Cited By
View all- Berlach RLackner MSteger CLoinig JHaselsteiner EKnoop JSalapura VKoren IPelosi G(2014)Memory-efficient on-card byte code verification for Java cardsProceedings of the First Workshop on Cryptography and Security in Computing Systems10.1145/2556315.2556323(37-40)Online publication date: 20-Jan-2014
- Courbot AGrimaud GVandewalle J(2010)Efficient off-board deployment and customization of virtual machine-based embedded systemsACM Transactions on Embedded Computing Systems10.1145/1698772.16987799:3(1-53)Online publication date: 5-Mar-2010
- Akram RMarkantonakis KMayes K(2010)Firewall mechanism in a user centric smart card ownership modelProceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application10.1007/978-3-642-12510-2_9(118-132)Online publication date: 14-Apr-2010
- Show More Cited By