Academia.eduAcademia.edu

Java Card

description480 papers
group36 followers
lightbulbAbout this topic
Java Card is a technology that enables the development and deployment of Java-based applications on smart cards and other resource-constrained devices. It provides a secure environment for executing applets, allowing for secure transactions and data management in various applications, including payment systems and identity verification.
lightbulbAbout this topic
Java Card is a technology that enables the development and deployment of Java-based applications on smart cards and other resource-constrained devices. It provides a secure environment for executing applets, allowing for secure transactions and data management in various applications, including payment systems and identity verification.
The RISC-V True Random Number Generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the Entropy Source (ES) component away from cryptographic DRBGs into a separate privileged interface, and in its use of... more
The Java dialect Java Card for programming smartcards contains some features which do not exist in Java. Java Card distinguishes persistent and transient data (data stored in EEPROM and RAM, respectively). Because power to a smartcard can... more
This paper describes a case study in refining an abstract security protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an... more
Ahead-of-Time and Just-in-Time compilation are common ways to improve runtime performances of restrained systems like Java Card by turning critical Java methods into native code. However, native code is much bigger than Java bytecode,... more
A new fast stream cipher, MAJE4 is designed and developed with a variable key size of 128-bit or 256-bit. The randomness property of the stream cipher is analysed by using the statistical tests. The performance evaluation of the stream... more
Permission is granted for you to make copies of this manual for educational and scholarly purposes, and for commercial use in specifying software, but the copies may not be sold or otherwise used for direct commercial advantage; this... more
The use of formal methods can significantly improve software quality. However, many instructors and students consider formal methods to be too difficult, impractical, and esoteric for use in undergraduate classes. This paper describes a... more
Design by Contract (DBC) is an oft-cited, but rarely followed, programming practice that focuses on writing formal specifications first, and writing code that fulfills those specifications second. The development of static analysis tools... more
Abstract: ESC/Java2 is a tool for statically checking program specifications. It expands significantly upon ESC/Java, on which it is built. It is consistent with the definition of JML and of Java 1.4. It adds additional static checking to... more
The nonterminal java-literal represents Java literals which are taken without change from Java [Gosling-Joy-Steele96]. Various authors refer to "model types" when they really mean "types with modifier pure that are used for modeling."... more
Plataforma para el acceso a servicios desde dispositivos móviles utilizando parámetros de autenticación basados en SIM Card
Security requirements are more demanding in the e-commerce domain. However, mobile e-commerce settings not only insist on security requirements, they also require balance between security levels and hardware and usability device ability.... more
Java is a popular development platform for mobile code systems. It ensures application portability and mobility for a variety of systems, while providing strong security features. The intermediate code (byte code) allows the virtual... more
The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such down-
Java is the ideal development platform for mobile code systems. It ensures application portability and mobility for a variety of platforms, while providing strong security features. The intermediate code (byte code) allows us to verify... more
In this paper we present a methodology and protocol for establishing a security context between a Mobile Operator's application server and a GSM/UMTS SIM card. The methodology assumes that the already issued Mobile Station is capable but... more
The use of certificates for secure transactions in smart cards requires the existence of a secure and efficient revocation protocol. There are a number of existing protocols for online certificate revocation and validation, among which... more
Digital content providers seek to restrict usage by implementing conditional access. One such scenario is the security aspects of digital video broadcast (DVB-S). There has been a history of attacks on this technology to circumvent any... more
The advent of smartphones and the flexibility to have multiple applications serving the user's needs, has started a convergence of different services into a single device. Traditional services provided by mobile phones like voice and text... more
Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on... more
Currently it is possible to implement Biometric Passport applets according to ICAO specifications. In this paper, an ePassport Java Card applet, according to ICAO specifications using the Basic Access Control security, is developed. A... more
Comparing Systems Specification Techniques
“What questions are prompted by ones particular method of specification?1'
The workshop runs its third edition, and it has followed the previous CAT07 and CAT08. The prefix " EURO " underlines the European scope of this edition of the workshop. In its previous editions the workshop was co-located with... more
E-commerce is the most efficient and time-effective method to promote a product to worldwide customers. Its transaction may require submitting customer's personal information such as username, password, credit card numbers, and financial... more
The task of developing Java-based applications for embedded systems can be greatly enhanced by providing developers access to Java’s Core APIs such as java.lang and java.util. Oftentimes, platforms used in embedded systems are scaled back... more
The rapid expansion of the Internet of Things (IoT) introduces significant security challenges, given the resource-constrained nature of most IoT devices. To address these challenges, elliptic curve cryptography (ECC) has emerged as a... more
Due to the fast evolving of trusted computing environments and internet-of-things an eager need has been established for open platforms which support interchangeable technologies to co-exist without threatening system's security.... more
Java Card is the dominant smartcard technology in use today, with over 12 billion Java Card smartcards having shipped globally in the last 15 years. Almost exclusively, the deployed Java Card smartcards are instances of a Classic edition... more
In this paper, we discuss a new testing process to generate test cases for object-oriented programs. We focus on classes with mutable objects. The test case construction process is guided by formal object-oriented specifications. In our... more
The contactless bank card is a replica of the old fashion payment methods. The contactless card saves the customer a lot of time and effort because the cardholder can tap the card on the card reader instead of carrying a massive amount of... more
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information systems and applications. In this paper, we evaluate all... more
Given the undeniable popularity of the Web, providing efficient and secure access to remote databases using a Web browser is crucial for the emerging cooperative information systems and applications. In this paper, we evaluate all... more
This industry wide recognition expresses an essential fact. The specific properties of smart cards, compared with all other types of cards, are determined by a microcontroller integrated in a card, which controls, initiates, and monitors... more
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could run on small devices with limited... more
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper... more
This paper describes a radical approach to aggressively optimize an embedded Java virtual machine interpretation in a portable way. We call this technique Semantically Enriched Code (sEc). The sEc technique can improve the speed of a JVM... more
The convergence of the cell phone industry and the Internet brings with it a myriad of services, to be accessed when on the move. It also brings a need for a paradigm shift in its billing mechanism. The current billing operation does not... more
Este trabalho tem como objetivo apresentar o conceito de Java Card e os principais metodos, tecnicas e ferramentas utilizadas na atualidade por desenvolvedores. A ideia e apresentar a tecnologia e detalhar o processo de como iniciar uma... more
This paper describes the functionality and practical uses of a network smart card: a smart card that can connect to the Internet as a secure and autonomous peer. The network smart card does not require any special middleware on the host... more
The Java Modeling Language (JML) is a behavioral interface specification language tailored for specifying Java modules. This paper describes a source-to-source translation tool that takes a JML specification and Java source code for a... more
The Java Modeling Language (JML) is a behavioral interface specification language tailored for specifying Java modules. This paper describes a source-to-source translation tool that takes a JML specification and Java source code for a... more
He is currently a Member of the Research Staff of the Palo Alto Research Center, Xerox Corporation, El Segundo, California, where he is working on advanced display processor design and digital communications systems. His research... more
Bytecode is a stack based java virtual machine instruction set that contains 202 instructions, not only it provides architectural independence to java but also ensures that the code is secure and portable. It has widely evolved into a... more
Accessing files on remote resources is a required function in Grids. In this paper, we report on the file transfer patterns supported in the Java CoG Kit. These patterns are supported by a rich set of accompanying components, including... more
This paper discusses the incompatibility between the formal logic derived from quantum phenomenology and the ordinary logic that underlies the mathematics constituting the formal language of quantum mechanics. A new discrete scenario in... more
Download research papers for free!