|
|
|
|
LEADER |
02596nam a22005055i 4500 |
001 |
978-3-319-08302-5 |
003 |
DE-He213 |
005 |
20151030041255.0 |
007 |
cr nn 008mamaa |
008 |
140625s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319083025
|9 978-3-319-08302-5
|
024 |
7 |
|
|a 10.1007/978-3-319-08302-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Smart Card Research and Advanced Applications
|h [electronic resource] :
|b 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers /
|c edited by Aurélien Francillon, Pankaj Rohatgi.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XII, 271 p. 111 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8419
|
505 |
0 |
|
|a Security technologies -- Attacks on masking -- Side channel attacks -- Software and protocol analysis -- Side channel countermeasures.- Side channel and fault attacks.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Francillon, Aurélien.
|e editor.
|
700 |
1 |
|
|a Rohatgi, Pankaj.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319083018
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8419
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-08302-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|