Virus in a smart card : myth or reality?
| dc.contributor.author | Hamadouche, S. | |
| dc.contributor.author | Lanet, J.-L. | |
| dc.date.accessioned | 2015-12-09T13:29:47Z | |
| dc.date.available | 2015-12-09T13:29:47Z | |
| dc.date.issued | 2013 | |
| dc.identifier.issn | 22142134 | |
| dc.identifier.uri | https://dspace.univ-boumerdes.dz/handle/123456789/2508 | |
| dc.language.iso | en | en_US |
| dc.publisher | Elsevier | en_US |
| dc.relation.ispartofseries | Journal of Information Security and Applications/ Vol.18, N°2-3 (2013);pp. 130-137 | |
| dc.subject | Countermeasures | en_US |
| dc.subject | Faults | en_US |
| dc.subject | Java card | en_US |
| dc.subject | Smart card | en_US |
| dc.subject | Viruses | en_US |
| dc.subject | Computer viruses | en_US |
| dc.subject | Radar countermeasures | en_US |
| dc.subject | Static analysis | en_US |
| dc.subject | Code review | en_US |
| dc.subject | Design applications | en_US |
| dc.subject | Fault injection | en_US |
| dc.subject | Hardware attack | en_US |
| dc.subject | Mutation analysis | en_US |
| dc.subject | Propagation effect | en_US |
| dc.subject | Third parties | en_US |
| dc.title | Virus in a smart card : myth or reality? | en_US |
| dc.type | Article | en_US |
