Special Issues

Cryptography publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic. The journal’s Editor-in-Chief and/or designated EBM will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
Security, Privacy and Trust Aspects of Wearable and Resource Constrained Devices submission deadline 20 Apr 2024 | 2 articles | Viewed by 4835 | Submission Open
Privacy-Enhancing Technologies for the Digital Age
edited by , Zengpeng Li and Dou An
submission deadline 31 May 2024 | Viewed by 486 | Submission Open
Hardware Security and Cryptographic Implementations
edited by , Xiaofang Wang and Danai Chasaki
submission deadline 30 Jun 2024 | Viewed by 213 | Submission Open
Keywords: cryptographic algorithms; hardware security; quantum cryptanalysis; cyber-physical system security
(This special issue belongs to the Section Hardware Security)
Advances in Authentication, Authorization and Privacy for Securing Smart Communications submission deadline 31 Jul 2024 | 2 articles | Viewed by 3750 | Submission Open
Keywords: information security; data privacy; cryptography; authentication; authorization; accounting; identification; post-quantum; digital signature; digital certificate; smart systems; internet of things; internet of everything
Physical Cryptographic Techniques and Applications
edited by
submission deadline 31 Oct 2024 | Viewed by 24 | Submission Open
Keywords: physical randomness; physical cryptography; physical crypto hash; physical provenance; physical unclonable functions
Role of Cryptography in Network Security submission deadline 30 Nov 2024 | Viewed by 211 | Submission Open
Back to TopTop