Java security

Results: 406



#Item
1Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
2Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
3Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
4Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

Malicious Code on Java Card Smartcards: Attacks and Countermeasures Wojciech Mostowski and Erik Poll Digital Security (DS) group, Department of Computing Science Radboud University Nijmegen, The Netherlands {woj,erikpoll

Add to Reading List

Source URL: ceres.hh.se

Language: English - Date: 2015-05-16 14:49:15
    5Testing the Java Card Applet Firewall Wojciech Mostowski and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

    Testing the Java Card Applet Firewall Wojciech Mostowski and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

    Add to Reading List

    Source URL: ceres.hh.se

    Language: English - Date: 2015-05-16 14:02:14
      6Tearing Java Cards Engelbert Hubbers, Wojciech Mostowski, and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

      Tearing Java Cards Engelbert Hubbers, Wojciech Mostowski, and Erik Poll Security of Systems (SoS) group Department of Computing Science Radboud University Nijmegen The Netherlands

      Add to Reading List

      Source URL: ceres.hh.se

      Language: English - Date: 2015-05-16 14:50:20
        7Technical Report no. 2004–08  Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

        Technical Report no. 2004–08 Formalisation and Verification of JAVA CARD Security Properties in Dynamic Logic

        Add to Reading List

        Source URL: ceres.hh.se

        Language: English - Date: 2015-05-16 14:10:32
          8Gradual Security Typing (for Java) APLS 2015 Albert-Ludwigs-Universit¨ at Freiburg

          Gradual Security Typing (for Java) APLS 2015 Albert-Ludwigs-Universit¨ at Freiburg

          Add to Reading List

          Source URL: proglang.informatik.uni-freiburg.de

          - Date: 2017-10-04 11:31:52
            9Mind Your Keys? A Security Evaluation of Java Keystores Marco Squarcina (Università Ca’ Foscari & Cryptosense) Riccardo Focardi

            Mind Your Keys? A Security Evaluation of Java Keystores Marco Squarcina (Università Ca’ Foscari & Cryptosense) Riccardo Focardi

            Add to Reading List

            Source URL: wp.internetsociety.org

            - Date: 2018-03-01 13:38:20
              10JAVA Mag  Security mit Maven S. 14 Wartung von LegacySystemen S. 74

              JAVA Mag Security mit Maven S. 14 Wartung von LegacySystemen S. 74

              Add to Reading List

              Source URL: www.qaware.de

              - Date: 2017-10-06 11:33:20