![]() in this publication does notimply, even in the absence of a specific statement, that such names are exempt from the relevant protectivelaws and regulations and therefore free for general use. Violationsare liable to prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9,1965, in its current version, and permission for use must always be obtained from Springer. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting,reproduction on microfilm or in any other way, and storage in data banks. Library of Congress Control Number: 2009940447Ĭ Springer-Verlag Berlin Heidelberg 2010This work is subject to copyright. Christof PaarChair for Embedded SecurityDepartment of Electrical EngineeringĪnd Information SciencesRuhr-Universitat Bochum44780 Jan Pelzlescrypt GmbH Embedded SecurityZentrum fur IT-SicherheitLise-Meitner-Allee 444801 978-0-6 e-ISBN 978-1-3DOI 10.1007/978-1-3Springer Heidelberg Dordrecht London New YorkĪCM Computing Classification (1998): E.3, K.4.4, K.6.5. A Textbook for Students and Practitioners ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |