01160cam0-2200337---450-99000568835040332120091211142338.0000568835FED01000568835(Aleph)000568835FED0100056883519990604e19681893km-y0itay50------baitaITy-------001eaLettere inedite di Joviano Pontano in nome de' reali di Napolipubblicate da Ferdinando GabottoRist. fotomecc.BolognaCommissione per i testi di lingua1968391 p.19 cmScelta di curiosità letterarie inedite o rare dal secolo 13. al 19. in appendice alla Collezione di opere inedite o rare245Ristampa fotomeccanica dell'ed.: Bologna, 1893945.706Pontano,Giovanni Gioviano<1426-1503>194104Gabotto,Ferdinando<1866-1918>ITUNINARICAUNIMARCBK990005688350403321850.8 SCL 97Bibl.43707FLFBCFLFBCLettere inedite di Joviano Pontano546994UNINA02999nam 22006735 450 991048345570332120251226195711.03-319-08302-310.1007/978-3-319-08302-5(CKB)3710000000143881(SSID)ssj0001277812(PQKBManifestationID)11811202(PQKBTitleCode)TC0001277812(PQKBWorkID)11279463(PQKB)10350351(DE-He213)978-3-319-08302-5(MiAaPQ)EBC3093366(PPN)179766465(EXLCZ)99371000000014388120140625d2014 u| 0engurnn|008mamaatxtccrSmart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers /edited by Aurélien Francillon, Pankaj Rohatgi1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XII, 271 p. 111 illus.) Security and Cryptology,2946-1863 ;8419Bibliographic Level Mode of Issuance: Monograph3-319-08301-5 Security technologies -- Attacks on masking -- Side channel attacks -- Software and protocol analysis -- Side channel countermeasures.- Side channel and fault attacks.This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.Security and Cryptology,2946-1863 ;8419CryptographyData encryption (Computer science)Data protectionElectronic data processingManagementCryptologyData and Information SecurityIT OperationsCryptography.Data encryption (Computer science).Data protection.Electronic data processingManagement.Cryptology.Data and Information Security.IT Operations.332.76Francillon Aurélienedthttp://id.loc.gov/vocabulary/relators/edtRohatgi Pankajedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483455703321Smart Card Research and Advanced Applications3004629UNINA