Special Issue "Privacy-Preserving Techniques in Cloud/Fog and Internet of Things"
A special issue of Cryptography (ISSN 2410-387X).
Deadline for manuscript submissions: 1 August 2022 | Viewed by 3042
Interests: data security; cryptography; network security; mobile communications and computing; wireless communications
Special Issues, Collections and Topics in MDPI journals
Interests: privacy-preserving on the Internet of Things (IoT); wireless sensor networks; security; smart city
Interests: cryptography; BlockChain; Web; data science; distributed systems
Interests: applied cryptography; information hiding; text mining & retrieval; malware analysis; misinformation detection; authentication systems of smartphones; IoT security
Recently, wireless networks have been developed using cloud infrastructure and software-based networks. Their connections to the new generation Internet and the Internet of Things have reduced costs and improved reliability. It is critical for people, factories, vehicles, road and transportation environments, and much more to use IoT sensors and devices for daily tasks in these vast and complex networks. It is also important to leverage privacy-preservation patterns in large networks such as BigData, software-based networks. Several supporting technologies for IoT are Cloud Computing and Fog Computing. However, the possibility of privacy breaches in these three technologies is high. The main purpose of this leading series is to present and compile articles about this topic that can help us.
This Special Issue is looking for original articles that are not under consideration for publication elsewhere. The "Submit Online" button on the journal's submission page allows authors to follow the journal's formatting and submission instructions. Please mention that your article is for this Special Issue in your cover letter.
The following topics are possible, but not limited to:
- Privacy-preserving models for big data networks
- Privacy-preserving models for sensor networks and the Internet of Things
- Privacy-preserving mathematical models for IoT networks and Cloud Computing
- Privacy-preservation in Fog Computing
- Machine learning methods for privacy-preservation
Prof. Dr. Cheng-Chi Lee
Dr. Mehdi Gheisari
Dr. Mohammad Javad Shayegan
Dr. Milad Taleby Ahvanooey
Dr. Yang Liu
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- Internet of Things