About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
AC3 2022
Other Years
AC3 2021AC3 2022
Ethics and Malpractice Statement
Back to LNICST

    AC3

    Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed…

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.

    The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

    more »
    Editor(s): Jingqiang Lin (University of Science and Technology of China) and Qiang Tang (The University of Sydney)
    Publisher
    Springer
    ISBN
    978-3-031-17081-2
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    14th–15th May 2022
    Location
    Virtual Event, -
    Appeared in EUDL
    2022-10-05
    Appears in
    SpringerLink

    Copyright © 2022–2025 ICST

    Ordered by title or year
    Showing 11–14 of 14 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • The Block-Based Mobile PDE Systems are Not Secure - Experimental Attacks

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Niusen Chen, Bo Chen, Weisong Shi
    • WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Jinfu Hao, Yongbao Wang, Weijie Deng, Nanjiang Xie, Zheng Gong
    • X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Shushang Wen, Bingyu Li, Ziqiang Ma, Qianhong Wu, Nenghai Yu
    • bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Cherif Diallo
    • First
    • Previous
    • 1
    • 2
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL