Cryptography in Network Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 16 August 2024 | Viewed by 123

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, University of North Florida, Jacksonville, FL 32224, USA
Interests: cryptographic; computer security; energy-aware computing; algorithms

E-Mail Website
Guest Editor
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Interests: controller area networks; learning (artificial intelligence); security of data; vehicular ad hoc networks; Internet of Things; computer network security; convolutional neural nets; crack detection

Special Issue Information

Dear Colleagues,

Cryptography is the basic theory of network security and mainly provides security services such as confidentiality, integrity, and availability for information systems.

In actual cryptographic applications, common problems include key leaks, implementation loopholes in cryptographic algorithms and protocols, and privacy leaks. Particulrly in new environments such as the Internet of Things, the Industrial Internet, and the Internet of Vehicles, special research is needed to adapt the theory and technology of cryptography.

In this context, this  Special Issue on “Cryptography in Network Security” invites the submission of both original research articles and reviews. Research areas may include (but are not limited to) the following topics:

  • cryptographic algorithm design
  • applied cryptography
  • cryptographic protocol analysis
  • homomorphic cryptography
  • emerging cryptographic techniques
  • quantum cryptography
  • vulnerability mining and exploitation in cryptography applications
  • authentication and biometric security/privacy
  • blockchain security/privacy
  • Internet of Things, the Industrial Internet, and the Internet of Vehicles security/privacy
  • distributed security and consensus protocols
  • security/privacy of systems based on ML and AI

We look forward to receiving your contributions.

Dr. Swapnoneel Roy
Dr. Guosheng Xu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic algorithm
  • applied cryptography
  • cryptographic protocol analysis
  • privacy

Published Papers

This special issue is now open for submission.
Back to TopTop