2,132
Views
2
CrossRef citations to date
0
Altmetric
Editorial

Advanced computer mathematics based cryptography and security technologies

, &
Pages 2512-2514 | Published online: 09 Dec 2013

We currently live in an information society. As information and communication technologies develop at an ever growing pace, the number of people who use these technologies on a day to day basis is also increasing. This development has brought substantial benefits but also introduced novel threats and vulnerabilities related to leakage of confidential information, the theft of identities and the unauthorized modification of data. This shows the need for the development of a reliable and trustworthy information infrastructure. This requires trustworthy systems which can be implemented by security technologies, and an essential building block for such systems is cryptography. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. It makes extensive use of mathematics such as number theory, probability, statistics and combinatorics as well as of information theory, computational complexity and coding theory.

The aim of this special issue is to foster state-of-the-art research in the area of cryptography and security technologies. This special issue focuses on advances in cryptography and security technologies based on computer mathematics. Topics of primary interest include, but are not limited to:

  • Authentication and access control

  • Anonymity, identity management

  • Cryptographic protocols

  • Data integrity, dependability

  • Digital right management and intellectual property protection

  • Accountability

  • Applied cryptography

  • Mathematical and algorithmic foundations of applied cryptography

  • Design and analysis of cryptographic algorithms and protocols

  • Information security with mathematical emphasis

  • Side channel attack

  • Algebraic attack

  • Cybercrime and computer forensics

  • Denial of service attacks

  • Formal methods in security

  • Information warfare

  • Steganography and watermarking

  • Intrusion tolerance

  • System and network security

  • Multimedia security

  • Smartphone security issues

  • Security for open convergence system

  • Security for machine-to-machine (M2M) platform

  • Security and privacy issues for intelligent vehicular systems and communications

  • Security issues for broadband convergence network

  • Internet protocol television (IPTV) security services

  • Privacy-enhancing technology

  • Security evaluation and management

  • Security requirements engineering

  • trust models and trust management policies

  • Mobile trusted computing

  • Trustworthy infrastructures and services for cloud computing

  • Cryptographic aspects of trusted computing

  • Establishing trust in embedded systems

  • Virtualization for trusted platforms

  • Verification of trusted computing architectures

We received many manuscripts. Each manuscript was blind reviewed by at least three reviewers consisting of guest editors and external reviewers. After the review process, the following nine manuscripts were finally selected for this Special Issue.

  1. Two-factor authentication system based on extended OTP mechanism, Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon, Manpyo Hong, Hongjin Yeh, Jai-Hoon Kim [Citation1].

  2. Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Hyunyi Yi, Siwan Kim, Gunil Ma, Jeong Hyun Yi [Citation8].

  3. Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Ying Liu, Yang Sun Lee, Hong-Ke Zhang, Tin-Yu Wu, Chi-Hsiang Lo [Citation4].

  4. Improved differential fault analysis on PRESENT-80/128, Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong [Citation3].

  5. Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Jung-Hwan Song, Kwanhyung Lee, Hwanjin Lee [Citation6].

  6. Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi [Citation9].

  7. A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Ming-Quan Fan, Pei-Pei Liu, Hong-Xia Wang, Heng-Jian Li [Citation2].

  8. New forward-secure public-key encryption without random oracles, Yang Lu, Jiguo Li [Citation5].

  9. The design of speedy seamless safe messaging mechanism in VANET, Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan [Citation7].

Finally, we would like to thank all authors for their contributions to this special issue. We also extend our thanks to the following external reviewers for their excellent job in reviewing the manuscripts: Al Mahmoud, Aleksandar Kircanski, Carles Padro, Changhoon Lee, Changqiao Xu, Chen-Mou Cheng, Chia-Long Wu, Ching-Yu Yang, Christian Praher, Dawen Xu, Dukjae Moon, Fangguo Zhang, Geong Seng Poh, Haifeng Qian, Hodjat Hamidi, Hsiang-Cheh Huang, Jaeduck Choi, Jason Crampton, Jingsha He, Junfeng Shi, Karim Afshar, Chun-Li Lin, LingLing An, Mahesh V. Tripunitara, Marko Holbl, Minkyung Kim, Min-Shiang Hwang, Mun-Kyu Lee, Nele Mentens, R. Bobba, Sejin Oh, Shijun Xiang, Tsu-Yang Wu, Wei-Chen Wu, Wun-She Yap, Xiaoping Xue, Yong Yu, Yongjin Yeom, Yongquan Cui.

References

  • Y. Ku, O. Choi, K. Kim, T. Shon, M. Hong, H. Yeh, and J.-H. Kim, Two-factor authentication system based on extended OTP mechanism, Int. J. Comput. Math. 90 (12) (2013), pp. 2512–2529.
  • M.-Q. Fan, P.-P. Liu, H.-X. Wang, and H.-J. Li, A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Int. J. Comput. Math. 90 (12) (2013), pp. 2588–2602.
  • K. Jeong, Y. Lee, J. Sung, and S. Hong, Improved differential fault analysis on PRESENT-80/128, Int. J. Comput. Math. 90 (2013), pp. 2553–2563.
  • Y. Liu, Y.S. Lee, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Int. J. Comput. Math. 90 (12) (2013), pp. 2541–2552.
  • Y. Lu and J. Li, New forward-secure public-key encryption without random oracles, Int. J. Comput. Math. 90 (12) (2013), pp. 2603–2613.
  • J. Song, K. Lee, and H. Lee, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Int. J. Comput. Math. 90 (12) (2013), pp. 2564–2580.
  • Y.-Y. Chen, Y.-.J Wang, and J.-K. Jan, The design of speedy seamless safe messaging mechanism in VANET, Int. J. Comput. Math. 90 (2013), pp. 2614–2630.
  • H. Yi, S. Kim, G. Ma, and J.H. Yi, Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Int. J. Comput. Math. 90 (12) (2013), pp. 2530–2540.
  • W.-C. Yau, R.C.-W. Phan, S.-H. Heng, and B.-M. Goi, Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Int. J. Comput. Math. 90 (12) (2013), pp. 2581–2587.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.