Abstract. This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specifi-cation of the aplication logic needs not be preoccupied with the specific aspects of the Java Card platform (in particular, communication between the card ac-ceptance device and the smart card itself). Platform-specific code can then be automatically generated during the refinement and code generation process. An interesting side-effect of this approach is that the specification may be reused with any other platform of implementation. 1
In this paper, we present the experiment we have conducted to evaluate the suitability of Java cards...
Smart cards, Chip cards, and Integrated Circuit(s) Cards (ICC) were invented and patented in the 70s...
Smart cards are used in security critical applications where money or private data is involved. Exam...
AbstractThis work proposes a methodology for the rigorous development of Java Card smart card applic...
This paper presents a methodology for the rigorous development of Java Card smart card applications,...
Smartcard have distinctive features like portability, by the reduced size, and the low cost, in orde...
Sun Microsystems defined a set of specifications for a subset of Java technology to create applicati...
This thesis is concerned with different aspects of Java Card application development and use of form...
Java Card technology allows the development and execution of small applications embedded in smart ca...
We present an approach to rigorous, tool supported design and development of Java Card applications....
Since the inception of Java as a cross platform programming language, it has migrated from its initi...
This article describes a Java Card programming environment which to a large extent is generated from...
The Java dialect Java Card for programming smartcards contains some features which do not exist in ...
We present our solution to design and test a security sensitive SmartCard application written in Jav...
WOS: 000346620600002Smart cards are portable integrated devices that store and process data. Speed, ...
In this paper, we present the experiment we have conducted to evaluate the suitability of Java cards...
Smart cards, Chip cards, and Integrated Circuit(s) Cards (ICC) were invented and patented in the 70s...
Smart cards are used in security critical applications where money or private data is involved. Exam...
AbstractThis work proposes a methodology for the rigorous development of Java Card smart card applic...
This paper presents a methodology for the rigorous development of Java Card smart card applications,...
Smartcard have distinctive features like portability, by the reduced size, and the low cost, in orde...
Sun Microsystems defined a set of specifications for a subset of Java technology to create applicati...
This thesis is concerned with different aspects of Java Card application development and use of form...
Java Card technology allows the development and execution of small applications embedded in smart ca...
We present an approach to rigorous, tool supported design and development of Java Card applications....
Since the inception of Java as a cross platform programming language, it has migrated from its initi...
This article describes a Java Card programming environment which to a large extent is generated from...
The Java dialect Java Card for programming smartcards contains some features which do not exist in ...
We present our solution to design and test a security sensitive SmartCard application written in Jav...
WOS: 000346620600002Smart cards are portable integrated devices that store and process data. Speed, ...
In this paper, we present the experiment we have conducted to evaluate the suitability of Java cards...
Smart cards, Chip cards, and Integrated Circuit(s) Cards (ICC) were invented and patented in the 70s...
Smart cards are used in security critical applications where money or private data is involved. Exam...