Smart Card Research and Advanced Applications [electronic resource] : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers / edited by Emmanuel Prouff.
Contributor(s): Prouff, Emmanuel [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 7079Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XI, 337 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642272578.Subject(s): Computer networks | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Software engineering | Data protection | Computer Communication Networks | Cryptology | IT Operations | Algorithms | Software Engineering | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.No physical items for this record
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
There are no comments for this item.