We accept files in .docx/.doc/.pdf/Latex Pdf format - as per the call for papers schedule.
Papers should be thoroughly checked and proofread before submission. After you have submitted your article you are unable to make any changes to it during the refereeing process—although if accepted, you will have a chance to make minor revisions after refereeing and before the final submission of your paper.
Paper content must be original and relevant to one of the many conference topics.
Authors are required to ensure accuracy of quotations, citations, diagrams, maps, and tables.
Figures and tables need to be placed where they are to appear in the text and must be clear and easy to view.
Papers must follow format according to the template which will be sent to accepted papers.
CryptographyCryptographic Protocols Cryptography and Coding Untraceability Privacy and Authentication Key Management Authentication Trust Management Quantum Cryptography Access control Authentication and authorization Biometrics Cryptocurrencies Cryptology Fingerprinting & Watermarking Hybrid & Asymmetric Key Encryption Security in Peer-to-peer Groups Threshold Cryptography & Multi-Party Multiplication Key Maintenance & Distribution Authentication & Prescribed Techniques Digital Forensics & Security Number Theories & Elliptic Curve Cryptography Traitor Tracing & Transmission Encryption Hashing & Block Ciphers Secrecy in E-Voting Database Security & Privacy and Access Control
BlockchainArtificial Immune Systems Authentication Authentication and Non-repudiation Autonomy-Oriented Computing Biological & Evolutionary Computation Biometric Security Blockchain Attacks on Existing Systems Blockchain Consensus Algorithms Blockchain Foundations Blockchain in digital forensic Blockchain issues and trends Blockchain New Design Blockchain Privacy Blockchain Scalability Blockchain Authentication and authorization Blockchain based security for the IoT