{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:55:39Z","timestamp":1743036939133,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_22","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"497-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Introduction to Java Card Programming"],"prefix":"10.1007","author":[{"given":"Raja Naeem","family":"Akram","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"22_CR1","unstructured":"Multos: The Multos Specification. http:\/\/www.multos.com\/"},{"key":"22_CR2","unstructured":"NSA Suite B Cryptography. http:\/\/www.nsa.gov\/ia\/programs\/suiteb_cryptography\/index.shtml"},{"key":"22_CR3","unstructured":"ISO\/IEC 7816\u20134, Identification cards - Integrated circuit cards - Part 4: Organization, security adn commands for interchange, (2005). http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=36134"},{"key":"22_CR4","unstructured":"GlobalPlatform: GlobalPlatform Card Specification, Version 2.2, (2006). http:\/\/www.globalplatform.org\/specificationscard.asp"},{"key":"22_CR5","unstructured":"Java Card Platform Specification; Application Programming Interface, Runtime Environment Specification, Virtual Machine Specification, (2006). http:\/\/java.sun.com\/javacard\/specs.html"},{"key":"22_CR6","unstructured":"EMV 4.2: Book 1 - Application Independent ICC to Terminal Interface Requirements, Book 2 - Security and Key Management, Book 3 - Application Specification, Book 4 - Cardholder, Attendant, and Acquirer Interface Requirements, (2008). http:\/\/www.emvco.com\/specifications.aspx?id=155"},{"key":"22_CR7","unstructured":"ISO\/IEC 14443: Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards, Part1: Physical Characteristics, Part 2: Radio Frequency Power and Signal Interface, Part3: Initialization and Anticollision, Part 4: Transmission Protocol, (2008). http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=28728"},{"key":"22_CR8","unstructured":"Java Card Platform Specification: Classic Edition; Application Programming Interface, Runtime Environment Specification, Virtual Machine Specification, Connected Edition; Runtime Environment Specification, Java Servlet Specification, Application Programming Interface, Virtual Machine Specification, Sample Structure of Application Modules, (2009). http:\/\/java.sun.com\/javacard\/3.0.1\/specs.jsp"},{"key":"22_CR9","unstructured":"BasicCard (Visited June, 2010). http:\/\/basiccard.com\/"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: Firewall Mechanism in a User Centric Smart Card Ownership Model. In: D. Gollmann, J.L. Lanet, J. Iguchi-Cartigny (eds.) Smart Card Research and Advanced Application, 9th IFIP WG 8.8\/11.2 International Conference, CARDIS 2010, vol. 6035\/2010, pp. 118\u2013132. Springer, Passau, Germany (2010). DOI http:\/\/dx.doi.org\/10.1007\/978-3-642-12510-2","DOI":"10.1007\/978-3-642-12510-2"},{"key":"22_CR11","unstructured":"Royal Holloway, University of London. Smart Card Centre website. http:\/\/www.scc.rhul.ac.uk\/books\/ssed\/embedded\/chapter_22."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Rankl, W.: Smart Card Applications: Design Models for Using and Programming Smart Cards. Wiley (2007)","DOI":"10.1002\/9780470511954"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Inc., New York, NY, USA (2003)","DOI":"10.1002\/047085670X"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T16:45:34Z","timestamp":1676825134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_22","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}