Login / Signup
Java card technology and security.
Constantinos Markantonakis
Published in:
Inf. Secur. Tech. Rep. (1998)
Keyphrases
</>
java card
smart card
fault injection
countermeasures
static analysis
byte code
virtual machine
security model
data processing
elliptic curve
control flow
method invocation
data flow
cost effective
security analysis
security requirements
intrusion detection system
access control
case study