entropy-logo

Journal Browser

Journal Browser

Privacy-Preserving Cryptography for Emerging Technologies: Applications and Challenges

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (15 June 2024) | Viewed by 368

Special Issue Editors


E-Mail Website
Guest Editor
Institute for International Strategy, Tokyo International University, Saitama 350-1197, Japan
Interests: cybersecurity; data privacy; applied cryptography; signal processing; randomization
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Computer Science Department, Faculty of Mathematics and Informatics, Mohamed Boudiaf University of M'sila, M'Sila 28000, Algeria
Interests: cybersecurity; IoT security; post-quantum cryptography; data privacy; authentication protocols

Special Issue Information

Dear Colleagues,

Privacy preservation has become a critical concern in today's data-driven world. The growing need for secure and privacy-preserving techniques has led to the emergence of various cryptographic methods as effective solutions. This Special Issue aims to gather cutting-edge research that pushes the boundaries of privacy preservation, exploring new cryptographic techniques and their applications in diverse domains.

This Special Issue invites researchers and practitioners to contribute their novel findings and advancements in privacy-preserving techniques, focusing on cryptographic approaches. The objective is to showcase cutting-edge research and explore innovative solutions that address the challenges of preserving privacy in various domains.

Topics of interest for this Special Issue include, but are not limited to:

  1. Homomorphic encryption and its applications in privacy preservation.
  2. Secure multiparty computation and privacy-preserving data analysis.
  3. Differential privacy techniques for statistical analysis and data mining.
  4. Privacy-preserving machine learning algorithms and protocols.
  5. Secure outsourcing of computation while preserving data privacy.
  6. Privacy-enhancing techniques for blockchain and decentralized systems.
  7. Privacy preservation in cloud computing and edge computing environments.
  8. Security and privacy implications of machine learning methods for the development of data analysis
  9. Cryptographic solutions for preserving privacy in Internet of Things (IoT) applications.
  10. Privacy-preserving protocols for secure data sharing and collaborative environments.
  11. Applications of zero-knowledge proofs and secure protocols for privacy preservation.
  12. Post-quantum-cryptography-based protocols and solutions.

Dr. Rafik Hamza
Dr. Noureddine Chikouche
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • data privacy
  • applied cryptography
  • signal processing
  • randomization
  • privacy-preserving techniques
  • cryptographic protocols
  • secure communication
  • data protection
  • information security

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop