Proof Transformations for Evolutionary Formal Software Development
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
A Method for Secure Smartcard Applications
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Information Flow Control and Applications - Bridging a Gap
FME '01 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods for Increasing Software Productivity
Verified formal security models for multiapplicative smart cards
Journal of Computer Security - Special issue on ESORICS 2000
Checking secure interactions of smart card applets: extended version
Journal of Computer Security - Special issue on ESORICS 2000
Intransitive Non-Interference for Cryptographic Purposes
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
An extended model of security policy for multi-applicative smart cards
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Managing the risk of covert information flows in virtual machine systems
Proceedings of the 12th ACM symposium on Access control models and technologies
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
Analysis of three multilevel security architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
The Caernarvon secure embedded operating system
ACM SIGOPS Operating Systems Review
Privacy is essential for secure mobile devices
IBM Journal of Research and Development
Implementing a high-assurance smart-card OS
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Can we support applications' evolution in multi-application smart cards by security-by-contract?
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Designing a side channel resistant random number generator
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Load time security verification
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Java card architecture for autonomous yet secure evolution of smart cards applications
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Load time code validation for mobile phone Java Cards
Journal of Information Security and Applications
Hi-index | 0.00 |