000754556 000__ 02733cam\a2200565Mi\4500 000754556 001__ 754556 000754556 005__ 20230306141714.0 000754556 006__ m\\\\\o\\d\\\\\\\\ 000754556 007__ cr\nn\nnnunnun 000754556 008__ 160330s2016\\\\sz\a\\\\o\\\\\100\0\eng\d 000754556 020__ $$a9783319312712$$q(electronic book) 000754556 020__ $$a3319312715$$q(electronic book) 000754556 020__ $$z9783319312705 000754556 0247_ $$a10.1007/978-3-319-31271-2$$2doi 000754556 035__ $$aSP(OCoLC)ocn945948371 000754556 035__ $$aSP(OCoLC)945948371 000754556 040__ $$aAZU$$beng$$cAZU$$dYDXCP$$dOCLCO$$dGW5XE$$dOCLCF$$dOCLCO 000754556 049__ $$aISEA 000754556 050_4 $$aTK7895.S62 000754556 050_4 $$aQA76.9.A25 000754556 08204 $$a006.2/46$$223 000754556 1112_ $$aCARDIS (Conference)$$n(14th :$$d2015 :$$cBochum, Germany) 000754556 24510 $$aSmart card research and advanced applications$$h[electronic resource] :$$b14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers /$$cedited by Naofumi Homma, Marcel Medwed. 000754556 2463_ $$aCARDIS 2015 000754556 264_1 $$aCham :$$bSpringer,$$c2016. 000754556 300__ $$a1 online resource (xii, 287 pages) :$$billustrations. 000754556 336__ $$atext$$btxt$$2rdacontent 000754556 337__ $$acomputer$$bc$$2rdamedia 000754556 338__ $$aonline resource$$bcr$$2rdacarrier 000754556 347__ $$atext file$$bPDF$$2rda 000754556 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9514 000754556 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000754556 5050_ $$aSide-Channel Attacks -- Java Cards -- Evaluation Tools -- Fault Attacks -- Countermeasures -- Implementations. 000754556 506__ $$aAccess limited to authorized users. 000754556 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Smart Card Research and Advanced Applications, CARDIS 2015, held in Bochum, Germany, in November] 2015. The 17 revised full papers presented in this book were carefully reviewed and selected from 40 submissions. The focus of the conference was on all aspects of the design, development, deployment, validation, and application of smart cards and secure elements in secure platforms or systems. 000754556 650_0 $$aSmart cards$$vCongresses. 000754556 650_0 $$aComputer science. 000754556 650_0 $$aComputer security. 000754556 650_0 $$aData encryption (Computer science) 000754556 650_0 $$aAlgorithms. 000754556 650_0 $$aManagement information systems. 000754556 7001_ $$aHomma, Naofumi,$$eeditor. 000754556 7001_ $$aMedwed, Marcel,$$eeditor. 000754556 77608 $$iPrint version:$$z9783319312705 000754556 830_0 $$aLecture notes in computer science ;$$v9514. 000754556 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000754556 852__ $$bebk 000754556 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-31271-2$$zOnline Access$$91397441.1 000754556 909CO $$ooai:library.usi.edu:754556$$pGLOBAL_SET 000754556 980__ $$aEBOOK 000754556 980__ $$aBIB 000754556 982__ $$aEbook 000754556 983__ $$aOnline 000754556 994__ $$a92$$bISE