Description

2nd International Conference on Cryptography and Blockchain (CRBL 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cryptography and Blockchain.

Call For Papers

2nd International Conference on Cryptography and Blockchain (CRBL 2022)

October 22 ~ 23, 2022, Sydney, Australia

https://comit2022.org/crbl/index

Scope & Topics

2nd International Conference on Cryptography and Blockchain (CRBL 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cryptography and Blockchain.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Topics of interest include, but are not limited to, the following:

  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Blockchain Attacks on Existing Systems
  • Blockchain Consensus Algorithms
  • Blockchain Foundations
  • Blockchain in digital forensic
  • BlockChain issues and trends
  • Blockchain New Design
  • Blockchain Privacy
  • Blockchain Scalability
  • BlockchainAuthentication and authorization
  • Blockchainbased security for the IoT
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic protocols
  • Cryptography and Coding
  • Data & System Integrity
  • E- Commerce
  • Data Integrity
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • Key management
  • Models for Authentication, Trust and Authorization
  • Privacy and authentication
  • Quantum cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust models and metrics
  • Untraceability

Paper Submission:

Authors are invited to submit papers through the conference Submission System by September 24, 2022. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CRBL 2022, after further revisions, will be published in the special issues of the following journals

  • International Journal of Computer Networks & Communications (IJCNC)– Scopus, ERA, WJCI Indexed
  • International Journal On Cryptography And Information Security (IJCIS)
  • International Journal of Security, Privacy and Trust Management (IJSPTM)
  • International Journal of Network Security & Its Applications (IJNSA) – ERA, WJCI Indexed
  • Information Technology in Industry (ITII)

Important Dates

Third Batch : (Submissions after September 17, 2022)

  • Submission Deadline : September 24, 2022
  • Authors Notification : October 15, 2022
  • Registration & Camera-Ready Paper Due : October 18, 2022

Contact Us

Here’s where you can reach us : crbl@comit2022.org or crblconf@yahoo.com