{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:01:59Z","timestamp":1725652919473},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_4","type":"book-chapter","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T21:01:25Z","timestamp":1326747685000},"page":"32-48","source":"Crossref","is-referenced-by-count":0,"title":["SC 2: Secure Communication over Smart Cards"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Dragoni","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Lostal","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Papini","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Fabra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Texts in Theoretical Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5","volume-title":"Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions","author":"Y. Bertot","year":"2004","unstructured":"Bertot, Y., Cast\u00e9ran, P.: Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions. Texts in Theoretical Computer Science. Springer, Heidelberg (2004)"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodeia","year":"2005","unstructured":"Bodeia, C., Buchholtzb, M., Deganoa, P., Nielsonb, F., Nielsonb, H.R.: Static validation of security protocols. Computer Security\u00a013(3), 347\u2013390 (2005)","journal-title":"Computer Security"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11526841_8","volume-title":"FM 2005: Formal Methods","author":"D. Cachera","year":"2005","unstructured":"Cachera, D., Jensen, T., Pichardie, D., Schneider, G.: Certified Memory Usage Analysis. In: Fitzgerald, J.S., Hayes, I.J., Tarlecki, A. (eds.) FM 2005. LNCS, vol.\u00a03582, pp. 91\u2013106. Springer, Heidelberg (2005)"},{"key":"4_CR4","volume-title":"Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide","author":"Z. Chen","year":"2000","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: Architecture and Programmer\u2019s Guide. Addison-Wesley, Boston (2000)"},{"key":"4_CR5","unstructured":"Multos Consortium. Multos developer\u2019s reference manual. mao-doc-tec-006 v1.45. Specification 1.45 (2009)"},{"key":"4_CR6","unstructured":"Dawei, Z., Wenrui, D.: Optimization of resolution on Java card. Journal of Beijing University of Aeronautics and Astronautics (2009)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Desmet, L., Joosen, W., Massacci, F., Philippaerts, P., Piessens, F., Siahaan, I., Vanoverberghe, D.: Security-by-Contract on the .NET platform. Information Security Tech. Rep.\u00a013(1), 25\u201332 (2008)","DOI":"10.1016\/j.istr.2008.02.001"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-12368-9_16","volume-title":"Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices","author":"N. Dragoni","year":"2010","unstructured":"Dragoni, N., Gadyatskaya, O., Massacci, F.: Supporting Applications\u2019 Evolution in Multi-Application Smart Cards by Security-by-Contract [Short Paper]. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol.\u00a06033, pp. 221\u2013228. Springer, Heidelberg (2010)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Dragoni, N., Gadyatskaya, O., Massacci, F.: Security-by-contract for applicationsevolution in multi-application smart cards. In: Proc. of NODES, DTU Technical Report (2010)","DOI":"10.1007\/978-3-642-12368-9_16"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-73408-6_21","volume-title":"Public Key Infrastructure","author":"N. Dragoni","year":"2007","unstructured":"Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 297\u2013312. Springer, Heidelberg (2007)"},{"key":"4_CR11","unstructured":"Fournerie, L.: An in-card bytecode optimization for objects management in java-based smart cards. In: Proc. of the 4th Gemplus Developer Conference (2002)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-85893-5_3","volume-title":"Smart Card Research and Advanced Applications","author":"D. Ghindici","year":"2008","unstructured":"Ghindici, D., Simplot-Ryl, I.: On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 32\u201347. Springer, Heidelberg (2008)"},{"key":"4_CR13","unstructured":"Giambiagi, P., Schneider, G.: Memory consumption analysis of java smart cards. In: Proc. of CLEI 2005, Cali, Colombia (October 2005)"},{"key":"4_CR14","first-page":"25","volume":"22","author":"O. Henninger","year":"2006","unstructured":"Henninger, O., Lafou, K., Scheuermann, D., Struif, B.: Verifying X.509 Certificates on Smart Cards. World Academy of Science, Engineering and Technology\u00a022, 25\u201328 (2006)","journal-title":"World Academy of Science, Engineering and Technology"},{"key":"4_CR15","unstructured":"GlobalPlatform Inc. GlobalPlatform Card Specification, Version 2.2. Specification 2.2, GlobalPlatform Inc. (2006)"},{"key":"4_CR16","unstructured":"ITU-T. ITU-T Rec. X.690 Information technology \u2013 ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). Technical report, ITU (2002)"},{"key":"4_CR17","unstructured":"ITU-T. ITU-T Rec. X.509 Information technology \u2013 Open Systems Interconnection \u2013 The Directory: Public-key and attribute certificate frameworks. Technical report, ITU (2005)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/3-540-45803-4_50","volume-title":"Information Networking. Wired Communications and Management","author":"D.-W. Kim","year":"2002","unstructured":"Kim, D.-W., Jung, M.-S.: A Study on the Optimization of Class File for Java Card Platform. In: Chong, I. (ed.) ICOIN 2002. LNCS, vol.\u00a02343, pp. 563\u2013570. Springer, Heidelberg (2002)"},{"key":"4_CR19","unstructured":"RSA Laboratories PKCS #1 v2.1: RSA Cryptography Standard. RSA Security Inc. Public-Key Cryptography Standards (PKCS) (June 2002)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification on java smart cards. Softw. Pract. Exper.\u00a032, 319\u2013340 (2002)","journal-title":"Softw. Pract. Exper."},{"key":"4_CR21","unstructured":"Sun Microsystems. Runtime environment specification. Java CardTM platform, version 3.0, connected edition. Specification 3.0, Sun Microsystems (2008)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC\u00a02560 (June 1999)","DOI":"10.17487\/rfc2560"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: Proc. of the 24th ACM SIGPLAN-SIGACT Symp. on Princ. of Prog. Lang., pp. 106\u2013119. ACM Press (1997)","DOI":"10.1145\/263699.263712"},{"issue":"9","key":"4_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine\u00a032(9), 33\u201338 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Nystrom, M., Kaliski, B.: PKCS #10: Certification Request Syntax Specification version 1.7. Technical report, RSA Security, Internet RFC 2986 (November 2000)","DOI":"10.17487\/rfc2986"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: Proc. of SOSP 2003, pp. 15\u201328. ACM (2003)","DOI":"10.1145\/1165389.945448"},{"key":"4_CR27","unstructured":"Smart, N.: ECRYPT II Yearly Report on Algorithms and Keysizes (2009-2010) (March 2010)"},{"key":"4_CR28","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson Education (2002)"},{"key":"4_CR29","unstructured":"Sun Microsystems, Inc. Development Kit User\u2019s Guide, Java Card Platform, Version 2.2.2 (March 2006)"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","volume-title":"Secure Internet Programming","author":"B.S. Yee","year":"1999","unstructured":"Yee, B.S.: A Sanctuary for Mobile Agents. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 261\u2013273. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T20:12:41Z","timestamp":1556136761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}