共 50 条
- [2] Reverse engineering Java']Java card applets using power analysis [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 138 - +
- [3] A fast algorithm to compute heap memory bounds of Java']Java Card applets [J]. SEFM 2008: SIXTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2008, : 259 - +
- [4] Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM [J]. International Journal of Information Security, 2019, 18 : 85 - 100
- [5] The synthesis of a Java']Java Card tokenisation algorithm [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 43 - 50
- [7] An asymmetric fingerprint matching algorithm for Java']Java Card™ [J]. AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 279 - 288
- [8] A high performance buffering of Java']Java objects for Java']Java card systems with flash memory [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 908 - 918
- [9] Comparison Analysis of Acorn Algorithm and Snow Algorithm on Smart Card using Java']Java Card [J]. 2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 429 - 434
- [10] An advanced Java']Java Card System architecture for smart card based on large RAM memory [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 646 - +