[1]
Qin Baoan. Dynamic multi-application card research and implementation of the operation system [D]. WuHan: Middle china university of technology and science. (2005).
Google Scholar
[2]
Sun Microsystems, Inc. Runtime Environment Specification Java Card™ Platform, Version 2. 2. 1[S]. October, (2003).
Google Scholar
[3]
Yoon-Sim Yang, Won-Ho Choi. An advanced Java Card System Architecture for Smart Card Based on Large RAM Memory[C]. International conference on hybrid information technology. (2006).
DOI: 10.1109/ichit.2006.253676
Google Scholar
[4]
Min-Sik Jin, Min-Soo Jung. A study on fast JCVM by moving object from EEPROM to RAM[C]. Proceeding of the 11th IEEE international conference on Embedded and real-Time Computing Systems and Applications. (2005).
DOI: 10.1109/rtcsa.2005.16
Google Scholar
[5]
Se-Won Oh, Seung-Joon Seok. An improvement for Applets download speed using transaction buffers based on RAM memory of Java Card system using IC chip[J]. IEICE Electronics Express. Vol 8, NO. 10, 705-709. (2011).
DOI: 10.1587/elex.8.705
Google Scholar
[6]
Michal Spivak, Sivan Toledo. Storing a persistent transactional heap on flash memory[J]. Sigplan Notices-SIGPLAN, Vol. 41, NO. 7, 22-33. (2006).
DOI: 10.1145/1159974.1134655
Google Scholar
[7]
Wu Jianjun, Guo Jianpin. A cache based method for the JCVM optimization [J]. computer engineering and science. 2010. vol. 32, No. 3: 141-143.
Google Scholar
[8]
Han Jing. Research and practice of Java byte code optimize method [D]. WuHan: Middle china university of technology and science. (2008).
Google Scholar
[9]
Ahmadou Al Khary Séré, Julien Iguchi- Cartigny. Checking the Paths to identify mutant application on embedded systems [C]. T. -h. Kim et al. (Eds. ): FGIT 2010, LNCS Vol. 6485 Springer: 459-468.
DOI: 10.1007/978-3-642-17569-5_45
Google Scholar
[10]
Eric Vetillard, Anthony Ferrari. Combined attacks and countermeasures [C]. IFIP 2010. D. Gollmann, J. -L. Lguchi-Cartigny (Eds. ): CARDIS 2010, LNCS 6035: 133-147.
Google Scholar