{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:08:49Z","timestamp":1729663729766,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/wocc.2013.6676466","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T16:14:00Z","timestamp":1386173640000},"page":"707-710","source":"Crossref","is-referenced-by-count":0,"title":["A security vulnerability of Java Card on array access in financial system"],"prefix":"10.1109","author":[{"given":"Jiang-pei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Li-ji","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiang-jun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yu-zhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang-min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"117","article-title":"Intelligent communication system, automation control, java card and security","author":"nderin","year":"2008","journal-title":"Mathematics and Computers in Sciences and Engineering"},{"key":"2","first-page":"1038","article-title":"Design and implementation of a low power java coprocessor for dual-interface ic bank card","author":"he","year":"2011","journal-title":"9th International Conference on ASIC"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","article-title":"Malicious code on java card smartcards: Attacks and countermeasures","volume":"5189","author":"mostowski","year":"2008","journal-title":"Smart Card Research and Advanced Applications Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/503112.503115"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_27"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2010.331"},{"key":"4","first-page":"331","article-title":"An efficient and simple way to test the security of java cards","author":"serge","year":"2005","journal-title":"Proceedings of the 3rd International Workshop on Security in Information Systems WOSIS 2005 in Conjunction with ICEIS"},{"key":"9","first-page":"283","article-title":"Combined software and hardware attacks on the java card control flow","author":"bouffard","year":"2011","journal-title":"10th IFIP WG 8 8\/11 2 International Conference CARDIS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028886"}],"event":{"name":"2013 22nd Wireless and Optical Communication Conference (WOCC 2013)","start":{"date-parts":[[2013,5,16]]},"location":"Chongqing, China","end":{"date-parts":[[2013,5,18]]}},"container-title":["2013 22nd Wireless and Optical Communication Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6657106\/6676323\/06676466.pdf?arnumber=6676466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:39:38Z","timestamp":1498088378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6676466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wocc.2013.6676466","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}