000726257 000__ 02670cam\a2200505Ii\4500 000726257 001__ 726257 000726257 005__ 20230306140721.0 000726257 006__ m\\\\\o\\d\\\\\\\\ 000726257 007__ cr\cn\nnnunnun 000726257 008__ 150330s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000726257 020__ $$a9783319167633$$qelectronic book 000726257 020__ $$a3319167634$$qelectronic book 000726257 020__ $$z9783319167626 000726257 0247_ $$a10.1007/978-3-319-16763-3$$2doi 000726257 035__ $$aSP(OCoLC)ocn905852326 000726257 035__ $$aSP(OCoLC)905852326 000726257 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dBTCTA$$dUPM$$dCOO$$dYDXCP$$dOCLCF$$dOCLCO$$dVLB 000726257 049__ $$aISEA 000726257 050_4 $$aTK7895.S62$$bC37 2015eb 000726257 08204 $$a006.2/46$$223 000726257 1112_ $$aCARDIS (Conference)$$n(13th :$$d2014 :$$cParis, France) 000726257 24510 $$aSmart card research and advanced applications$$h[electronic resource] :$$b13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised selected papers /$$cMarc Joye, Amir Moradi (eds.). 000726257 2463_ $$aCARDIS 2014 000726257 264_1 $$aCham :$$bSpringer,$$c2015. 000726257 300__ $$a1 online resource (x, 261 pages) :$$billustrations. 000726257 336__ $$atext$$btxt$$2rdacontent 000726257 337__ $$acomputer$$bc$$2rdamedia 000726257 338__ $$aonline resource$$bcr$$2rdacarrier 000726257 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8968 000726257 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000726257 500__ $$aIncludes author index. 000726257 5050_ $$aJava cards -- Software countermeasures -- Side-channel analysis -- Embedded implementations -- Public-key cryptography -- Leakage and fault attacks. 000726257 506__ $$aAccess limited to authorized users. 000726257 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography; and leakage and fault attacks. 000726257 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 30, 2015). 000726257 650_0 $$aSmart cards$$vCongresses. 000726257 7001_ $$aJoye, Marc,$$d1969-$$eeditor. 000726257 7001_ $$aMoradi, Amir,$$eeditor. 000726257 77608 $$iPrint version:$$z9783319167626 000726257 830_0 $$aLecture notes in computer science ;$$v8968. 000726257 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000726257 852__ $$bebk 000726257 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-16763-3$$zOnline Access$$91397441.1 000726257 909CO $$ooai:library.usi.edu:726257$$pGLOBAL_SET 000726257 980__ $$aEBOOK 000726257 980__ $$aBIB 000726257 982__ $$aEbook 000726257 983__ $$aOnline 000726257 994__ $$a92$$bISE