International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data management techniques. However, secure chips have severe hardware constraints, which make traditional database techniques irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices and trade-offs for different applications. Our solution is to use a benchmark for secure chip DBMS in order to 1) compare different database techniques, 2) predict the limits of on-chip applications, and 3) provide codesign hints. In this paper, we propose Data management in Secure Chip (DiSC), a benchmark that reache...
National audienceAmong other threats, secure components are subjected to physical attacks whose aim ...
This paper introduces the trusted execution module (TEM); a high-level specification for a commodity...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract: Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
Smart cards have proven to be quite useful as a contract sanction records medium in European countri...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
National audienceAmong other threats, secure components are subjected to physical attacks whose aim ...
This paper introduces the trusted execution module (TEM); a high-level specification for a commodity...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
International audienceTesting a secure system is often considered as a severe bottleneck. While test...
Abstract: Chip-Secured XML Access (C-SXA) is a versatile and tamper-resistant XML-based Access Right...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
Smart cards have proven to be quite useful as a contract sanction records medium in European countri...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
National audienceAmong other threats, secure components are subjected to physical attacks whose aim ...
This paper introduces the trusted execution module (TEM); a high-level specification for a commodity...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...