Scopes
(Topics include but are not limited to)
cryptographic protocol
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information Hiding
e-commerce
Data and system integrity
Data Protection and Privacy
Information Security
network security
Big data security
Artificial Intelligence and Data Security
data mining
Symmetric and Asymmetric Encryption Algorithms
Lightweight encryption algorithm
Homomorphic encryption
Data Encryption Standards and Protocols
Hash functions and digital signatures
Data integrity verification mechanism
Secure data transmission
data encryption
5G communication technology
mobile communication
Wireless Technology
Wireless Data
IP and Broadband Network Technology
Microwave
Optoelectronics and Optical Communication
Signal and Information Processing
quantum information technology
Aerospace Communication Technology
geographic information science
Digital signal processing for communication systems
wireless communication system
Satellite Measurement, Control and Communication Technology
Satellite Mobile Communication Technology
data communication
information network
Mobile Internet and Terminal
RF technology
satellite communication
mobile communication
cryptographic protocol
Encryption and encoding
untraceability
Privacy and authentication
Key Management
Trust Management
cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
coevolutionary algorithm
fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information Hiding
e-commerce
Data and system integrity
Data Protection and Privacy
Information Security
network security
Big data security
Artificial Intelligence and Data Security
data mining
Symmetric and Asymmetric Encryption Algorithms
Lightweight encryption algorithm
Homomorphic encryption
Data Encryption Standards and Protocols
Hash functions and digital signatures
Data integrity verification mechanism
Secure data transmission
data encryption
5G communication technology
mobile communication
Wireless Technology
Wireless Data
IP and Broadband Network Technology
Microwave
Optoelectronics and Optical Communication
Signal and Information Processing
quantum information technology
Aerospace Communication Technology
geographic information science
Digital signal processing for communication systems
wireless communication system
Satellite Measurement, Control and Communication Technology
Satellite Mobile Communication Technology
data communication
information network
Mobile Internet and Terminal
RF technology
satellite communication
mobile communication
Important Dates/重要日期
- Submission Deadline: 2025.5.18
- Registration Deadline: 2025.5.23
- Conference Date: 2025.6.7
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: ei_syqzzy@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
张老师
+86-17162863232(微信同号)
3771563441
--
+86---(微信同号)
--