語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applied Cryptography in Computer and Communications = Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Applied Cryptography in Computer and Communications/ edited by Jingqiang Lin, Qiang Tang.
其他題名:
Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
其他作者:
Lin, Jingqiang.
面頁冊數:
X, 229 p. 79 illus., 59 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Application software. -
電子資源:
https://doi.org/10.1007/978-3-031-17081-2
ISBN:
9783031170812
Applied Cryptography in Computer and Communications = Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
Applied Cryptography in Computer and Communications
Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /[electronic resource] :edited by Jingqiang Lin, Qiang Tang. - 1st ed. 2022. - X, 229 p. 79 illus., 59 illus. in color.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,4481867-822X ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs -- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes -- Real-World Applied Cryptography -- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks -- Black-box Testing of Cryptographic Algorithms Based on Data Characteristics -- Network Attack and Defense -- IoT Devices Classification base on Network Behavior Analysis -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- Security Application -- A Novel Logistics Scheme Based on Zero-trust Model -- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.
ISBN: 9783031170812
Standard No.: 10.1007/978-3-031-17081-2doiSubjects--Topical Terms:
528147
Application software.
LC Class. No.: QA76.76.A65
Dewey Class. No.: 005.3
Applied Cryptography in Computer and Communications = Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
LDR
:03508nam a22004095i 4500
001
1084004
003
DE-He213
005
20221005092007.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031170812
$9
978-3-031-17081-2
024
7
$a
10.1007/978-3-031-17081-2
$2
doi
035
$a
978-3-031-17081-2
050
4
$a
QA76.76.A65
072
7
$a
UB
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UX
$2
thema
082
0 4
$a
005.3
$2
23
245
1 0
$a
Applied Cryptography in Computer and Communications
$h
[electronic resource] :
$b
Second EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /
$c
edited by Jingqiang Lin, Qiang Tang.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
X, 229 p. 79 illus., 59 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
448
505
0
$a
Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs -- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes -- Real-World Applied Cryptography -- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks -- Black-box Testing of Cryptographic Algorithms Based on Data Characteristics -- Network Attack and Defense -- IoT Devices Classification base on Network Behavior Analysis -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- Security Application -- A Novel Logistics Scheme Based on Zero-trust Model -- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary.
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.
650
0
$a
Application software.
$3
528147
650
1 4
$a
Computer and Information Systems Applications.
$3
1365732
700
1
$a
Lin, Jingqiang.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1327357
700
1
$a
Tang, Qiang.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1190086
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031170805
776
0 8
$i
Printed edition:
$z
9783031170829
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-031-17081-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入