About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
AC3 2022
Other Years
AC3 2021AC3 2022
Ethics and Malpractice Statement
Back to LNICST

    AC3

    Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed…

    This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.

    The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.

    more »
    Editor(s): Jingqiang Lin (University of Science and Technology of China) and Qiang Tang (The University of Sydney)
    Publisher
    Springer
    ISBN
    978-3-031-17081-2
    ISSN
    1867-8211
    Series
    LNICST
    Conference dates
    14th–15th May 2022
    Location
    Virtual Event, -
    Appeared in EUDL
    2022-10-05
    Appears in
    SpringerLink

    Copyright © 2022–2025 ICST

    Ordered by title or year
    Showing 11–14 of 14 results
    Page size: 102550
    • First
    • Previous
    • 1
    • 2
    • IoT Devices Classification Base on Network Behavior Analysis

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Lingan Chen, Xiaobin Tan, Chuang Peng, Mingye Zhu, Zhenghuan Xu, Shuangwu Chen
    • Semi-supervised False Data Injection Attacks Detection in Smart Grid

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Yasheng Zhou, Li Yang, Yang Cao
    • A Novel Logistics Scheme Based on Zero-Trust Model

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Haobo Wang, Wei Ou, Wenbao Han
    • ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, Word Segmentation and Entity Dictionary

      Research Article in Applied Cryptography in Computer and Communications. Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings

      Haifeng Lv, Yong Ding
    • First
    • Previous
    • 1
    • 2
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL