00912nam0-22002891i-450-99000744657040332188-13-20088-9000744657FED01000744657(Aleph)000744657FED0100074465720030611d1997----km-y0itay50------baitaITy-------101yy<<Il >>metodo nella scienza del diritto costituzionaleseminario di studio, Messina, 23 febbraio 1996PadovaCedam1997VI,179 p.24 cmin testa al front.: Associazione Italiana dei Costituzionalisti. Università degli studi di Messina.342.0120itaITUNINARICAUNIMARCBK990007446570403321XI ERM AA.VV.4DFDDFDMetodo nella scienza del diritto costituzionale678909UNINA03630nam 22005415 450 99646644140331620200702232707.03-030-15462-910.1007/978-3-030-15462-2(CKB)4100000007761911(DE-He213)978-3-030-15462-2(MiAaPQ)EBC5925645(PPN)235231894(EXLCZ)99410000000776191120190306d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSmart Card Research and Advanced Applications[electronic resource] 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected Papers /edited by Begül Bilgin, Jean-Bernard Fischer1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (X, 201 p. 135 illus., 59 illus. in color.) Security and Cryptology ;113893-030-15461-0 Includes bibliographical references and index.Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch’s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things — A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls.This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.Security and Cryptology ;11389Data encryption (Computer science)Computer securityCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data encryption (Computer science).Computer security.Cryptology.Systems and Data Security.006.246Bilgin Begüledthttp://id.loc.gov/vocabulary/relators/edtFischer Jean-Bernardedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466441403316Smart Card Research and Advanced Applications773154UNISA02493nam 2200625 a 450 991079033970332120230217163225.01-280-78452-097866136949111-118-22612-7(CKB)2670000000209066(EBL)818113(OCoLC)797919081(SSID)ssj0000687303(PQKBManifestationID)11363014(PQKBTitleCode)TC0000687303(PQKBWorkID)10755635(PQKB)10878305(Au-PeEL)EBL818113(CaPaEBR)ebr10575466(CaONFJC)MIL369491(OCoLC)817742432(CaSebORM)9781118239483(MiAaPQ)EBC818113(EXLCZ)99267000000020906620120418d2012 uy 0engur|n|---|||||txtccrBeginning XML[electronic resource] /Joe Fawcett, Liam R.E. Quin, Danny Ayers5th ed.Indianapolis, Ind. John Wiley & Sons20121 online resource (868 p.)Wrox beginning guides Beginning XMLIncludes index.1-118-23948-2 1-118-16213-7 pt. 1. Introducing XML -- pt. 2. Validation -- pt. 3. Processing -- pt. 4. Databases -- pt. 5. Programming -- pt. 6. Communication -- pt. 7. Display -- pt. 8. Case study.A complete update covering the many advances to the XML language The XML language has become the standard for writing documents on the Internet and is constantly improving and evolving. This new edition covers all the many new XML-based technologies that have appeared since the previous edition four years ago, providing you with an up-to-date introductory guide and reference. Packed with real-world code examples, best practices, and in-depth coverage of the most important and relevant topics, this authoritative resource explores both the advantages and disadvantages of XML and addressXML (Document markup language)XML (Document markup language)006.7/4006.74Fawcett Joe1479394Quin Liam R. E1479395Ayers Danny1479396MiAaPQMiAaPQMiAaPQBOOK9910790339703321Beginning XML3695482UNINA