LEADER 03343nam 22007215 450 001 9910481963703321 005 20211006005919.0 010 $a3-642-41224-6 024 7 $a10.1007/978-3-642-41224-0 035 $a(CKB)3710000000019191 035 $a(SSID)ssj0001010897 035 $a(PQKBManifestationID)11551952 035 $a(PQKBTitleCode)TC0001010897 035 $a(PQKBWorkID)11003380 035 $a(PQKB)10385998 035 $a(DE-He213)978-3-642-41224-0 035 $a(MiAaPQ)EBC3093098 035 $a(PPN)172430585 035 $a(EXLCZ)993710000000019191 100 $a20130910d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity, Privacy, and Applied Cryptography Engineering $eThird International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings /$fedited by Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 191 p. 35 illus.) 225 1 $aSecurity and Cryptology ;$v8204 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-41223-8 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures. 410 0$aSecurity and Cryptology ;$v8204 606 $aComputer security 606 $aComputer networks 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aComputer networks. 615 0$aData encryption (Computer science) 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aGierlichs$b Benedikt$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGuilley$b Sylvain$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMukhopadhyay$b Debdeep$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910481963703321 996 $aSecurity, privacy, and applied cryptography engineering$92065794 997 $aUNINA