Scopes
Topic 1: Communication Security
Network security
Access control
Information System Security and Management
Social network security, privacy, and trust
Computer Networks and Communication
Signal and image processing
Information security algorithms and protocols
Embedded System Security
Communication engineering
Satellite communication
Cloud and edge computing Security
Blockchain Security and Privacy
Identity Access Management
Cyber Physical System Security
Intellectual property protection, etc
Topic 2: The Internet
Energy saving heterogeneous network
Wireless Sensor Network
Opportunistic network
Cognitive radio network
Network security, etc
Topic 3: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
Key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
Fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information hiding
Electronic Commerce
Data and system integrity
Network security
Access control
Information System Security and Management
Social network security, privacy, and trust
Computer Networks and Communication
Signal and image processing
Information security algorithms and protocols
Embedded System Security
Communication engineering
Satellite communication
Cloud and edge computing Security
Blockchain Security and Privacy
Identity Access Management
Cyber Physical System Security
Intellectual property protection, etc
Topic 2: The Internet
Energy saving heterogeneous network
Wireless Sensor Network
Opportunistic network
Cognitive radio network
Network security, etc
Topic 3: Cryptography
Password Protocol
Encryption and Encoding
Untraceability
Privacy and authentication
Key management
Trust Management
Quantum cryptography
Secure computing intelligence
Artificial immune system
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Collaborative Evolutionary Algorithm
Fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization model
Wireless Network Security
Information hiding
Electronic Commerce
Data and system integrity
Important Dates/重要日期
- Submission Deadline: 2024.12.29
- Registration Deadline: 2024.12.3
- Conference Date: 2025.1.19
- Notification Date: About a week after the submission
Submission Portal/投稿方式
Mail Address: cq_committee@126.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
田老师
- +86-17162865530(微信同号)
- 3766818743
--
- +86---(微信同号)
- --