Special Issues
Table of Content

Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence

Submission Deadline: 31 December 2025 View: 3196 Submit to Special Issue

Guest Editors

Dr. Muhammad Shahbaz Khan

Email: muhammadshahbaz.khan@napier.ac.uk

Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, UK

Homepage:

Research Interests: poost-quantum cryptography, applied cryptography, image encryption, and privacy & trust


Dr. Baraq Ghaleb

Email: b.ghaleb@napier.ac.uk

Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, UK

Homepage:

Research Interests: cyber security, internet of things (IoT), blockchain, machine learning, routing protocols


Summary

The progress in quantum computing is an imminent threat to traditional cryptographic systems, making them vulnerable to novel quantum-enabled attacks. In response, researchers and practitioners are actively developing cryptographic methods and security solutions designed to withstand these emerging threats. In addition, innovative approaches combining chaos theory and intelligent threat detection are transforming how we detect and respond to cyber threats. These advancements are rapidly reshaping the modern cybersecurity landscape requiring immediate attention.


This Special Issue aims to gather cutting-edge research in post-quantum cryptography, chaotic encryption, and advanced intrusion detection methodologies. Submissions that propose novel algorithms, theoretical advancements, and robust practical implementations within these security domains are invited. Research exploring emerging security applications, comprehensive performance evaluations, and interdisciplinary perspectives that enhance real-world applicability and effectiveness of security solutions for future computing are especially encouraged.


Suggested themes:
- Design and analysis of Post-Quantum Cryptographic Algorithms and Security Frameworks
- Advanced Chaotic Encryption Methods, design of chaotic maps, and secure key generation.
- Hybrid cryptographic schemes combining classical and post-quantum approaches
- Lattice-Based, Code-Based, and Hash-Based Security Mechanisms
- Intelligent intrusion detection systems to strengthen the security and resilience of computing systems in modern applications
- Decentralized trust models, and privacy-preserving techniques in the post-quantum era
- Machine learning models for predictive threat analysis
- Quantum-resilient key management and exchange mechanisms
- Hardware/software acceleration, side-channel attack mitigation, and integration in existing infrastructures
- Benchmarking of cryptographic primitives; evaluating overheads in large-scale systems and proposing optimization strategies


Keywords

Post-Quantum Cryptography, Multimedia Encryption, Quantum Computing, Information Security, Image Encryption, Privacy and Security, Secure Computing, Chaotic Encryption, Intrusion Detection, Threat Defence

Published Papers


  • Open Access

    ARTICLE

    Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things

    Chia-Hui Liu
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2025.072887
    (This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
    Abstract The Industrial Internet of Things (IIoT) has emerged as a cornerstone of Industry 4.0, enabling large-scale automation and data-driven decision-making across factories, supply chains, and critical infrastructures. However, the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping, data tampering, and device impersonation. While digital signatures are indispensable for ensuring authenticity and non-repudiation, conventional schemes such as RSA and ECC are vulnerable to quantum algorithms, jeopardizing long-term trust in IIoT deployments. This study proposes a lightweight, stateless, hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT. The… More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078
    (This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

Share Link