You are currently viewing a new version of our website. To view the old version click .

Information Security Practice and Experience

Special Issue Information

Dear Colleagues,

As applications of computer systems and networks have permeated into every aspect of our daily lives, the information technologies and applications have been meeting the security, privacy and anonymity issues in computation, communication and storage systems. This special issue covers many dimensions including cryptographic algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. We propose this Special Issue to present security, privacy and anonymity in computation, communication and storage systems. It will be based on the upcoming international conferences: The 14th International Conference on Information Security Practice and Experience (ISPEC 2018) in September 2018 in Tokyo, Japan (http://www.risk.tsukuba.ac.jp/ispec2018/).

The aim of this Special Issue is to present recent progress and achievement of the research of cryptography-based security, the cryptographic techniques, protocols and applications. The scope of the Special Issue includes (but is not limited to):

  • Leakage-resilient cryptography and applications
  • Provable secure cryptographic protocols
  • Light-weight Cryptography for IoT security
  • Computer System Security
  • Cryptography-based Network Security
  • Security notions, approaches, and paradigms
  • Steganography and steganalysis
Dr. Chunhua Su
Dr. Kuo-Hui Yeh
Dr. Jiageng Chen
Prof. Hiroaki Kikuchi
Dr. Kazumasa Omote
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cryptography-based Network Security
  • Cryptographic protocols
  • Cryptanalysis
  • Provable Security and application
  • Security in Web Services
  • Leakage-resilient cryptography
  • Network Security
  • Malware and Botnets
  • Intrusion Detection
  • Cryptographic Implementation
  • Big data security and privacy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X