1 option
Smart Card Research and Advanced Applications : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 6035.
- Security and Cryptology ; 6035
- Language:
- English
- Subjects (All):
- Computer networks.
- User interfaces (Computer systems).
- Computers and civilization.
- Data encryption (Computer science).
- Management information systems.
- Computer science.
- Algorithms.
- Computer Communication Networks.
- User Interfaces and Human Computer Interaction.
- Computers and Society.
- Cryptology.
- Management of Computing and Information Systems.
- Algorithm Analysis and Problem Complexity.
- Local Subjects:
- Computer Communication Networks.
- User Interfaces and Human Computer Interaction.
- Computers and Society.
- Cryptology.
- Management of Computing and Information Systems.
- Algorithm Analysis and Problem Complexity.
- Physical Description:
- 1 online resource (X, 239 pages) : 78 illustrations.
- Edition:
- First edition 2010.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
- System Details:
- text file PDF
- Contents:
- Mathematical Algorithms
- The Polynomial Composition Problem in (?/n?)[X]
- Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension
- Secure Delegation of Elliptic-Curve Pairing
- Side Channel Analysis
- Side-Channel Leakage across Borders
- Designing a Side Channel Resistant Random Number Generator
- Simple Power Analysis on Exponentiation Revisited
- Atomicity Improvement for Elliptic Curve Scalar Multiplication
- Systems
- Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale
- Firewall Mechanism in a User Centric Smart Card Ownership Model
- Logical Attacks
- Combined Attacks and Countermeasures
- Attacks on Java Card 3.0 Combining Fault and Logical Attacks
- Fault Analysis
- Improved Fault Analysis of Signature Schemes
- When Clocks Fail: On Critical Paths and Clock Faults
- Privacy
- Modeling Privacy for Off-Line RFID Systems
- Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings
- On the Design and Implementation of an Efficient DAA Scheme.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-642-12510-2
- 9783642125102
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.