Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some difficulties. In- deed, most of the classical algorithms for computing WCET do not address resource-limitation or security issues. In this article, we propose to distribute the computation process between the off-card part running on a powerful workstation and the on-card part specific to the hardware included in the smart card. We also guarantee the safety of our com- putation process by inserting assertions in the generated code and preventing information leaks from the card to the outside
Abstract. The executions of operating system services based on smart cards allow one to personalize ...
ABSTRACT Internet of Things is a most promising domain where the confidentiality and integrity of d...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
International audienceComputing power is largely becoming a basic supply which you can envisage to b...
This paper presents an open and modular middleware for smart cards, providing a simple abstraction o...
In this paper, we propose a new key distribution scheme for the flexible chipset pairing. Chipset pa...
This article presents an overview of the cryptographic primitives that are commonly implemented on s...
This paper presents an open protocol for interoperability across multi-vendor programmable smart car...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
This paper presents an open protocol for interoperability across multi-vendor programmable smart car...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
Abstract. The executions of operating system services based on smart cards allow one to personalize ...
ABSTRACT Internet of Things is a most promising domain where the confidentiality and integrity of d...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
International audienceComputing power is largely becoming a basic supply which you can envisage to b...
This paper presents an open and modular middleware for smart cards, providing a simple abstraction o...
In this paper, we propose a new key distribution scheme for the flexible chipset pairing. Chipset pa...
This article presents an overview of the cryptographic primitives that are commonly implemented on s...
This paper presents an open protocol for interoperability across multi-vendor programmable smart car...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
This paper presents an open protocol for interoperability across multi-vendor programmable smart car...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
Abstract. The executions of operating system services based on smart cards allow one to personalize ...
ABSTRACT Internet of Things is a most promising domain where the confidentiality and integrity of d...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...