User Tools

Site Tools


security-by-contract_for_mobile_and_smart_card

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

security-by-contract_for_mobile_and_smart_card [2013/05/07 18:08]
olga.gadyatskaya@unitn.it [Publications]
security-by-contract_for_mobile_and_smart_card [2013/05/07 18:08] (current)
olga.gadyatskaya@unitn.it [Publications]
Line 60: Line 60:
 ==== Publications ==== ==== Publications ====
 **SxC for Java Card:** **SxC for Java Card:**
-    * O.Gadyatskaya and F.Massacci: Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. In //Proceedings of HATS-2012 Summer School//, Springer {{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-hats2012.pdf|}}+    * O.Gadyatskaya and F.Massacci: Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. In //Proceedings of HATS-2012 Summer School//, Springer {{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-hats2012.pdf|PDF}}
   * O.Gadyatskaya, F.Massacci and E.Lostal: // Extended Abstract: Embeddable Security-by-Contract Verifier for Java Card. // In BYTECODE-2012, Tallinn, Estonia, 2012. {{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-lost-bytecode-2012.pdf|PDF}}    * O.Gadyatskaya, F.Massacci and E.Lostal: // Extended Abstract: Embeddable Security-by-Contract Verifier for Java Card. // In BYTECODE-2012, Tallinn, Estonia, 2012. {{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-lost-bytecode-2012.pdf|PDF}} 
   * O. Gadyatskaya, F. Massacci and E. Lostal: // Load Time Security Verification.// In Proceedings of International Conference on Information Systems Security (ICISS 2011), Kolkata, India, vol. LNCS 7093 pp. 250-264, Springer.{{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-lost-iciss-2011.pdf|PDF}}   * O. Gadyatskaya, F. Massacci and E. Lostal: // Load Time Security Verification.// In Proceedings of International Conference on Information Systems Security (ICISS 2011), Kolkata, India, vol. LNCS 7093 pp. 250-264, Springer.{{:research_activities:security-by-contract_for_mobile_and_smart_card:gady-mass-lost-iciss-2011.pdf|PDF}}
security-by-contract_for_mobile_and_smart_card.txt ยท Last modified: 2013/05/07 18:08 by olga.gadyatskaya@unitn.it