{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:54:44Z","timestamp":1725785684744},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/icdew.2011.5767630","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T16:45:08Z","timestamp":1305650708000},"page":"168-173","source":"Crossref","is-referenced-by-count":11,"title":["Hot updates for Java based smart cards"],"prefix":"10.1109","author":[{"given":"Agnes C.","family":"Noubissi","sequence":"first","affiliation":[]},{"given":"Julien","family":"Iguchi-Cartigny","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICSM.2002.1167829"},{"key":"ref11","article-title":"Reverse-Engineering a Cryptographic RFID Tag","author":"nohl","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref12","article-title":"MIFARE, Little Security, Despite Obscurity","author":"nohl","year":"0","journal-title":"the 24th Congress of the Chaos Computer Club in Berlin"},{"key":"ref13","article-title":"A Pratical Attack on MIFARE Classic","author":"de koning gans","year":"2008","journal-title":"CARDIS"},{"year":"0","key":"ref14"},{"year":"0","journal-title":"Apache","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","journal-title":"Simple","key":"ref17"},{"year":"2000","author":"van deursen","journal-title":"Domainspecific languages An annotated bibliography","key":"ref18"},{"year":"2000","author":"chen","journal-title":"Java card technology for smart cards","key":"ref4"},{"year":"0","journal-title":"Semiconductors Austria GmbH Styria","key":"ref3"},{"key":"ref6","article-title":"Smart card application development using Java Card Technology","author":"fort","year":"2006","journal-title":"SeWeS"},{"year":"0","journal-title":"The Java Card 3 0 specification","key":"ref5"},{"key":"ref8","article-title":"Dynamic deployment of Java applications","author":"andersson","year":"2000","journal-title":"Java for Embedded Systems Workshop"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1542476.1542478"},{"year":"2001","author":"moore","journal-title":"Dynamic software Updating Programming Language Design and Implementation (PLDI)","key":"ref2"},{"key":"ref1","article-title":"Incremental Dynamic Update For Java Smart Cards Applications","author":"noubissi","year":"2010","journal-title":"ICONS'10"},{"key":"ref9","article-title":"Runtime support for type-safe dynamic java classes","author":"barr","year":"2000","journal-title":"ECOOP"}],"event":{"name":"2011 IEEE International Conference on Data Engineering Workshops (ICDEW)","start":{"date-parts":[[2011,4,11]]},"location":"Hannover, Germany","end":{"date-parts":[[2011,4,16]]}},"container-title":["2011 IEEE 27th International Conference on Data Engineering Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5765044\/5767605\/05767630.pdf?arnumber=5767630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T02:11:30Z","timestamp":1490062290000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5767630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icdew.2011.5767630","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}