Login / Signup
Towards Verification of Well-Formed Transactions in Java Card Bytecode.
René Rydhof Hansen
Igor Siveroni
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
java card
smart card
fault injection
static analysis
countermeasures
byte code
virtual machine
elliptic curve
method invocation
security model
database
control flow
security analysis
data flow
wireless sensor networks
concurrency control