Skip to Content

Symmetry and Asymmetry in Securing Data Sharing

This special issue belongs to the section “Computer“.

Special Issue Information

Keywords

  • symmetric and asymmetric ciphers
  • fine grained access control
  • authenticated key exchange
  • privacy preserving computations
  • verifiable computations
  • adversary machine learning
  • database security
  • secure data deletion
  • big data security
  • cloud computing security
  • security in social networks
  • security in cyber physical systems
  • digital forensics
  • operation system security
  • software security
  • security architecture

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994