Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Lawton, G.: Moving Java into mobile phones. Computer 35(6), 17–20 (2002)
2. Baentsch, M., Buhler, P., Eirich, T., Hring, F., Oestreicher, M.: JavaCard – from hype to reality. IEEE Concurrency 7(4), 36–43 (1999)
3. Levis, P., Culler, D.: Maté: a tiny virtual machine for sensor networks. In: ASPLOS-X: Proceedings of the 10th international conference on Architectural support for programming languages and operating systems, pp. 85–95. ACM Press, New York (2002)
4. Naccache, D.: Finding faults. IEEE Security & Privacy, 61–65 (2005)
5. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (2004),
http://www.gemplus.com/smart/rd/publications/pdf/BCN_04sor.pdf
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献