About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
AC3 2022
Other Years
AC3 2021AC3 2022
Ethics and Malpractice Statement
Back to LNICST

    AC3

    Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed…

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.

    The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

    more »
    Editor(s): Jingqiang Lin (University of Science and Technology of China) and Qiang Tang (The University of Sydney)
    Publisher
    Springer
    ISBN
    978-3-031-17081-2
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    14th–15th May 2022
    Location
    Virtual Event, -
    Appeared in EUDL
    2022-10-05
    Appears in
    SpringerLink

    Copyright © 2022–2025 ICST

    Ordered by title or year
    Showing 1–10 of 14 results
    Page size: 102550
    • 1
    • 2
    • Next
    • Last
    • A Novel Logistics Scheme Based on Zero-Trust Model

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Haobo Wang, Wei Ou, Wenbao Han
    • A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Keke Huang, Changlu Lin, Yali Liu
    • ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, Word Segmentation and Entity Dictionary

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Haifeng Lv, Yong Ding
    • Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Haoling Fan, Lingjia Meng, Fangyu Zheng, Mingyu Wang, Bowen Xu
    • DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Robin Doss
    • IoT Devices Classification Base on Network Behavior Analysis

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Lingan Chen, Xiaobin Tan, Chuang Peng, Mingye Zhu, Zhenghuan Xu, Shuangwu Chen
    • Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Sara Nikula, Kimmo Halunen, Visa Vallivaara
    • Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Razvan Raducu, Ricardo J. Rodríguez, Pedro Álvarez
    • Semi-supervised False Data Injection Attacks Detection in Smart Grid

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Yasheng Zhou, Li Yang, Yang Cao
    • Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar
    • 1
    • 2
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL