[1] Stuber, G. (1996) The Electronic Purse: An Overview of Recent Developments and Policy Issues. Bank of Canada.
[2] Myers, G.J., Sandler, C. and Badgett, T. (2011) The Art of Software Testing. John Wiley & Sons, Hoboken.
[3] Sommerville, I. (2000) Software Engineering. Addison-Wesley, Harlow.
[4] Srivastava, P.R. and Kim, T.H. (2009) Application of Genetic Algorithm in Software Testing. International Journal of Software Engineering and Its Applications, 3, 87-96.
[5] Pargas, R.P., Harrold, M.J. and Peck, R.R. (1999) Test-Data Generation Using Genetic Algorithms. Software Testing Verification and Reliability, 9, 263-282.
http://dx.doi.org/10.1002/(SICI)1099-1689(199912)9:4<263::AID-STVR190>3.0.CO;2-Y
[6] McCart, J., Berndt, D. and Watkins, A. (2007) Using Genetic Algorithms for Software Testing: Performance Improvement Techniques. Proceedings Americas Conference on Information Systems (AMCIS), Colorado, 2007, 222.
[7] Coglio, A. (2003) Code Generation for High-Assurance Java Card applets. Proceedings of 3rd NSA Conference on High Confidence Software and Systems, Gold Coast, April 2003, 85-93.
[8] Tuteja, M. and Dubey, G. (2012) A Research Study on Importance of Testing and Quality Assurance in Software Development Life Cycle (SDLC) Models. International Journal of Soft Computing, 2, 251
[9] Giorgio, Z. (2015) Understanding Java Card 2.0.
http://www.javaworld.com/article/2076617/embedded-java/understanding-java-card-2-0.html
[10] Mitchell, M. (1996) An Introduction to Genetic Algorithms. MIT Press, Cambridge.
[11] Hermawanto, D. (2013) Genetic Algorithm for Solving Simple Mathematical Equality Problem. Cornell University Library, Computer Science, Neural and Evolutionary Computing, Indonesia, 1-10.
[12] Xie, H. and Zhang, M. (2009) Sampling Issues of Tournament Selection in Genetic Programming. School of Engineering and Computer Science, Victoria University of Wellington, Wellington.
[13] Spears, W.M. and Anand, V. (1991) A Study of Crossover Operators in Genetic Programming. Springer, Berlin Heidelberg, 409-418.
http://dx.doi.org/10.1007/3-540-54563-8_104
[14] DeJong, K.A. (1975) Analysis of the Behavior of a Class of Genetic Adaptive Systems. Department of Computer and Communication Sciences, University of Michigan, Ann Arbor.
[15] El Farissi, I., Azizi, M., Lanet, J.L. and Moussaoui, M. (2013) Neural Network vs. Bayesian Network to Detect Java Card Mutants. Agriculture and Agricultural Science Procedia, 4, 132-137.
http://dx.doi.org/10.1016/j.aasri.2013.10.021
[16] Kindermann, R. (2009) Testing a Java Card Applet Using the LIME Interface Test Bench: A Case Study.? Technical Report TKK-ICS-R18, Helsinki University of Technology, Department of Information and Computer Science, Espoo.
[17] Mostowski, W. and Poll, E. (2010) Electronic Passports in a Nutshell. Technical Report ICIS-R10004, Radboud University, Nijmegen.
https://pms.cs.ru.nl/iris-diglib/src/getContent.php
[18] Vandewalle, J.J. and Vetillard, E. (1998) Developing Smart Card Based Applications Using Java Card. Proceedings of the Third Smartcard Research and Advanced Application Conference, Louvain-la-Neuve, 14-16 September 1998, 105-124.
[19] Bouquet, F., Legeard, B., Peureux, F. and Torreborre, E. (2005) Mastering Test Generation from Smart Card Software Formal Models. In: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, Springer, Berlin Heidelberg, 70-85.
http://dx.doi.org/10.1007/978-3-540-30569-9_4
[20] Martin, H. and du Bousquet, L. (2001) Automatic Test Generation for Java Card Applets. In: Java on Smart Cards: Programming and Security, Springer, Berlin Heidelberg, 121-136.
http://dx.doi.org/10.1007/3-540-45165-X_10
[21] VanWeelden, A., Oostdijk, M., Frantzen, L., Koopman, P. and Tretmans, J. (2005) On-the-Fly Formal Testing of a Smart Card Applet. In: Security and Privacy in the Age of Ubiquitous Computing, Springer, New York, 565-576.
http://dx.doi.org/10.1007/0-387-25660-1_37
[22] Philipps, J., Pretschner, A., Slotosch, O., Aiglstorfer, E., Kriebel, S. and Scholl, K. (2003) Model-Based Test Case Generation for Smart Cards. Electronic Notes in Theoretical Computer Science, 80, 170-184.
http://dx.doi.org/10.1016/S1571-0661(04)80817-X
[23] Berndt, D.J. and Watkins, A. (2005) High Volume Software Testing Using Genetic Algorithms. Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Big Island, 3-6 January 2005, 318b.
http://dx.doi.org/10.1109/hicss.2005.296
[24] Korel, B. (1990) Automated Software Test Data Generation. IEEE Transactions on Software Engineering, 16, 870-879.
http://dx.doi.org/10.1109/32.57624
[25] Boneh, D. (1999) Twenty Years of Attacks on the RSA Cryptosystem. Notices of the AMS, 46, 203-213.
[26] Willis, N. (2014) Smart Card Features on the YubiKey NEO.
https://lwn.net/Articles/618888/
[27] Al-Khouri, A.M. (2012) PKI in Government Digital Identity Management Systems. European Journal of ePractice, 4, 4-21.