Java security

Results: 406



#Item
1Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
2Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
3Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
4

Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

Add to Reading List

Source URL: ceres.hh.se

Language: English - Date: 2015-05-16 14:49:15
    5

    Testing the Java Card Applet Firewall Wojciech Mostowski and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

    Add to Reading List

    Source URL: ceres.hh.se

    Language: English - Date: 2015-05-16 14:02:14
      6

      Tearing Java Cards Engelbert Hubbers, Wojciech Mostowski, and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

      Add to Reading List

      Source URL: ceres.hh.se

      Language: English - Date: 2015-05-16 14:50:20
        7

        Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

        Add to Reading List

        Source URL: ceres.hh.se

        Language: English - Date: 2015-05-16 14:10:32
          8

          Gradual Security Typing (for Java) APLS 2015 Albert-Ludwigs-Universit¨ at Freiburg

          Add to Reading List

          Source URL: proglang.informatik.uni-freiburg.de

          - Date: 2017-10-04 11:31:52
            9

            Mind Your Keys? A Security Evaluation of Java Keystores Marco Squarcina (Università Ca’ Foscari & Cryptosense) Riccardo Focardi

            Add to Reading List

            Source URL: wp.internetsociety.org

            - Date: 2018-03-01 13:38:20
              10

              JAVA Mag Security mit Maven S. 14 Wartung von LegacySystemen S. 74

              Add to Reading List

              Source URL: www.qaware.de

              - Date: 2017-10-06 11:33:20
                UPDATE