Broucher Download

  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
Cyber Security

How to Apply

How to Apply

The Candidates with eligibility can click the "Nominate /Submit Your Profile (CV) Now" button and fill up the online submission form and Submit it.

This section describes the total Research Awards processes in step by steps:

  1. Received Nomination documents will be sent for the screening process
  2. Acknowledgment intimation via email will be communicated to the Nominee
  3. The team may ask the proof for the credits mentioned in the Resume.
  4. Cross verifying the documents submitted & forwarding them to the Committee.
  5. The selected candidate indicated through email. Also, the selected nominees will be checked anytime on the website to track my submission.
  6. Event and Celebration Registration
  7. Release of the winners list on the official web page
  8. Award presentation ceremony
  9. Release of the Award winners and his profile Report.

Registration

Registration Details

Registration Covers

  • An exclusive web page for a highly rated profile of the award winners will always be available online.
  • Participation in Award event Session and Keynote session.
  • Certificate, Memento, and Photographs.
  • Event Kit, Tea, Coffee & Snacks.
  • Veg & Non-Veg Lunch during the Event.
  • Event and Celebration Registration
  • Release of the winners list on the official web page
  • Award presentation ceremony
  • Release of the Award winners and his profile Report.

Registration Procedure

Click the “Register Now” button on the conference page and enter your Submission ID in the Search Box
Your Submissions will be listed on that page. You can find the Register Now link beside your submission. Click the link and now you will be redirected to the Conference registration form where you can make your registration using credit/debit cards

Session Tracks

Session Tracks

Cryptographic Algorithms and Protocols | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Emerging Technologies (e.g., blockchain, IoT) | Cryptography for Privacy and Anonymity | Post-Quantum Cryptography Cryptography Fundamentals and Principles | Cryptographic Algorithms and Techniques | Cryptography for Cloud Computing and IoT | Cryptography for Blockchain and Distributed Systems | Post-Quantum Cryptography | Cryptographic Hardware and Embedded Systems | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Privacy and Anonymity | Information Hiding and Steganography | Public Key Infrastructure and Key Management | Authentication and Digital Signatures | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training | Cybersecurity Policies and Regulations | Human Factors in Cybersecurity and Cryptography. | Secure Multiparty Computation and Secret Sharing | Digital Signatures and Authentication | Public Key Infrastructure and Key Management | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Cloud Security and Virtualization | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training |Cybersecurity and Cryptography Policies and Regulations | Human Factors in Cybersecurity and Cryptography