Skip Content
You are currently on the new version of our website. Access the old version .

Symmetry and Asymmetry in Securing Data Sharing

This special issue belongs to the section “Computer“.

Special Issue Information

Keywords

  • symmetric and asymmetric ciphers
  • fine grained access control
  • authenticated key exchange
  • privacy preserving computations
  • verifiable computations
  • adversary machine learning
  • database security
  • secure data deletion
  • big data security
  • cloud computing security
  • security in social networks
  • security in cyber physical systems
  • digital forensics
  • operation system security
  • software security
  • security architecture

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994