Tang / Lin | Applied Cryptography in Computer and Communications | Buch | 978-3-031-17080-5 | sack.de

Buch, Englisch, Band 448, 229 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 376 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Tang / Lin

Applied Cryptography in Computer and Communications

Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

Buch, Englisch, Band 448, 229 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 376 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-031-17080-5
Verlag: Springer Nature Switzerland


This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.

The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

Tang / Lin Applied Cryptography in Computer and Communications jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Quantum-Safe Cryptographic Solution.- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems.- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems.- Applied Cryptography for IoT.- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography.- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment.- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices.- Authentication Protocol.- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs.- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes.- Real-World Applied Cryptography.- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency.- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks.- Black-box Testing ofCryptographic Algorithms Based on Data Characteristics.-  Network Attack and Defense.- IoT Devices Classification base on Network Behavior Analysis.- Semi-supervised False Data Injection Attacks Detection in Smart Grid.- Security Application.-A Novel Logistics Scheme Based on Zero-trust Model.- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.