Smart Card Research and Advanced Applications [electronic resource] : 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers / edited by Emmanuel Prouff.
By: Prouff, Emmanuel [editor.].
Contributor(s): SpringerLink (Online service).
Material type:
BookSeries: Lecture Notes in Computer Science: 7079Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XI, 337 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642272578.Subject(s): Computer science | Computer Communication Networks | Software engineering | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Software Engineering | Systems and Data SecurityDDC classification: 004.6 Online resources: Click here to access online
In:
Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
There are no comments for this item.