Login / Signup
Implementing a Secure Log File Download Manager for the Java Card.
Constantinos Markantonakis
Simeon Xenitellis
Published in:
Communications and Multimedia Security (1999)
Keyphrases
</>
method invocation
log files
java card
smart card
fault injection
static analysis
website
byte code
log data
security model
countermeasures
security requirements
web users
web server
virtual machine
control flow
security analysis
query logs
data flow
elliptic curve
domain experts
distributed systems
source code
web pages