10th International Conference on Cryptography and Information Security (CRIS 2024)

April 20 ~ 21, 2024, Melbourne, Australia


Hybrid -- Registered authors can present their work online or face to face New

Scope & Topics Call for Participation 


10th International Conference on Cryptography and Information Security (CRIS 2024) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:

Topics of interest include, but are not limited to, the following:

  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological and Evolutionary Computation
  • Biometric Security
  • Blockchain Technology
  • Co-evolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic Protocols
  • Cryptography and Coding
  • Cyber-Physical Systems Security
  • Data and System Integrity
  • Data Integrity
  • E- Commerce
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • IoT Security
  • Key Management
  • Models for Authentication, Trust and Authorization
  • Privacy and Authentication
  • Quantum Cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement and Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design
  • Security Management
  • Security Patterns
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service, Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust Models and Metrics
  • Untraceability
  • Wireless Network Security

Paper Submission

Authors are invited to submit papers through the conference Submission System by Closed .

Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Submit

Important Dates

Card image cap

Second Batch : (Submissions after March 23, 2024)

Submission Deadline : Closed

Authors Notification : April 13, 2024

Registration & Camera-Ready Paper Due : April 15, 2024

Courtesy

Card image cap Card image cap Card image cap

Invited Talk





Supported by

IJCSIT

Proceedings


Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library





Speakers



Jessica Turner
University of Waikato
New Zealand

Kolluri Ayushya Rao
Makers Lab, Tech Mahindra
India

Gihan S. Soliman
The Linnean Society of Mineral Cybernetics
UK

Donata D. Acula
University of Santo Tomas
Philippines

RamonaCavalli
University of Verona
Italy