Applet Verification Strategiesfor RAM-Constrained Devices

Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen. Applet Verification Strategiesfor RAM-Constrained Devices. In Pil Joong Lee, Chae Hoon Lim, editors, Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers. Volume 2587 of Lecture Notes in Computer Science, pages 118-137, Springer, 2002. [doi]

@inproceedings{MaltessonNTT02,
  title = {Applet Verification Strategiesfor RAM-Constrained Devices},
  author = {Nils Maltesson and David Naccache and Elena Trichina and Christophe Tymen},
  year = {2002},
  url = {http://link.springer.de/link/service/series/0558/bibs/2587/25870118.htm},
  researchr = {https://researchr.org/publication/MaltessonNTT02},
  cites = {0},
  citedby = {0},
  pages = {118-137},
  booktitle = {Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  editor = {Pil Joong Lee and Chae Hoon Lim},
  volume = {2587},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-00716-4},
}