

Author: Park James (Jong Hyuk) Zhou Wanlei
Publisher: MDPI
E-ISSN: 1099-4300|18|9|334-334
ISSN: 1099-4300
Source: Entropy, Vol.18, Iss.9, 2016-09, pp. : 334-334
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.
Related content




An Entropy-Based Damage Characterization
By Amiri Mehdi Modarres Mohammad
Entropy, Vol. 16, Iss. 12, 2014-12 ,pp. :


Special Issue: Tsallis Entropy
Entropy, Vol. 14, Iss. 2, 2012-02 ,pp. :




Some Comments on the Entropy-Based Criteria for Piping
By Imre Emöke Nagy Laszlo Lőrincz Janos Rahemi Negar Schanz Tom Singh Vijay P. Fityus Stephen
Entropy, Vol. 17, Iss. 4, 2015-04 ,pp. :