Information Security Practice and Experience

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (30 November 2018) | Viewed by 842

Special Issue Editors

E-Mail Website
Guest Editor
School of Computer Science, Central China Normal University, Wuhan 430079, China
Interests: cryptanalysis; design of symmetric key cryptography; fast implementation of cryptography; cryptographic protocol; big data privacy and security; mobile security

E-Mail Website
Guest Editor
Department of Frontier Media Science, School of Interdisciplinary Mathematical Sciences, Meiji University, Tokyo 164-8525, Japan
Interests: data privacy; network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Risk Engineering, University of Tsukuba, Tsukuba 305-8577, Japan
Interests: information security; malware countermeasures; cloud security; risk assessment for cyber attacks; privacy-preserving data analysis and IoT security

Special Issue Information

Dear Colleagues,

As applications of computer systems and networks have permeated into every aspect of our daily lives, the information technologies and applications have been meeting the security, privacy and anonymity issues in computation, communication and storage systems. This special issue covers many dimensions including cryptographic algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. We propose this Special Issue to present security, privacy and anonymity in computation, communication and storage systems. It will be based on the upcoming international conferences: The 14th International Conference on Information Security Practice and Experience (ISPEC 2018) in September 2018 in Tokyo, Japan (

The aim of this Special Issue is to present recent progress and achievement of the research of cryptography-based security, the cryptographic techniques, protocols and applications. The scope of the Special Issue includes (but is not limited to):

  • Leakage-resilient cryptography and applications
  • Provable secure cryptographic protocols
  • Light-weight Cryptography for IoT security
  • Computer System Security
  • Cryptography-based Network Security
  • Security notions, approaches, and paradigms
  • Steganography and steganalysis
Dr. Chunhua Su
Dr. Kuo-Hui Yeh
Dr. Jiageng Chen
Prof. Hiroaki Kikuchi
Dr. Kazumasa Omote
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • Cryptography-based Network Security
  • Cryptographic protocols
  • Cryptanalysis
  • Provable Security and application
  • Security in Web Services
  • Leakage-resilient cryptography
  • Network Security
  • Malware and Botnets
  • Intrusion Detection
  • Cryptographic Implementation
  • Big data security and privacy

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop