01086nam0-22003491i-450-99000240646020331620090326101247.00-19-504335-9000240646USA01000240646(ALEPH)000240646USA0100024064620050310d1987----0engy01 baengUS||||0||||<<The>> long peaceinquiries into the history of the cold warJohn Lewis GaddisNew York [etc.]Oxford University Presscopyr. 1987IX, 332 p.22 cmStati Uniti d'AmericaRelazioni internazionaliEuropa327.47073GADDIS,John Lewis191880ITsalbcISBD990002406460203316327.47 GAD 1 (ISP IV 1441)46222 L.M.ISP IV 144100089949BKGIUFIORELLA9020050310USA011636MARIASEN9020050831USA011740RSIAV49020090326USA011012Long peace1065362UNISA03726nam 22007575 450 99646551130331620200701022957.03-319-49445-710.1007/978-3-319-49445-6(CKB)3710000000981116(DE-He213)978-3-319-49445-6(MiAaPQ)EBC5596437(PPN)197455131(EXLCZ)99371000000098111620161117d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecurity, Privacy, and Applied Cryptography Engineering[electronic resource] 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings /edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XXIII, 420 p. 139 illus.) Security and Cryptology ;100763-319-49444-9 Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.This book constitutes the refereed proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016, held in Hyderabad, India, in December 2016. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.Security and Cryptology ;10076Data protectionComputer securityData encryption (Computer science)Management information systemsComputer scienceAlgorithmsSoftware engineeringSecurityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Privacyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28010Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Data protection.Computer security.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Software engineering.Security.Privacy.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Software Engineering.005.8Carlet Claudeedthttp://id.loc.gov/vocabulary/relators/edtHasan M. Anwaredthttp://id.loc.gov/vocabulary/relators/edtSaraswat Vishaledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465511303316Security, privacy, and applied cryptography engineering2065794UNISA