Special Issue on Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption

Submission Deadline: Jul. 20, 2020

Please click the link to know more about Manuscript Preparation: http://www.ajist.org/submission

Please download to know all details of the Special Issue

Special Issue Flyer (PDF)
  • Lead Guest Editor
    • Computer Science Department, Faculty of Mathematics and Computer Science, University of Bucharest, Bucharest, Romania
  • Guest Editor
    Guest Editors play a significant role in a special issue. They maintain the quality of published research and enhance the special issue’s impact. If you would like to be a Guest Editor or recommend a colleague as a Guest Editor of this special issue, please Click here to complete the Guest Editor application.
    • Mihailescu Marius Iulian
      Dapyx Ltd, Bucharest, Romania
    • Pau Valentin Corneliu
      Romanian Scientists Academy, Bucharest, Romania
    • Kevorchian Cristian
      University of Bucharest, Bucharest, Romania
  • Introduction

    The aim of the current Special Issue is to bring together researchers in all aspects of cryptography and cryptology with a focus on searchable and homomorphic encryption and other related areas, theoretical or applied. By creating a volume of the most recent work on advances in all theoretical and applied cryptography, we will provide a very large palette of topics and ideas which will cover the most important aspects of the modern cryptography by presenting to the readers the challenges of Information Security field through searchable and homomorphic encryption trends but not limited to these topics.
    The particular topics which are of interest for this Special Issue include, but not limited to, the following: theoretical foundations of searchable encryption; theoretical foundations of homomorphic encryption; applied cryptography in cloud computing and big data; applied cryptography for biometrics; ethical hacking; game theory; protocols design; obfuscation attacks; steganography and steganalysis; intrusion detection systems; cryptanalysis; ciphers; identification and identity-based cryptography.

    Aims and Scope:

    1. Searchable Encryption
    2. Homomorphic Encryption
    3. Biometrics
    4. Game Theory
    5. Ethical Hacking
    6. Steganography
    7. Applied Elements of Cryptography and Coding
    8. Information Theoretic Security
    9. Secure Systems
    10. Data Privacy

  • Guidelines for Submission

    Manuscripts can be submitted until the expiry of the deadline. Submissions must be previously unpublished and may not be under consideration elsewhere.

    Papers should be formatted according to the guidelines for authors (see: http://www.ajist.org/submission). By submitting your manuscripts to the special issue, you are acknowledging that you accept the rules established for publication of manuscripts, including agreement to pay the Article Processing Charges for the manuscripts. Manuscripts should be submitted electronically through the online manuscript submission system at http://www.sciencepublishinggroup.com/login. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal and will be listed together on the special issue website.