| 000 | 03650nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-12510-2 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084535.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100411s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642125102 _9978-3-642-12510-2 |
||
| 024 | 7 |
_a10.1007/978-3-642-12510-2 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aGollmann, Dieter. _eeditor. |
|
| 245 | 1 | 0 |
_aSmart Card Research and Advanced Application _h[electronic resource] : _b9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings / _cedited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aX, 239p. 78 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6035 |
|
| 505 | 0 | _aMathematical Algorithms -- The Polynomial Composition Problem inĀ (?/n?)[X] -- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension -- Secure Delegation of Elliptic-Curve Pairing -- Side Channel Analysis -- Side-Channel Leakage across Borders -- Designing a Side Channel Resistant Random Number Generator -- Simple Power Analysis on Exponentiation Revisited -- Atomicity Improvement for Elliptic Curve Scalar Multiplication -- Systems -- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale -- Firewall Mechanism in a User Centric Smart Card Ownership Model -- Logical Attacks -- Combined Attacks and Countermeasures -- Attacks on Java Card 3.0 Combining Fault and Logical Attacks -- Fault Analysis -- Improved Fault Analysis of Signature Schemes -- When Clocks Fail: On Critical Paths and Clock Faults -- Privacy -- Modeling Privacy for Off-Line RFID Systems -- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings -- On the Design and Implementation of an Efficient DAA Scheme. | |
| 520 | _aThis book constitutes the refereed proceedings of the 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Application, CARDIS 2010, held in Passau, Germany, in April 2010. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on mathematical algorithms; side channel analysis; systems; logical attacks; fault analysis; and privacy. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 700 | 1 |
_aLanet, Jean-Louis. _eeditor. |
|
| 700 | 1 |
_aIguchi-Cartigny, Julien. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642125096 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6035 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-12510-2 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112090 _d112090 |
||