000857499 000__ 03517cam\a2200553Ii\4500 000857499 001__ 857499 000857499 005__ 20230306145204.0 000857499 006__ m\\\\\o\\d\\\\\\\\ 000857499 007__ cr\cn\nnnunnun 000857499 008__ 181217s2018\\\\sz\a\\\\o\\\\\100\0\eng\d 000857499 019__ $$a1082295696 000857499 020__ $$a9783030050726$$q(electronic book) 000857499 020__ $$a3030050726$$q(electronic book) 000857499 020__ $$z9783030050719 000857499 0247_ $$a10.1007/978-3-030-05072-6$$2doi 000857499 035__ $$aSP(OCoLC)on1079058500 000857499 035__ $$aSP(OCoLC)1079058500$$z(OCoLC)1082295696 000857499 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU$$dOCLCF 000857499 049__ $$aISEA 000857499 050_4 $$aQA76.9.A25 000857499 08204 $$a005.8/2$$223 000857499 1112_ $$aSPACE (Conference : Applied cryptography engineering)$$n(9th :$$d2018 :$$cKānpur, India) 000857499 24510 $$aSecurity, privacy, and applied cryptography engineering :$$b8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings /$$cAnupam Chattopadhyay, Chester Rebeiro, Yuval Yarom (eds.). 000857499 2463_ $$aSPACE 2018 000857499 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000857499 300__ $$a1 online resource (xxx, 219 pages) :$$billustrations. 000857499 336__ $$atext$$btxt$$2rdacontent 000857499 337__ $$acomputer$$bc$$2rdamedia 000857499 338__ $$aonline resource$$bcr$$2rdacarrier 000857499 347__ $$atext file$$bPDF$$2rda 000857499 4901_ $$aLecture notes in computer science ;$$v11348 000857499 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000857499 500__ $$aInternational conference proceedings. 000857499 5050_ $$aCryptographic Engineering -- Design of Cryptographic Primitive -- Random Number Generators and PUFs -- Cryptographic Hardware Cryptographic Software -- Cryptographic Protocols -- Formal Methods in Cryptographic Engineering -- Evaluation of Cryptosystems -- Attacks and Countermeasures -- Side-channel Analysis and Countermeasures -- Fault Analysis and Countermeasures -- Reverse Engineering and Tampering -- Hardware Trojans and Counterfeit Detection -- Cryptanalysis -- Security and Privacy -- Secure Networking Protocols -- Authentication and Authorization Botnets -- Anonymity Intrusion Detection -- Operating Systems Security -- Trustworthy Computing -- Malware and Malware Detection -- Testing for Secure. 000857499 506__ $$aAccess limited to authorized users. 000857499 520__ $$aThis book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018. The 12 full papers presented together with 5 short paper, were carefully reviewed and selected from 34 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. 000857499 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 17, 2018). 000857499 650_0 $$aData encryption (Computer science)$$vCongresses. 000857499 650_0 $$aComputer security$$vCongresses. 000857499 7001_ $$aChattopadhyay, Anupam,$$eeditor. 000857499 7001_ $$aRebeiro, Chester,$$eeditor. 000857499 7001_ $$aYarom, Yuval,$$eeditor. 000857499 77608 $$iPrint version: $$z9783030050719 000857499 830_0 $$aLecture notes in computer science ;$$v11348. 000857499 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000857499 852__ $$bebk 000857499 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-05072-6$$zOnline Access$$91397441.1 000857499 909CO $$ooai:library.usi.edu:857499$$pGLOBAL_SET 000857499 980__ $$aEBOOK 000857499 980__ $$aBIB 000857499 982__ $$aEbook 000857499 983__ $$aOnline 000857499 994__ $$a92$$bISE