Special Issue "Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing"

Quicklinks

A special issue of Entropy (ISSN 1099-4300).

Deadline for manuscript submissions: 28 February 2015

Special Issue Editors

Guest Editor
Prof. Dr. James Park
Head of Dept. of Computer Science and Engineering, Seoul National University of Science and Technology, Korea
Website: http://www.parkjonghyuk.net/
E-Mail: jamespark.seoul@gmail.com

Guest Editor
Prof. Dr. Wanlei Zhou
Chair of Information Technology and Head, School of Information Technology, Deakin University, Melbourne, Australia
Website: http://www.deakin.edu.au/~wanlei/
E-Mail: wanlei.zhou@deakin.edu.au

Special Issue Information

Dear Colleagues,

Entropy is a basic and important concept in information theory by Claude E. Shannon. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. Together with these trends, applied cryptography and security have become a rising big issue for providing secure and trust computing in the next generation information and communications. A detailed discussion of these issues would include applied cryptography and security concerns that cover amongst others, confidentiality, integrity, and availability (including various application areas). In particular, these topics will comprehensively focus on the important aspects of entropy-based applied cryptography and enhanced security for Ubi-comp.

  • Specific topics of interest include (but are not limited to):
  • Entropy-based Applied Cryptographic aspects of Ubi-comp
  • Entropy-based Hash Functions for Ubi-comp
  • Mathematical and Algorithmic Foundations of Applied Cryptography
  • Cryptography algorithms in ubiquitous and personal devices
  • Advanced Design and Analysis of Cryptographic Algorithms for Ubi-comp
  • Public Key Cryptosystems for Ubi-comp
  • Authentication and Access Control for Ubi-comp
  • Privacy Protection and Trust Computing for Ubi-comp
  • Entropy-based Network Security Issues for Ubi-comp
  • Information Hiding and Digital Forensics in Ubi-comp
  • Security Issues for IoT, Converged IT, V2X
  • Security issues in cloud computing and social networks

This Special Issue aims to provide advanced theories and applications; researchers should contribute original research and review articles that present state-of-the-art research outcomes, practical results in entropy-based applied cryptographic models, and enhanced security system for Ubi-comp.

Profs. James Park
Wanlei Zhou
Guest Editors

Submission

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed Open Access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1200 CHF (Swiss Francs).


Keywords

  • applied cryptography
  • ubiquitous computing security
  • cryptography algorithms
  • public key cryptosystems
  • authentication
  • access control
  • privacy protection
  • trust computing
  • entropy based network security
  • information hiding
  • digital forensics

Published Papers (4 papers)

Download All Papers
Sort by:
Display options:
Select articles Export citation of selected articles as:
Select/unselect all
Displaying article 1-4
p. 6602-6623
by ,  and
Entropy 2014, 16(12), 6602-6623; doi:10.3390/e16126602 (registering DOI)
Received: 30 October 2014; in revised form: 4 December 2014 / Accepted: 16 December 2014 / Published: 19 December 2014
Show/Hide Abstract | PDF Full-text (1300 KB)
abstract graphic
p. 6152-6165
by  and
Entropy 2014, 16(11), 6152-6165; doi:10.3390/e16116152
Received: 10 August 2014; in revised form: 25 September 2014 / Accepted: 4 November 2014 / Published: 19 November 2014
Show/Hide Abstract | PDF Full-text (250 KB) | HTML Full-text | XML Full-text
p. 4185-4198
by  and
Entropy 2014, 16(8), 4185-4198; doi:10.3390/e16084185
Received: 24 June 2014; in revised form: 15 July 2014 / Accepted: 17 July 2014 / Published: 24 July 2014
Show/Hide Abstract | PDF Full-text (1494 KB) | HTML Full-text | XML Full-text
abstract graphic
p. 3121-3135
by , ,  and
Entropy 2014, 16(6), 3121-3135; doi:10.3390/e16063121
Received: 8 April 2014; in revised form: 23 May 2014 / Accepted: 29 May 2014 / Published: 5 June 2014
Show/Hide Abstract | PDF Full-text (3598 KB) | HTML Full-text | XML Full-text
Select/unselect all
Displaying article 1-4
Select articles Export citation of selected articles as:

Last update: 14 November 2014

Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert