A Summary of the Special Issue “Cybersecurity and Cryptography”
College of Mathematics and Informatics, South China Agricultural University, 483 Wushan Rd, Tianhe, Guangzhou 510642, China
School of Computing and Information Technology, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522, Australia
Author to whom correspondence should be addressed.
Academic Editor: Willy Susilo
Received: 23 November 2015 / Revised: 4 December 2015 / Accepted: 4 December 2015 / Published: 8 December 2015
PDF [609 KB, uploaded 8 December 2015]
Note: In lieu of an abstract, this is an excerpt from the first page.
Nowadays in the cyber world, massive amounts of data are being collected, transmitted, and stored by different organizations and individuals.[...]
This is an open access article distributed under the Creative Commons Attribution License
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
Share & Cite This Article
MDPI and ACS Style
Huang, Q.; Yang, G. A Summary of the Special Issue “Cybersecurity and Cryptography”. Information 2015, 6, 833-835.
Huang Q, Yang G. A Summary of the Special Issue “Cybersecurity and Cryptography”. Information. 2015; 6(4):833-835.
Huang, Qiong; Yang, Guomin. 2015. "A Summary of the Special Issue “Cybersecurity and Cryptography”." Information 6, no. 4: 833-835.
Show more citation formats
Show less citations formats
[Return to top]
For more information on the journal statistics, click here
Multiple requests from the same IP address are counted as one view.