Brouchure download
Call for paper
Call for paper
International Cybersecurity conference Original Articles/papers are invited from Industry Persons, Scientist, Academician, Research Scholars, P.G. & U.G. Students for presentation in our International Conference. All articles/papers must be in MS-Word (.doc or .docx) format, including the title, author's name, an affiliation of all authors, e-mail, abstract, keywords, Conclusion, Acknowledgment, and References.
Submit Abstract
The Candidates with eligibility can click the "Submit Paper/Abstract Now" button and fill up the online submission form and Submit it.
Abstract/Full Paper submission
Final/Full Paper submission is optional: If you don't want your abstract/full paper to be published in the Conference Abstracts & Proceedings CD (with ISBN number) and only want to present it at the conference, it is acceptable.
Page limit: There is a limit of 6-8 pages for a final/full paper. An additional page is chargeable.
Paper language: Final/Full papers should be in English.
Templates: "Final paper template," "Final abstract template"
All the final papers should be uploaded to the website online system according to "the final paper template" as word doc. or docx since this will be the camera-ready published version. Please note that final papers that are not uploaded to the online System as a word doc./docx after the opening of final paper submissions according to the template above will not be published in the CONFERENCE Abstracts & Proceedings CD (with ISBN number)
Journal Publication
Journal Publication
All accepted papers will be included in the conference proceedings, which will be published in one of the author's prescribed ScienceFather journals.
Subject Tracks
Subject Tracks
Cryptographic Algorithms and Protocols | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Emerging Technologies (e.g., blockchain, IoT) | Cryptography for Privacy and Anonymity | Post-Quantum Cryptography Cryptography Fundamentals and Principles | Cryptographic Algorithms and Techniques | Cryptography for Cloud Computing and IoT | Cryptography for Blockchain and Distributed Systems | Post-Quantum Cryptography | Cryptographic Hardware and Embedded Systems | Cryptographic Implementations and Side-Channel Attacks | Cryptography for Privacy and Anonymity | Information Hiding and Steganography | Public Key Infrastructure and Key Management | Authentication and Digital Signatures | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training | Cybersecurity Policies and Regulations | Human Factors in Cybersecurity and Cryptography. | Secure Multiparty Computation and Secret Sharing | Digital Signatures and Authentication | Public Key Infrastructure and Key Management | Cyber Threat Intelligence and Analysis | Cybersecurity Risk Management and Governance | Cybersecurity for Critical Infrastructure and Industrial Control Systems | Cloud Security and Virtualization | Malware Analysis and Detection | Intrusion Detection and Prevention | Incident Response and Digital Forensics | Cybersecurity Education and Training |Cybersecurity and Cryptography Policies and Regulations | Human Factors in Cybersecurity and Cryptography