Limit search to available items
Book Cover
E-book
Author International Conference on Applied Cryptography in Computer and Communications (2nd : 2022 : Online)

Title Applied cryptography in computer and communications : Second EAI International Conference, AC3 2022, virtual event, May 14-15, 2022, proceedings / Jingqiang Lin, Qiang Tang (eds.)
Published Cham : Springer, [2022]
©2022

Copies

Description 1 online resource (x, 229 pages) : illustrations (some color)
Series Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 448
Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ; 448.
Contents Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs -- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes -- Real-World Applied Cryptography -- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks -- Black-box Testing of Cryptographic Algorithms Based on Data Characteristics -- Network Attack and Defense -- IoT Devices Classification base on Network Behavior Analysis -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- Security Application -- A Novel Logistics Scheme Based on Zero-trust Model -- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary
Summary This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application
Notes Revised and selected conference papers
Print version record
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Lin, Jingqiang, editor
Tang, Qiang, editor
ISBN 9783031170812
3031170814
9788303117083
8303117084
Other Titles AC3 2022