This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.
The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.
"synopsis" may belong to another edition of this title.
US$ 123.31 shipping from Germany to U.S.A.
Destination, rates & speedsSeller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020036656
Quantity: Over 20 available
Seller: California Books, Miami, FL, U.S.A.
Condition: New. Seller Inventory # I-9783031170805
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783031170805_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9783031170805
Quantity: 10 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26396368563
Quantity: 4 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application. 244 pp. Englisch. Seller Inventory # 9783031170805
Quantity: 2 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND. Seller Inventory # 18396368569
Quantity: 4 available
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.The 12 revised full papers. Seller Inventory # 693974498
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 244 pp. Englisch. Seller Inventory # 9783031170805
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually.The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application. Seller Inventory # 9783031170805
Quantity: 1 available