找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Cryptography in Computer and Communications; Second EAI Internati Jingqiang Lin,Qiang Tang Conference proceedings 2022 ICST Institu

[复制链接]
查看: 24273|回复: 53
发表于 2025-3-21 16:31:06 | 显示全部楼层 |阅读模式
期刊全称Applied Cryptography in Computer and Communications
期刊简称Second EAI Internati
影响因子2023Jingqiang Lin,Qiang Tang
视频video
学科分类Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi
图书封面Titlebook: Applied Cryptography in Computer and Communications; Second EAI Internati Jingqiang Lin,Qiang Tang Conference proceedings 2022 ICST Institu
影响因子This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually..The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application..
Pindex Conference proceedings 2022
The information of publication is updating

书目名称Applied Cryptography in Computer and Communications影响因子(影响力)




书目名称Applied Cryptography in Computer and Communications影响因子(影响力)学科排名




书目名称Applied Cryptography in Computer and Communications网络公开度




书目名称Applied Cryptography in Computer and Communications网络公开度学科排名




书目名称Applied Cryptography in Computer and Communications被引频次




书目名称Applied Cryptography in Computer and Communications被引频次学科排名




书目名称Applied Cryptography in Computer and Communications年度引用




书目名称Applied Cryptography in Computer and Communications年度引用学科排名




书目名称Applied Cryptography in Computer and Communications读者反馈




书目名称Applied Cryptography in Computer and Communications读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:16:32 | 显示全部楼层
Quantum-Safe Signing of Notification Messages in Intelligent Transport Systemsn intelligent transport systems. We evaluated the performance of the algorithms by measuring the time required to sign and verify messages, as well as the size of the signed messages, and compared the quantum-safe options to the elliptic curves currently accepted by the standards. Our results show t
发表于 2025-3-22 01:46:29 | 显示全部楼层
WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptographytions attract more and more attentions. Secure data transmission plays pivotal role of the security of IoT applications. However, there are still many IoT devices do not support cryptographic functions due to their constrained resources. Moreover, cryptographic key storage also becomes a practical s
发表于 2025-3-22 05:18:23 | 显示全部楼层
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Envdynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Consequently, many security and privacy preservation schemes have been developed based on techniques su
发表于 2025-3-22 09:02:28 | 显示全部楼层
Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devicesl configuration of these resource-constrained devices. Moreover, in certain scenarios security must be guaranteed to protect data confidentiality, which imposes another resource consumption overhead. In this work-in-progress we evaluate the resource consumption of two widely-used block ciphers (AES
发表于 2025-3-22 16:18:27 | 显示全部楼层
发表于 2025-3-22 17:42:49 | 显示全部楼层
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodess paper, our contribution consists in proposing a new authentication protocol, named bisAUTH, for IoT objects inspired on certain characteristics of the blockchain technology. Our main objective is to propose a mechanism allowing neighboring IoT nodes of a network to authenticate in a decentralized
发表于 2025-3-22 23:27:56 | 显示全部楼层
发表于 2025-3-23 04:20:40 | 显示全部楼层
The Block-Based Mobile PDE Systems are Not Secure - Experimental Attackstion (FDE) is often integrated in mainstream mobile operating systems like Android and iOS. FDE however cannot defend against coercive attacks in which the adversary can force the device owner to disclose the decryption key. To combat the coercive attacks, Plausibly Deniable Encryption (PDE) is leve
发表于 2025-3-23 06:18:02 | 显示全部楼层
Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this d
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-12 07:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表