Applications of Cryptography Theory in Network Security

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Network Science".

Deadline for manuscript submissions: 28 February 2025 | Viewed by 38

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: cryptology; computer systems cybersecurity; systems and network security; cryptography; IoT security; randomness in cryptography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Science and Technology, Isabel I University, 09003 Burgos, Spain
Interests: machine learning; cryptography; evolutionary algorithms; computer systems cybersecurity; intelligent systems and Internet of Things

Special Issue Information

Dear Colleagues,

Cryptography plays a essential role in ensuring the security of networks by providing various mechanisms to protect data confidentiality, integrity, authentication, and non-repudiation. The persistently increasing tendency of ever-more-sophisticated cyberattacks and global cyberterrorism makes it critical for any organization and nation to protect its networks and critical infrastructures. Cryptographic protocols provide the necessary tools to address various security concerns and establish trust in networked environments.

This Special Issue aims to explore recent advances in the use of cryptography in network security protocols. It includes the use of new cryptographic algorithms resistant to quantum computing and the necessity of implementing crypto-agility to keep these protocols secure.

Specific topics of interest include, but are not limited to, the following:

  • Cryptographic secure protocols.
  • Quantum-resistant cryptographic techniques.
  • Crypto-agility in network security.
  • Communication technology and protocol security.
  • Authentication protocols.
  • Key distribution and management.
  • Real-time cryptography applications.
  • Cryptography and cybersecurity.
  • Industrial network security.
  • Security and privacy for cloud and edge computing.
  • Machine learning and deep learning application to cybersecurity.

We look forward to receiving your contributions.

Dr. Amalia Beatriz Orúe López
Dr. Víctor Martínez-Martínez
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic secure protocols
  • quantum resistant cryptographic techniques
  • crypto-agility in network security
  • communication technology and protocol security
  • authentication protocols
  • key distribution and management
  • real-time cryptography applications
  • cryptography and cybersecurity
  • industrial network security
  • security and privacy for cloud and edge computing
  • machine learning and deep learning application to cybersecurity

Published Papers

This special issue is now open for submission.
Back to TopTop