06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

Proceedings of the 19th Annual International Cryptology Conference on Advances in<br />

Cryptology. London, UK: Springer-Verlag, 1999, pp. 388397.<br />

[198] E. Vétillard and A. Ferrari, Combined Attacks and Countermeasures, in Smart<br />

Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference,<br />

CARDIS 2010, ser. LNCS, D. Gollmann, J.-L. Lanet, and J. Iguchi-Cartigny,<br />

Eds., vol. 6035/2010, 2010, pp. 133147.<br />

[199] S. Chaumette and D. Sauveron, An Ecient and Simple Way to Test the <strong>Security</strong><br />

of Java Cards, in <strong>Security</strong> in In<strong>for</strong>mation Systems, Proceedings of the 3rd International<br />

Workshop on <strong>Security</strong> in In<strong>for</strong>mation Systems, WOSIS 2005, In conjunction<br />

with ICEIS2005, E. Fernández-Medina, J. C. H. Castro, and L. J. G. Castro, Eds.<br />

INSTICC Press, 2005, pp. 331341.<br />

[200] T. Lindholm and F. Yellin, The Java Virtual Machine Specication, 2nd ed.<br />

Addison-Wesley Longman, Amsterdam, April 1999.<br />

[201] G. Barthe, G. Dufay, L. Jakubiec, B. P. Serpette, and S. a. M. d. Sousa,<br />

A Formal Executable Semantics of the JavaCard Plat<strong>for</strong>m, in Proceedings of<br />

the 10th European Symposium on Programming Languages and Systems, ser.<br />

ESOP '01. London, UK: Springer-Verlag, 2001, pp. 302319. Online Available:<br />

http://dl.acm.org/citation.cfm?id=645395.757559<br />

[202] G. Barthe and S. Stratulat, Validation of the JavaCard Plat<strong>for</strong>m with Implicit<br />

Induction Techniques, in RTA, 2003, pp. 337351.<br />

[203] M. Éluard, T. P. Jensen, and E. Denney, An Operational Semantics of<br />

the Java Card Firewall, in Proceedings of the International Conference on<br />

Research in Smart Cards: Smart Card Programming and <strong>Security</strong>, ser. E-SMART<br />

'01. London, UK, UK: Springer-Verlag, 2001, pp. 95110. Online Available:<br />

http://dl.acm.org/citation.cfm?id=646803.706114<br />

[204] J. L. Lanet and A. Requet, Formal Proof of Smart Card Applets Correctness,<br />

in Proceedings of the The International Conference on Smart Card Research and<br />

Applications.<br />

London, UK: Springer-Verlag, 2000, pp. 8597. Online Available:<br />

http://dl.acm.org/citation.cfm?id=646692.703437<br />

[205] H. Meijer and E. Poll, Towards a Full Formal Specication of the JavaCard API,<br />

in Smart Card Programming and <strong>Security</strong>, ser. Lecture Notes in Computer Science,<br />

I. Attali and T. Jensen, Eds. Springer Berlin / Heidelberg, 2001, vol. 2140, pp.<br />

165178, 10.1007/3-540-45418-7_14.<br />

[206] V. Almaliotis, A. Loizidis, P. Katsaros, P. Louridas, and D. Spinellis, Static Program<br />

Analysis <strong>for</strong> Java Card Applets, in CARDIS '08: Proceedings of the 8th IFIP<br />

WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications.<br />

Berlin, Heidelberg: Springer-Verlag, 2008, pp. 1731.<br />

[207] E. Biham and A. Shamir, Dierential Fault Analysis of Secret Key Cryptosystems,<br />

in Proceedings of the 17th Annual International Cryptology Conference on Advances<br />

in Cryptology.<br />

London, UK: Springer-Verlag, 1997, pp. 513525. Online Available:<br />

http://dl.acm.org/citation.cfm?id=646762.706179<br />

466

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!