LEADER 02633nam 2200421 n 450 001 996390757303316 005 20200824121734.0 035 $a(CKB)4940000000106810 035 $a(EEBO)2240877894 035 $a(UnM)99860538e 035 $a(UnM)99860538 035 $a(EXLCZ)994940000000106810 100 $a19860123d1643 uh | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aMilitary orders, and articles, established by His Maiestie, for the better ordering and government of his Maiesties armie$b[electronic resource] $eWith the oath which every souldier is to take. Also two proclamations, one against plundering and robbing. The other against selling or buying of armes and and [sic] horse. With instructions for musters and armes, and the use thereof. All which our said lawes, ordinances, and instructions, we straitly command to be read plainly and distinctly, by the Captaine, or other chiefe officer, to his owne company, at least once a week. And that the oath be administred in the respective quarters by the provost-mar-marshall [sic] Generall, assisted by the severall officers of each regiment: in the horse-quarters by sound of trumpet; and amongst the foot by beat of drum 210 $a[Oxford] $cRe-printed by His Maiesties command at Oxford, by Leonard Lichfield, printer to the Vniversity.$d[1643] 215 $a[24] p. $cill 300 $aIncludes: "By the King. A proclamation for the better government of His Majesties Army", a reprint of Steele 2309, issued November 25, 1642; and "By the King. A proclamation prohibiting all persons whatsoever, from buying or recieving horse or armes of any kind from any souldiers of His Majesties army", a reprint of Steel 2344, issued January 5, 1643. 300 $aPublication date from Wing. 300 $aSignatures: A-C?. 300 $aFrontis. = ill. 300 $aVariant: first leaf blank, no frontis. 300 $aAnnotation on Thomason copy: "Feb: 23. 1642". 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 607 $aGreat Britain$xHistory$yCivil War, 1642-1649$vSources 701 $aCharles$cKing of England,$f1600-1649.$0793295 712 02$aEngland and Wales.$bSovereign (1625-1649 : Charles I). 712 02$aEngland and Wales.$bSovereign (1625-1649 : Charles I). 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996390757303316 996 $aMilitary orders and articles established by His Maiestie for the better ordering and government of His Maiesties armie$92337993 997 $aUNISA LEADER 03565nam 22005775 450 001 9910337572803321 005 20251225193715.0 010 $a3-030-15462-9 024 7 $a10.1007/978-3-030-15462-2 035 $a(CKB)4100000007761911 035 $a(DE-He213)978-3-030-15462-2 035 $a(MiAaPQ)EBC5925645 035 $a(PPN)235231894 035 $a(EXLCZ)994100000007761911 100 $a20190306d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSmart Card Research and Advanced Applications $e17th International Conference, CARDIS 2018, Montpellier, France, November 12?14, 2018, Revised Selected Papers /$fedited by Begül Bilgin, Jean-Bernard Fischer 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (X, 201 p. 135 illus., 59 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11389 311 08$a3-030-15461-0 320 $aIncludes bibliographical references and index. 327 $aConvolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations -- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES -- Improving Side-channel Analysis through Semi-supervised Learning -- Non-profiled Mask Recovery: the impact of Independent Component Analysis -- How (not) to Use Welch?s T-test in Side-Channel Security Evaluations -- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys -- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M -- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication -- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs -- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering -- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P -- Breaking all the Things ? A Systematic Survey of Firmware Extraction Techniques for IoT Devices -- Exploiting JCVM on smart cards using forged references in the API calls. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Smart Card Research and Advanced Applications, CARDIS 2018, held in Monpellier, France, in November 2018. The 13 revised full papers presented in this book were carefully reviewed and selected from 28 submissions. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11389 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aCryptology 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 14$aCryptology. 615 24$aData and Information Security. 676 $a006.246 676 $a006.246 702 $aBilgin$b Begül$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFischer$b Jean-Bernard$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337572803321 996 $aSmart Card Research and Advanced Applications$93004629 997 $aUNINA