User Tools

Site Tools


security-by-contract_for_mobile_and_smart_card

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security-by-contract_for_mobile_and_smart_card [2013/05/07 18:08]
olga.gadyatskaya@unitn.it [Publications]
security-by-contract_for_mobile_and_smart_card [2021/01/29 10:58] (current)
Line 60: Line 60:
 ==== Publications ==== ==== Publications ====
 **SxC for Java Card:** **SxC for Java Card:**
-    * O.Gadyatskaya and F.Massacci: Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. In //​Proceedings of HATS-2012 Summer School//, Springer {{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-hats2012.pdf|}}+    * O.Gadyatskaya and F.Massacci: Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. In //​Proceedings of HATS-2012 Summer School//, Springer {{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-hats2012.pdf|PDF}}
   * O.Gadyatskaya,​ F.Massacci and E.Lostal: // Extended Abstract: Embeddable Security-by-Contract Verifier for Java Card. // In BYTECODE-2012,​ Tallinn, Estonia, 2012. {{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-lost-bytecode-2012.pdf|PDF}} ​   * O.Gadyatskaya,​ F.Massacci and E.Lostal: // Extended Abstract: Embeddable Security-by-Contract Verifier for Java Card. // In BYTECODE-2012,​ Tallinn, Estonia, 2012. {{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-lost-bytecode-2012.pdf|PDF}} ​
   * O. Gadyatskaya,​ F. Massacci and E. Lostal: // Load Time Security Verification.//​ In Proceedings of International Conference on Information Systems Security (ICISS 2011), Kolkata, India, vol. LNCS 7093 pp. 250-264, Springer.{{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-lost-iciss-2011.pdf|PDF}}   * O. Gadyatskaya,​ F. Massacci and E. Lostal: // Load Time Security Verification.//​ In Proceedings of International Conference on Information Systems Security (ICISS 2011), Kolkata, India, vol. LNCS 7093 pp. 250-264, Springer.{{:​research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-lost-iciss-2011.pdf|PDF}}
security-by-contract_for_mobile_and_smart_card.txt ยท Last modified: 2021/01/29 10:58 (external edit)