Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pierre Girard is active.

Publication


Featured researches published by Pierre Girard.


Journal of Computer Security | 2002

Checking secure interactions of smart card applets: extended version

Pierre Bieber; Jacques Cazin; Pierre Girard; Jean-Louis Lanet; Virginie Wiels; Guy Zanon

This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a technique based on model checking to verify that actual information flows between applets are authorized. We illustrate our approach on applets involved in an electronic purse running on Java enabled smart cards.


Electronic Notes in Theoretical Computer Science | 2000

Electronic Purse Applet Certification: extended abstract

Pierre Bieber; Jacques Cazin; Virginie Wiels; Guy Zanon; Pierre Girard; Jean-Louis Lanet

Abstract The paper describes the status of a joint project between Gemplus and ONERA. Gemplus developed an electronic purse running on Java enabled smart cards. The project goal is to verify security properties that should be enforced by the applets involved in this application. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a technique based on model checking to verify that actual information flows between applets are authorized.


conference on risks and security of internet and systems | 2010

A new payment protocol over the Internet

Pierre Girard; Karine Villegas; Jean-Louis Lanet; Aude Plateaux

We propose in this paper to reuse the existing payment infrastructure to introduce a proof of transaction genuineness computed by a smart card chip. The idea is to divide the amount of the transaction into several sub-amounts, which added together give the total amount. The sub-amounts are function of a secret shared with the bank, which can verify that the split is correct, thus proving that the transaction is authentic. We provide here a description of the algorithm and its implementation in a .NET card.


european symposium on research in computer security | 2000

Checking Secure Interactions of Smart Card Applets

Pierre Bieber; Jacques Cazin; Pierre Girard; Jean Louis Lanet; Virginie Wiels; Guy Zanon

This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a technique based on model checking to verify that actual information flows between applets are authorized. We illustrate our approach on applets involved in an electronic purse running on Java enabled smart cards.


Archive | 2011

UICCs embedded in terminals or removable therefrom

Lionel Merrien; Xavier Berard; Pierre Girard; Philippe Proust; Fabrice Vergnes; Frédéric Faria; Franck Imoucha


Archive | 2010

Methods and system for handling UICC data

Lionel Merrien; Xavier Berard; Denis Gachon; Pierre Girard; Philippe Proust; Fabrice Vergnes; Frédéric Faria; Franck Imoucha; Paul Bradley; Nicolas Mathian; Nicolas Roussel


Archive | 2000

Method for monitoring program flow to verify execution of proper instructions by a processor

David Naccache; Ludovic Rousseau; Pierre Girard


Archive | 2000

Method for monitoring a programme flow

Pierre Girard; David Naccache; Ludovic Rousseau


IACR Cryptology ePrint Archive | 2007

Mobile Terminal Security

Olivier Benoit; Nora Dabbous; Laurent Gauteron; Pierre Girard; Helena Handschuh; David Naccache; Stéphane Socié; Claire Whelan


Archive | 2011

SYSTEM FOR MANAGING MULTIPLE SUBSCRIPTIONS IN A UICC

Philippe Proust; Pierre Girard

Collaboration


Dive into the Pierre Girard's collaboration.

Researchain Logo
Decentralizing Knowledge