Special Issue on Cryptography and Information Security
Acknowledgments
Conflicts of Interest
References
- Zhang, X.; Shan, C.; Zou, Y. Multi-party Secure Comparison of Strings Based on Outsourced Computation. In Proceedings of the International Conference on Machine Learning for Cyber Security, Guangzhou, China, 2–4 December 2022. [Google Scholar] [CrossRef]
- Alexan, W.; Chen, Y.-L.; Por, L.Y.; Gabr, M. Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry 2023, 15, 1081. [Google Scholar] [CrossRef]
- Wagan, A.A.; Khan, A.A.; Chen, Y.-L.; Yee, P.L.; Yang, J.; Laghari, A.A. Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE). Sustainability 2023, 15, 5362. [Google Scholar] [CrossRef]
- Meisami, S.; Meisami, S.; Yousefi, M.; Aref, M.R. Combining Blockchain and IOT for Decentralized Healthcare Data Management. Int. J. Cryptogr. Inf. Secur. 2023, 13, 35–50. [Google Scholar] [CrossRef]
- Binbeshr, F.; Por, L.Y.; Kiah, M.L.M.; Zaidan, A.A.; Imam, M. Secure PIN-Entry Method Using One-Time PIN (OTP). IEEE Access 2023, 11, 18121–18133. [Google Scholar] [CrossRef]
- Oruj, Z. Cyber Security: Contemporary Cyber Threats and National Strategies. Distance Educ. Ukr. Innov. Norm.-Leg. Pedagog. Asp. 2023, 1, 100–116. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Por, L.Y.; Yang, J.; Ku, C.S.; Khan, A.A. Special Issue on Cryptography and Information Security. Appl. Sci. 2023, 13, 6042. https://doi.org/10.3390/app13106042
Por LY, Yang J, Ku CS, Khan AA. Special Issue on Cryptography and Information Security. Applied Sciences. 2023; 13(10):6042. https://doi.org/10.3390/app13106042
Chicago/Turabian StylePor, Lip Yee, Jing Yang, Chin Soon Ku, and Abdullah Ayub Khan. 2023. "Special Issue on Cryptography and Information Security" Applied Sciences 13, no. 10: 6042. https://doi.org/10.3390/app13106042
APA StylePor, L. Y., Yang, J., Ku, C. S., & Khan, A. A. (2023). Special Issue on Cryptography and Information Security. Applied Sciences, 13(10), 6042. https://doi.org/10.3390/app13106042