Next Article in Journal
Datafication and the Seductive Power of Uncertainty—A Critical Exploration of Big Data Enthusiasm
Previous Article in Journal
Information and Phylogenetic Systematic Analysis
Previous Article in Special Issue
Cable Capacitance Attack against the KLJN Secure Key Exchange
Article Menu

Export Article

Open AccessEditorial
Information 2015, 6(4), 833-835; https://doi.org/10.3390/info6040833

A Summary of the Special Issue “Cybersecurity and Cryptography”

1
College of Mathematics and Informatics, South China Agricultural University, 483 Wushan Rd, Tianhe, Guangzhou 510642, China
2
School of Computing and Information Technology, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522, Australia
*
Author to whom correspondence should be addressed.
Academic Editor: Willy Susilo
Received: 23 November 2015 / Revised: 4 December 2015 / Accepted: 4 December 2015 / Published: 8 December 2015
(This article belongs to the Special Issue Cybersecurity and Cryptography)
View Full-Text   |   Download PDF [609 KB, uploaded 8 December 2015]
Note: In lieu of an abstract, this is an excerpt from the first page.

Excerpt

Nowadays in the cyber world, massive amounts of data are being collected, transmitted, and stored by different organizations and individuals.[...] View Full-Text
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Huang, Q.; Yang, G. A Summary of the Special Issue “Cybersecurity and Cryptography”. Information 2015, 6, 833-835.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top