TY - JOUR
T1 - Special issue on entropy-based applied cryptography and enhanced security for ubiquitous computing
AU - Park, James
AU - Zhou, Wanlei
N1 - Publisher Copyright:
© 2016 by the authors.
PY - 2016/9/13
Y1 - 2016/9/13
N2 - Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.
AB - Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.
KW - Applied cryptography
KW - Enhanced security
KW - Ubiquitous computing
UR - https://www.scopus.com/pages/publications/85025475172
U2 - 10.3390/e18090334
DO - 10.3390/e18090334
M3 - Editorial
AN - SCOPUS:85025475172
SN - 1099-4300
VL - 18
JO - Entropy
JF - Entropy
IS - 9
M1 - 334
ER -