000915403 000__ 01611cam\a22004217i\4500 000915403 001__ 915403 000915403 005__ 20210515184510.0 000915403 006__ m\\\\\o\\d\\\\\\\\ 000915403 007__ cr\un\nnnunnun 000915403 008__ 191124s2020\\\\flu\\\\\o\\\\\000\0\eng\d 000915403 020__ $$a9781000698350 $$q(electronic book) 000915403 020__ $$a1000698351 $$q(electronic book) 000915403 020__ $$z0367354403 000915403 020__ $$z9780367354404 000915403 035__ $$a(NhCcYBP)EBC5847326 000915403 040__ $$aNhCcYBP$$cNhCcYBP 000915403 050_4 $$aTK7895.S62$$bG87 2020 000915403 08204 $$a006.2/46$$223 000915403 1001_ $$aGupta, B. B.,$$d1982-$$eauthor. 000915403 24510 $$aSmart card security :$$bapplications, attacks, and countermeasures /$$cB.B. Gupta, Megha Quamara. 000915403 264_1 $$aBoca Raton, FL :$$bCRC Press, Taylor & Francis Group,$$c[2020] 000915403 300__ $$a1 online resource (xix, 118 pages.) 000915403 336__ $$atext$$btxt$$2rdacontent 000915403 337__ $$acomputer$$bc$$2rdamedia 000915403 338__ $$aonline resource$$bcr$$2rdacarrier 000915403 4901_ $$aCRC focus series 000915403 4900_ $$aSecurity, privacy, and trust in mobile communications 000915403 506__ $$aAccess limited to authorized users 000915403 533__ $$aElectronic reproduction.$$bAnn Arbor, MI$$nAvailable via World Wide Web. 000915403 588__ $$aDescription based on print version record. 000915403 650_0 $$aSmart cards$$xSecurity measures. 000915403 7001_ $$aQuamara, Megha,$$eauthor. 000915403 7102_ $$aProQuest (Firm) 000915403 77608 $$iPrint version: $$z0367354403$$z9780367354404 000915403 830_0 $$aCRC focus series. 000915403 852__ $$bebk 000915403 85640 $$3GOBI DDA$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=5847326$$zOnline Access 000915403 909CO $$ooai:library.usi.edu:915403$$pGLOBAL_SET 000915403 980__ $$aEBOOK 000915403 980__ $$aBIB 000915403 982__ $$aEbook 000915403 983__ $$aOnline