Scope

4th International Conference on Cryptography and Blockchain (CRBL 2024)

Topics

Blockchain ,Cryptographic protocols,Cryptography, Cloud Computing ,Blockchain Attacks,Computational Intelligence

Submission System

Authors are invited to submit papers through the Conference Submission System.

Proceedings

Hard copy of the proceedings will be distributed during the Conference.

Welcome to CRBL 2024!

Scope Call for Participation  Program Schedule

4th International Conference on Cryptography and Blockchain (CRBL 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cryptography and Blockchain.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of software engineering formal method advances.



Topics of Interest

  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Blockchain Attacks on Existing Systems
  • Blockchain Consensus Algorithms
  • Blockchain Foundations
  • Blockchain in digital forensic
  • BlockChain issues and trends
  • Blockchain New Design
  • Blockchain Privacy
  • Blockchain Scalability
  • Blockchain Authentication and authorization
  • Blockchain based security for the IoT
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic protocols
  • Cryptography and Coding
  • Data & System Integrity
  • E- Commerce
  • Data Integrity
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • Key management
  • Models for Authentication, Trust and Authorization
  • Privacy and authentication
  • Quantum cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust models and metrics
  • Untraceability

Proceedings

The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series(Confirmed). Hard copy of the proceedings will be distributed during the Conference.

Important Dates

Third Batch : (Submissions after June 01, 2024)

Submission Deadline

Closed

Authors Notification

August 15, 2024

Registration & Camera-Ready Paper Due

August 16, 2024

Speakers



Deepanshu Sharma
NIT Hamirpur
India

Sujay R
PES University
India

Suki Perumal
PES University
India

Yash Nagraj
PES University
India

Robin Thomas
Oliveiot Innovations Pvt Ltd
India

B. Pavan
Jawaharlal Nehru Technological University
India

Hema Durairaj
India

Narendar Kumar Ale
University Of Cumberlands
USA

Naga Satya Praveen Kumar Yadati
USA

Pavan Kurariya
Centre for Development of Advanced Computing
India

Ravisha Rohilla
Indira Gandhi Delhi Technical University For Women
India