Get Free Shipping on orders over $89
Lecture Notes in Computer Science : Programming and Security : First International Workshop, JavaCard 2000 Cannes, France, September 14, 2000 Revised Papers - Isabelle Attali

Lecture Notes in Computer Science

Programming and Security : First International Workshop, JavaCard 2000 Cannes, France, September 14, 2000 Revised Papers

By: Isabelle Attali (Editor), Thomas Jensen (Editor)

Paperback | 23 May 2001

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

ThePACAPPrototype:AToolforDetectingJavaCardIllegalFlow . . . . . 25 P. Bieber,J. Cazin,A. ElMarouani,P. Girard,J. -L. Lanet,V. Wiels, G. Zanon CardKt:AutomatedMulti-modalDeductiononJavaCardsfor Multi-applicationSecurity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 RajeevGor´e,LanDuyNguyen A Programming and a Modelling Perspective on the Evaluation of Java CardImplementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 PieterH. Hartel,EduarddeJong SecureInternetSmartcards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 NaomaruItoi,TomokoFukuzawa,PeterHoneyman IssuesinSmartcardMiddleware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 RogerKehr,MichaelRohs,HaraldVogt OpenPlatfomSecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 MarcKekiche?,ForoughKashef,DavidBrewer ASimple(r)InterfaceDistributionMechanismforJavaCard . . . . . . . . . . . . 114 KsheerabdhiKrishna,MichaelMontgomery AutomaticTestGenerationforJavaCardApplets . . . . . . . . . . . . . . . . . . . . . 121 HuguesMartin,LydieduBousquet FormalSpeci?cationandVeri?cationofJavaCard'sApplicationIdenti?er Class. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 JoachimvandenBerg,BartJacobs,ErikPoll X TableofContents Security on Your Hand: Secure Filesystems with a "Non-cryptographic" JAVA-Ring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 R¨udigerWeis,BastiaanBakker,StefanLucks AuthorIndex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Formal Methods in Context: Security and Java Card D. Bolignano, D. Le Metayer, and C. Loiseaux Trusted Logic www. trusted-logic. fr 1. Security and Java Card: An Ideal Application Area for Formal Methods The benefits of formal methods for software engineering have been described at length in many research papers. They include among others: Better understanding and improved communication through unambiguous descriptions. Early bug detection thanks to the formalisation of specifications.

More in Business Mathematics & Systems

Business Analytics and Statistics : 2nd Edition - Ken Black

RRP $136.95

$119.75

13%
OFF
Business Statistics : 8th edition - Australia and New Zealand - Antony Selvanathan
Positioning : The Battle for Your Mind - Al Ries

RRP $30.95

$24.99

19%
OFF
Business Research Methods : 6th Edition - Emma Bell

RRP $132.95

$106.75

20%
OFF
Business Analytics : 3rd Global Edition - James Evans

RRP $146.95

$108.99

26%
OFF
Creative Machines : AI, Art & Us - Maya Ackerman

RRP $57.95

$44.75

23%
OFF
Intermediate Financial Theory : 3rd Edition - Jean-Pierre Danthine

RRP $195.75

$190.99

Health Information : 5th Edition - Management of a Strategic Resource - Mervat Abdelhak