Login / Signup
Embedded Eavesdropping on Java Card.
Guillaume Barbu
Christophe Giraud
Vincent Guerin
Published in:
SEC (2012)
Keyphrases
</>
java card
smart card
fault injection
byte code
countermeasures
static analysis
control flow
security model
elliptic curve
virtual machine
method invocation
wireless sensor networks
data processing
wireless networks