Sciweavers

205 search results - page 14 / 41
» Transactions in Java Card
Sort
View
FMICS
2008
Springer
13 years 9 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
14 years 1 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
SEC
2004
13 years 9 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
KDD
1998
ACM
185views Data Mining» more  KDD 1998»
14 years 14 hour ago
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection
Verylarge databases with skewedclass distributions and non-unlformcost per error are not uncommonin real-world data mining tasks. Wedevised a multi-classifier meta-learningapproac...
Philip K. Chan, Salvatore J. Stolfo
CARDIS
1998
Springer
121views Hardware» more  CARDIS 1998»
14 years 1 days ago
Efficient Smart-Card Based Anonymous Fingerprinting
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...