Information and Communications Security—ICICS 2025

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: 10 January 2026 | Viewed by 42

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, University of Liverpool, Liverpool L69 7ZX, UK
Interests: web security & privacy; identity management; authentication; security protocols; machine learning in malware & vulnerability detection; browser fingerprinting

E-Mail
Guest Editor
College of Computer Science and Cyber Security (Pilot Software College), Chengdu University of Technology, Chengdu 610059, China
Interests: cryptography; access control security; data security

E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Southeast University, Nanjing 211102, China
Interests: cryptography; privacy protection; access control; blockchain; cloud computing security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue will present extended versions of papers presented at the 27th International Conference on Information and Communications Security (ICICS 2025, https://www.icics2025.org/index.html).

Authors interested in extending their conference papers should be aware that their final submitted manuscript must provide a minimum of 50% new content and not exceed 30% copy/paste from their respective proceedings paper. Each manuscript will undergo blind review.

In addition, this Special Issue also welcomes original papers (not accepted for ICICS 2025) presenting theories, techniques, implementations, applications, and practical experiences on a variety of topics. Topics of interest include, but are not limited to:

  • Access control;
  • AI-based security and privacy;
  • Anonymity;
  • Applied cryptography;
  • Authentication and authorization;
  • Biometrics security;
  • Blockchain security and privacy;
  • Cloud computing security;
  • Cyber-physical systems security;
  • Data security and privacy;
  • Digital watermarking;
  • Formal methods for security;
  • Hardware security;
  • Identity management;
  • Mobile security and privacy;
  • Network security;
  • Privacy enhancing technologies;
  • Secure communication protocols;
  • Secure information flow;
  • Secure systems design and architectures;
  • Security and privacy for the (Industrial) Internet of Things;
  • Security and privacy of AI;
  • Security visualization;
  • Steganography and steganalysis;
  • Trusted computing;
  • Trust management and reputation;
  • Web security and privacy.

Dr. Wanpeng Li
Dr. Rang Zhou
Prof. Dr. Jinguang Han
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • access control
  • applied cryptography
  • authentication and authorization
  • hardware security
  • network security
  • privacy enhancing technologies
  • secure communication protocols

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers

This special issue is now open for submission.
Back to TopTop