Smart card research and advanced applications [electronic resource] : 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised selected papers / Marc Joye, Amir Moradi (eds.).
2015
TK7895.S62 C37 2015eb
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Smart card research and advanced applications [electronic resource] : 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised selected papers / Marc Joye, Amir Moradi (eds.).
Meeting Name
ISBN
9783319167633 electronic book
3319167634 electronic book
9783319167626
3319167634 electronic book
9783319167626
Published
Cham : Springer, 2015.
Language
English
Description
1 online resource (x, 261 pages) : illustrations.
Item Number
10.1007/978-3-319-16763-3 doi
Call Number
TK7895.S62 C37 2015eb
Dewey Decimal Classification
006.2/46
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on Java cards; software countermeasures; side-channel analysis; embedded implementations; public-key cryptography; and leakage and fault attacks.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 30, 2015).
Added Author
Series
Lecture notes in computer science ; 8968.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783319167626
Linked Resources
Record Appears in
Table of Contents
Java cards
Software countermeasures
Side-channel analysis
Embedded implementations
Public-key cryptography
Leakage and fault attacks.
Software countermeasures
Side-channel analysis
Embedded implementations
Public-key cryptography
Leakage and fault attacks.