Special Issues
Table of Content

Applied Cryptography and Privacy-Enhancing Technologies for Secure Digital Infrastructures

Submission Deadline: 31 December 2026 View: 30 Submit to Special Issue

Guest Editors

Dr. Sabina Szymoniak

Email: sabina.szymoniak@icis.pcz.pl

Affiliation: Department of Computer Science, Czestochowa University of Technology, Czestochowa, Poland

Homepage:

Research Interests: security protocols, IoT, identity verification


Prof. Mariusz Kubanek

Email: mariusz.kubanek@pcz.pl

Affiliation: Department of Computer Science, Czestochowa University of Technology, Czestochowa, Poland

Homepage:

Research Interests: biometry, pattern recognition, identity verification


Summary

The growing use of digital technologies in everyday life and industry makes data security and privacy protection particularly important. Advances in applied cryptography and privacy-enhancing technologies are now key elements in the development of trusted and resilient information systems.

The aim of this special issue is to present the latest research, solutions, and practices in applied cryptography and privacy-enhancing technologies in modern communication, industrial, and cyber-physical systems. The issue combines theoretical and applied work, focusing on the development of security protocols, authentication, and data protection mechanisms that are efficient, scalable, and user-friendly. Of particular interest are works demonstrating the integration of cryptographic methods with IoT technologies, biometrics, artificial intelligence, and distributed systems. The issue also aims to demonstrate the practical applications of these solutions and their impact on trust, privacy, and security in modern digital infrastructures.

Suggested Themes:
- Cryptography Applied to IoT and Cyber-Physical Systems
- Secure and Lightweight Communication Protocols for Resource-Constrained Environments
- Biometric Authentication and User Privacy Protection
- Identity Verification and Key Management in Distributed Systems
- Analyzing the Resistance of Cryptographic Systems to Modern Attacks
- Integrating Cryptography with Artificial Intelligence Methods
- Formal Models and Verification of Security Protocols


Keywords

applied cryptography, privacy-enhancing technologies, internet of things (IoT) security, biometric authentication, identity verification, cyber-physical systems, secure communication protocols, data protection, lightweight encryption, trust and privacy in distributed systems

Share Link