LEADER 02354nas 2200457 n 450 001 990008975120403321 005 20240229084540.0 011 $a0018-9499 035 $a000897512 035 $aFED01000897512 035 $a(Aleph)000897512FED01 035 $a000897512 091 $2CNR$aP 00004164 100 $a20090724a19639999km-y0itaa50------ba 101 0 $aeng 102 $aUS 110 $aauu-------- 200 1 $aIEEE transactions on nuclear science 207 1$a1963- 210 $aNew York$cProfessional Technical Group on Nuclear Science 326 $aBimestrale 430 0$1001000898227$12001$aIRE transactions on nuclear science 452 0$12001$aIEEE transactions on nuclear science 530 0 $aIEEE transactions on nuclear science 675 $a539 675 $a621.3 676 $a621 712 02$aInstitute of Electrical and Electronics Engineers 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=2016&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990008975120403321 958 $aBiblioteca "Roberto Stroffolini" - Dipartimento di Scienze Fisiche dell'Università Federico II$b1963-2002;$c1963-1964;1966;1983;1985-1987;$fFI1 958 $aBiblioteca Interdipartimentale di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni, Informatica e Sistemistica. Università degli studi di Napoli "Federico II"$b1964-1999;$c1964-1968;1972;1974;1990;$eE1$fDINEL 959 $aFI1 959 $aDINEL 996 $aIEEE transactions on nuclear science$9793172 997 $aUNINA AP1 8 $6866-01$aNA079 Biblioteca "Roberto Stroffolini" - Dipartimento di Scienze Fisiche dell'Università Federico II$eVia Cintia-Monte S. Angelo, 80126 Napoli (NA)$m081.676253;676756;676443$m081.676434$nit AP1 8 $6866-02$aNA106 Biblioteca Interdipartimentale di Ingegneria Elettrica, Elettronica e delle Telecomunicazioni, Informatica e Sistemistica. Università degli studi di Napoli "Federico II"$bE1$eVia Claudio,21, 80125 Napoli (NA)$m081/7683242-3533$m0817683242$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=2016&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO LEADER 04001nam 22005535 450 001 9910616393803321 005 20251225202020.0 010 $a9783031170812 010 $a3031170814 024 7 $a10.1007/978-3-031-17081-2 035 $a(MiAaPQ)EBC7107447 035 $a(Au-PeEL)EBL7107447 035 $a(CKB)24996016300041 035 $a(PPN)265857198 035 $a(BIP)85922667 035 $a(BIP)85408868 035 $a(DE-He213)978-3-031-17081-2 035 $a(EXLCZ)9924996016300041 100 $a20221005d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography in Computer and Communications $eSecond EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /$fedited by Jingqiang Lin, Qiang Tang 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (229 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v448 311 08$aPrint version: Lin, Jingqiang Applied Cryptography in Computer and Communications Cham : Springer,c2022 9783031170805 320 $aIncludes bibliographical references and index. 327 $aQuantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs -- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes -- Real-World Applied Cryptography -- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks -- Black-box Testing ofCryptographic Algorithms Based on Data Characteristics -- Network Attack and Defense -- IoT Devices Classification base on Network Behavior Analysis -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- Security Application -- A Novel Logistics Scheme Based on Zero-trust Model -- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary. 330 $aThis book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v448 606 $aApplication software 606 $aComputer and Information Systems Applications 615 0$aApplication software. 615 14$aComputer and Information Systems Applications. 676 $a929.605 676 $a005.8 702 $aLin$b Jingqiang 702 $aTang$b Qiang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910616393803321 996 $aApplied cryptography in computer and communications$92814404 997 $aUNINA