Mostafa Imam

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
By the release of Java Card 3.0 Connected version and the rapid evolution of ubiquitous computing, many embedded software applications have been proposed recently to exploit the benefits of the new technology. These recent research and software development activities make it inevitable to defend the new applications in the open untrusted environments(More)
  • 1