Open Special Issue on Security and Post-Quantum Cryptography

Open Special Issue on Security and Post-Quantum Cryptography


In recent years, a large literature on computational aspects of critical infrastructures security has emerged, much of it focusing on cryptography, cyber, informational and economical security, theory, methods, approaches and algorithms associated with certain classes of such problems. The topic proposed to treat in this special issue goes one jump further in attempting to deal with computational aspects of critical infrastructures security. Such classes of critical infrastructures security problems often arise in engineering, computing and software applications: robotics, Internet of things, different environments control problems, approaches and techniques applied to all types of information and communication technologies, and so forth.

Last but not least, many new applied problems in the area of computational aspects of critical infrastructures security have recently arisen that can be efficiently solved only by new scientific methods, approaches and algorithms. Among them are the informational and economical security problem, creating of encryption algorithms with consideration known attacks analysis problems, symmetric ciphers problems, highly practical and commercial importance of security, safety and protection R&D, and so forth, even if we mention only part of such applications or approaches. Computational aspects of critical infrastructures security models to describe informational and economical processes are also in the running of the most popular new themes in the area of critical infrastructures security.

The primary purpose of the special issue is to discuss these problems with the researchers working in this and in adjacent areas, to discuss of scientific and practical problems of information and economic security of different countries. The people interested in this field are cordially invited to contribute to this volume.
Potential topics include but are not limited to the following:

•    Fundamentals of the Theory of Numbers, Groups, Fields, Rings and Mathematical Methods for Optimizing Calculations
•    Fundamentals of the Theory of Optimal Control and Combinatorial Optimization
•    Standardization, Qualification, and Certification Issues
•    Security Management Practices and Policies
•    Cryptography Security and Protection
•    Cloud Security, Health Care Information Security and Privacy and Cyber Forensics
•    Authentication, Verification, Validation, Identification and Authorization Issues
•    Security Infrastructures and Internet
•    Protection Critical Infrastructure and Manage Cyber Risk

It is our pleasure to invite you to submit your paper for publication in the Special Issue on Computational Aspects of Critical Infrastructures Security at the International Journal of Computing,

The paper has to be submitted in electronic form as a MS Word file. It must begin with a short abstract and keywords. It must end with a brief biography (education, position and scientific interests) and a photo of each author. Complete author’s guidelines are available at The typical paper length is 6-10 pages but it could be extended if necessary.

•    Paper submission deadline         – April 15, 2019
•    Publication date            – June 2019

Papers are published upon acceptance, regardless of the Special Issue publication date.

Lead Guest Editor:
•    Alexandr Kuznetsov, V. N. Karazin Kharkiv National University, Kharkiv, Ukraine

Guest Editors:
•    Robert Brumnik, GEA College, Ljubljana, Slovenia
•    Vyacheslav Kalashnikov, Tecnologico de Monterrey, Monterrey, Nuevo Leon, Mexico
•    Sergii Kavun, Kharkiv University of Technology “STEP”, Kharkiv, Ukraine