KEYWORDS: Java, Computer security, Information security, Clocks, Defense and security, Data backup, Electronics engineering, Analytical research, Roads, Standards development
In this paper, we analyze the impact of fault attacks on the operand stack, provide experiments of attacks based on the operand stack, and describe two approaches to protect the operand stack, and finally quantize the impact of these countermeasures on the performance of virtual machine.
This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.