LEADER 03852nam 22008295 450 001 996465999403316 005 20200630235112.0 010 $a3-642-27257-6 024 7 $a10.1007/978-3-642-27257-8 035 $a(CKB)3390000000021952 035 $a(SSID)ssj0000610856 035 $a(PQKBManifestationID)11428405 035 $a(PQKBTitleCode)TC0000610856 035 $a(PQKBWorkID)10644331 035 $a(PQKB)10380945 035 $a(DE-He213)978-3-642-27257-8 035 $a(MiAaPQ)EBC6281788 035 $a(MiAaPQ)EBC5579340 035 $a(Au-PeEL)EBL5579340 035 $a(OCoLC)769465241 035 $a(PPN)157507181 035 $a(EXLCZ)993390000000021952 100 $a20111212d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSmart Card Research and Advanced Applications$b[electronic resource] $e10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers /$fedited by Emmanuel Prouff 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XI, 337 p.) 225 1 $aSecurity and Cryptology ;$v7079 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-27256-8 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security. 410 0$aSecurity and Cryptology ;$v7079 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aSoftware engineering 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aSoftware engineering. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSoftware Engineering. 615 24$aSystems and Data Security. 676 $a006 702 $aProuff$b Emmanuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465999403316 996 $aSmart Card Research and Advanced Applications$92803781 997 $aUNISA