Openly accessible

Special issue on entropy-based applied cryptography and enhanced security for ubiquitous computing

Park, James (Jong Hyuk) and Zhou, Wanlei 2016, Special issue on entropy-based applied cryptography and enhanced security for ubiquitous computing, Entropy, vol. 18, no. 9, pp. 1-5, doi: 10.3390/e18090334.

Attached Files
Name Description MIMEType Size Downloads
zhou-specialissueonentropy-2016.pdf Published version application/pdf 262.82KB 8

Title Special issue on entropy-based applied cryptography and enhanced security for ubiquitous computing
Author(s) Park, James (Jong Hyuk)
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Journal name Entropy
Volume number 18
Issue number 9
Article ID e18090334
Start page 1
End page 5
Total pages 5
Publisher MDPI
Place of publication Basel, Switzerland
Publication date 2016-09-13
ISSN 1099-4300
Keyword(s) applied cryptography
enhanced security
ubiquitous computing
Summary Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.
Language eng
DOI 10.3390/e18090334
HERDC Research category C4 Letter or note
ERA Research output type X Not reportable
Copyright notice ©2016, the authors
Free to Read? Yes
Use Rights Creative Commons Attribution licence
Persistent URL http://hdl.handle.net/10536/DRO/DU:30101831

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 10 Abstract Views, 10 File Downloads  -  Detailed Statistics
Created: Mon, 11 Sep 2017, 15:17:27 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.