verifiable Conformance Relationship between Smart Card Applets and B Security Models ABSTRACT STATE MACHINES, B AND Z, PROCEEDINGS, 2008, 5238 : 237 - +
- [8] Towards a secure and practical multifunctional smart card SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 16 - 31
- [9] A Comprehensively Secure Smart card access controls 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
- [10] Secure network card - Implementation of a standard network stack in a smart card SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 193 - 208