My Account Log in

1 option

Smart Card Research and Advanced Applications : 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings / edited by Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Gollmann, Dieter, editor.
Lanet, Jean-Louis, editor.
Iguchi-Cartigny, Julien, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 6035.
Security and Cryptology ; 6035
Language:
English
Subjects (All):
Computer networks.
User interfaces (Computer systems).
Computers and civilization.
Data encryption (Computer science).
Management information systems.
Computer science.
Algorithms.
Computer Communication Networks.
User Interfaces and Human Computer Interaction.
Computers and Society.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Local Subjects:
Computer Communication Networks.
User Interfaces and Human Computer Interaction.
Computers and Society.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Physical Description:
1 online resource (X, 239 pages) : 78 illustrations.
Edition:
First edition 2010.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
System Details:
text file PDF
Contents:
Mathematical Algorithms
The Polynomial Composition Problem in (?/n?)[X]
Enhance Multi-bit Spectral Analysis on Hiding in Temporal Dimension
Secure Delegation of Elliptic-Curve Pairing
Side Channel Analysis
Side-Channel Leakage across Borders
Designing a Side Channel Resistant Random Number Generator
Simple Power Analysis on Exponentiation Revisited
Atomicity Improvement for Elliptic Curve Scalar Multiplication
Systems
Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale
Firewall Mechanism in a User Centric Smart Card Ownership Model
Logical Attacks
Combined Attacks and Countermeasures
Attacks on Java Card 3.0 Combining Fault and Logical Attacks
Fault Analysis
Improved Fault Analysis of Signature Schemes
When Clocks Fail: On Critical Paths and Clock Faults
Privacy
Modeling Privacy for Off-Line RFID Systems
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings
On the Design and Implementation of an Efficient DAA Scheme.
Other Format:
Printed edition:
ISBN:
978-3-642-12510-2
9783642125102
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account