Fig 3 - uploaded by Hafid Mammass
Content may be subject to copyright.
JavaCard Virtual Machine  

JavaCard Virtual Machine  

Source publication
Conference Paper
Full-text available
We treat this paper a secure method of image watermarking using smart card and cryptography in the stages of watermarking and detection. The tool of watermarking initializes a session by sending to the card a challenge and the card generates an 1024 bit RSA (Ron Rivest, Adi Shamir, Leonard Adleman) signature using its private key and send it to the...

Context in source publication

Context 1
... Java Card is compiled and interpreted language because the first step generates a byte code which is compatible with all platforms and this step is realized off-card by the converter which generates a CAP file and an export file and the second step is executed by the interpreter which load and execute the CAP file on the card (see Fig. 3). ...

Similar publications

Article
Full-text available
Since large amount of data has debouched in the coming years, Data security has become the most important aspect of information sharing. We put more private data in the cloud ever since cloud came into the technology life. Practically, the quantity of data to be transferred is not the concern. The important factor is the Channel, through which the...
Article
Full-text available
In the world of billions of people the internet plays major role for providing the communication between them, and to make the connection and communication stronger and more secure we need cryptography and its algorithm. In this article we have described the brief review of the block cipher algorithms like Advanced Encryption System, Data Encryptio...
Article
Full-text available
Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This resea...
Article
Full-text available
Cryptography is concerned with keeping communications private. Today’s cryptography is more than secret writing. The purpose of this paper is the implementation of three encryption algorithms and a comparison between them based on CPU execution time, System time and User time. In bibliography, there are three encryption algorithms RSA, DES and BLOW...
Article
Full-text available
ElGamal as an asymmetric key cryptography system and Data Encryption Standard (DES) as a symmetric key cryptography system, both of algorithms will be compared using the time complexity analysis and computer simulation. The result of time analysis shows a different complexity for both algorithms, there is quadratic complexity for ElGamal Algorithm...

Citations

... On another hand, Open JavaCard Cards technology offer the possibility to manage electronic purse and secure electronic transactions. We developed also software to personalize the contact smart card and to use an electronic purse managed by the card in order to pay small transaction amount and to achieve online and offline transactions [5, 6]. In this paper, we develop a solution for multiservice infrastructure based on an S-OrBAC model and contactless cards. ...