Smart card operating systems: Past, present and future, Proceedings of the 5 th NORDU/USENIX Conference, 2003. ,
Multiapplication smart card: Towards an open smart card?, Information Security Technical Report, vol.14, issue.2, pp.70-78, 2009. ,
DOI : 10.1016/j.istr.2009.06.007
URL : https://hal.archives-ouvertes.fr/hal-00463223
New Security Problems Raised by Open Multiapplication Smart Cards, LaBRI, Université Bordeaux, vol.1, pp.1332-1336, 2004. ,
Java Card Technology for Smart Cards: Architecture and Programmer's Guide, 2000. ,
Secure Object Sharing in Java Card, WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pp.14-14, 1999. ,
An Operational Semantics of the Java Card Firewall, E-SMART '01: Proceedings of the International Conference on Research in Smart Cards, pp.95-110, 2001. ,
Enforcement of Applet Boundaries in Java Card Systems, IASTED Conf. on Software Engineering and Applications, pp.96-101, 2004. ,
Application Programming Interface Runtime Environment Specification, Virtual Machine Specification, Sun Microsystem Inc Std. Version 2.2.2, 2006. ,
The Multos Specification ,
Checking Absence of Illicit Applet Interactions: A??Case??Study, Fundamental Approaches to Software Engineering, 2004. ,
DOI : 10.1007/978-3-540-24721-0_6
Malicious Code on Java Card Smartcards: Attacks and Countermeasures, CARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, pp.1-16, 2008. ,
DOI : 10.1007/978-3-540-30569-9_7
Secure Object Flow Analysis for Java Card, CARDIS'02: Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference, pp.11-11, 2002. ,
The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow, JavaCard '00: Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security, pp.25-37, 2001. ,
DOI : 10.1007/3-540-45165-X_3
Application Management Framework in User Centric Smart Card Ownership Model, The 10th International Workshop on Information Security Applications (WISA09), pp.20-35, 2009. ,
DOI : 10.1007/978-3-642-10838-9_3
Which Security Policy for Multiplication Smart Cards, WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pp.3-3, 1999. ,
Java Bytecode Verification by Model Checking, CAV '99: Proceedings of the 11th International Conference on Computer Aided Verification, pp.491-494, 1999. ,
DOI : 10.1007/3-540-48683-6_43
Verified Bytecode Model Checkers, TPHOLs '02: Proceedings of the 15th International Conference on Theorem Proving in Higher Order Logics, pp.47-66, 2002. ,
DOI : 10.1007/3-540-45685-6_5
A Certifying Compiler for Java, PLDI '00: Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, pp.95-107, 2000. ,
A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines, VMCAI '02: Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation, pp.32-45, 2002. ,
DOI : 10.1007/3-540-47813-2_3
Defining the Java Virtual Machine as platform for provably correct Java compilation, MFCS '98: Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science, pp.17-35, 1998. ,
DOI : 10.1007/BFb0055755
Applied cryptography): protocols, algorithms, and source code in C, 1995. ,
Building an "impossible" verifier on a java card, WIESS'02: Proceedings of the 2nd conference on Industrial Experiences with Systems Software, pp.2-2, 2002. ,
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography, CMS 2004 -Eight IFIP TC- 6-11 Conference on Communications and Multimedia, pp.79-96, 2004. ,
DOI : 10.1007/0-387-24486-7_6