Підвищення безпеки комп'ютерних систем за допомогою використання Java Card технології

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transactions in Java Card

A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transaction mechanism must meet the demands by the applications and the system itself within the minimal resources offered by current smart card hardware. This paper presents the current transaction model implied by the Java C...

متن کامل

Embedded Eavesdropping on Java Card

In this article we present the first Combined Attack on a Java Card targeting the APDU buffer itself, thus threatening both the security of the platform and of the hosted applications as well as the privacy of the cardholder. We show that such an attack, which combines malicious application and fault injection, is achievable in practice on the latest release of the Java Card specifications by p...

متن کامل

Verification of Java card programs

syntax tree, 13annotated, 13addarray, 40, 41addarrays, 41addclass, 26, 55addobj, 26algebraic specifications, 23allsupers, 32antecedent, 63array accessproof rule, 78semantics, 35array assignmentproof rule, 79semantics, 37array creationproof rule, 81semantics, 40array initializerproof rule, 82semantics, 41ArrayAcc...

متن کامل

Anonymous Credentials on Java Card

Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time user-centric identity management gains acceptance. Anonymous credential schemes are the optimal realization of user-centricity. However, on inexpensive hardware platforms, typically used for eID cards, these schemes could not be made to meet the necessary requirements such as future-proof ke...

متن کامل

Java Card for PayTv Application

Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ukrainian Information Security Research Journal

سال: 2006

ISSN: 2410-7840,2221-5212

DOI: 10.18372/2410-7840.8.4963