{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:38:19Z","timestamp":1725485899770},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_9","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"118-137","source":"Crossref","is-referenced-by-count":1,"title":["Applet Verification Strategies for RAM-Constrained Devices"],"prefix":"10.1007","author":[{"given":"Nils","family":"Maltesson","sequence":"first","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Trichina","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"9_CR1","unstructured":"A. Aho, R. Sethi, J. Ullman, Compilers: Principles, Techniques, and Tools, Addison-Wesley, 1986. 125"},{"key":"9_CR2","unstructured":"Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide, The Java Series, Addison-Wesley, 2000. 118, 130"},{"key":"9_CR3","unstructured":"R. Cohen, The defensive Java virtual machine specification, Technical Report, Computational Logic Inc., 1997. 119"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"P. Cousot, R. Cousot, Abstract Interpretation: a Unified Lattice Model for Static Analysis by Construction or Approximation of Fixpoints, Proceedings of POPL\u201977, ACM Press, Los Angeles, California, pp. 238\u2013252. 121","DOI":"10.1145\/512950.512973"},{"key":"9_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-44585-4_26","volume-title":"Computer Aided Verification, CAV 2001","author":"X. Leroy","year":"2001","unstructured":"X. Leroy, Java Byte-Code Verification: an Overview, In G. Berry, H. Comon, and A. Finkel, editors, Computer Aided Verification, CAV 2001, volume 2102 of Lecture Notes in Computer Science, pp. 265\u2013285, Springer-Verlag, 2001. 120"},{"key":"9_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45418-7_13","volume-title":"Smart Card Programming and Security","author":"X. Leroy","year":"2001","unstructured":"X. Leroy, On-Card Byte-code Verification for Java card, In I. Attali and T. Jensen, editors, Smart Card Programming and Security, proceedings E-Smart 2001, volume 2140 of Lecture Notes in Computer Science, pp. 150\u2013164, Springer-Verlag, 2001. 119"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"X. Leroy, Bytecode Verification for Java smart card, Software Practice & Experience, 32:319\u2013340, 2002. 119","journal-title":"Software Practice & Experience"},{"key":"9_CR8","unstructured":"T. Lindholm, F. Yellin, The Java Virtual Machine Specification, The Java Series, Addison-Wesley, 1999. 119, 120, 122, 124, 129, 136"},{"key":"9_CR9","unstructured":"G. McGraw, E. Felten Securiy Java, John Wiley & Sons, 1999. 119"},{"key":"9_CR10","unstructured":"S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufmann, 1997. 125"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"G. Necula, Proof-carrying code, Proceedings of POPL\u201997, pp. 106\u2013119, ACM Press, 1997. 119","DOI":"10.1145\/263699.263712"},{"key":"9_CR12","volume-title":"Denotational Semantics, a Methodology for Language Development","author":"D. Schmidt","year":"1986","unstructured":"D. Schmidt, Denotational Semantics, a Methodology for Language Development, Allyn and Bacon, Boston, 1986."},{"key":"9_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45165-X_3","volume-title":"Java on Smart Cards: Programming and Security","author":"P. Bieber","year":"2001","unstructured":"P. Bieber, J. Cazin, A. El-Marouani, P. Girard, J.-L. Lanet, V. Wiels, G. Zanon, The PACAP prototype: a tool for detecting java card illegal flows, In I. Attali and T. Jensen, editors, Java on Smart Cards: Programming and Security, vol. 2041 of Lecture Notes in Computer Science, pp. 25\u201337, Springer-Verlag, 2001. 136"},{"issue":"2","key":"9_CR14","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/322186.322187","volume":"27","author":"A. Yao","year":"1980","unstructured":"A. Yao, New algorithms for bin packing, Journal of the ACM, 27(2):207\u2013227, April 1980. 134","journal-title":"Journal of the ACM"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/BF02579456","volume":"1","author":"W. Vega de la","year":"1981","unstructured":"W. de la Vega, G. Lueker, Bin packing can be solved within 1+\u2208 in linear time, Combinatorica, 1(4):349\u2013355, 1981. 134","journal-title":"Combinatorica"},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1137\/0203025","volume":"3","author":"D. Johnson","year":"1974","unstructured":"D. Johnson, A. Demers, J. Ullman, M. Garey, R. Graham, Worst-case performance bounds for simple one-dimensional packaging algorithms, SIAM Journal on Computing, 3(4):299\u2013325, December 1974. 134","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"9_CR17","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1137\/0602019","volume":"2","author":"B. Baker","year":"1981","unstructured":"B. Baker, A new proof for the first-fit decreasing bin-packing algorithm, SIAM Journal Alg. Disc. Meth., 2(2):147\u2013152, June 1981. 134","journal-title":"SIAM Journal Alg. Disc. Meth."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T00:07:27Z","timestamp":1550362047000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}