Special Issue "Symmetry in Secure Cyber World"
A special issue of Symmetry (ISSN 2073-8994).
Deadline for manuscript submissions: 31 March 2017
Prof. Dr. Stefanos Gritzalis
Laboratory of Information and Communication Systems Security (Info-Sec-Lab), Department of Information and Communication Systems Engineering, University of the Aegean, Karlovassi, Samos, GR-83200, Greece
Website | E-Mail
Fax: +30 22730 82234
Interests: asymetric-key infrastructure; computer networks and security, and cloud computing security and privacy
Recent advances of symmetry theory in Secure Cyber World (SCW) have posed great challenges to information technology. Together with these trends, advanced applied cryptography and security have become a growing issue as well as an indispensable research topic for the future of computing and communications. For applied cryptography and advanced security services, many researchers and developers would like to apply symmetry theories and technologies, that is, the rules of a formal system as a mathematical pattern of self-similarity such as reflection, rotational, translational, point reflection and other involutive isometrics, and so on. The detailed discussion of the research issues of applied cryptography and advanced security concerns based on symmetric and asymmetric key cryptography covers, amongst others: confidentiality, integrity, and availability, including the various areas of applications. In particular, these topics will be the most comprehensive field focused on the important aspects of advanced models, technologies, applications and services for SCW.
This Special Issue aims to provide an advanced theory and application for researchers and practitioners to contribute with original research and review articles that present the state-of-the-art research outcomes, practical results, latest findings and future evolutions of mathematics in applied cryptosystems and security concerns based on symmetry for SCW. Original and research articles are solicited in all aspects, including: theoretical studies, practical applications, new techniques and experimental prototypes. All submitted papers will be peer-reviewed and selected on the basis of both their quality and their relevance to the theme of this Special Issue.
Potential topics include, but are not limited to:
- Applied cryptosystem based on symmetry for SCW
- Advanced symmetric key cryptosystem
- Advanced asymmetric key cryptosystem
- Symmetry in security services for SCW
- Symmetry in security applications for SCW
- Symmetry in network and embedded system security
- Methods for improving efficiency or accuracy in security for SCW
- Cryptography algorithms in smart devices for SCW
- Secure and trusted service framework and architectures for SCW
- Computational models of secure communication mechanisms for SCW
- Privacy-enhancing technology for SCW
- Access control for SCW
- Security protocols for SCW
- Other symmetry issues in applied cryptography and security concerns for SCW
Prof. Dr. Young-Sik Jeong
Prof. Dr. Laurence T. Yang
Prof. Dr. Stefanos Gritzalis
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed Open Access monthly journal published by MDPI.
- applied cryptosystem
- symmetric key
- asymmetric key
- symmetry in security