Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

14th International Conference on Cryptography and Information Security (CRYPIS 2025)

CRYPIS 2025

Date of beginning

Saturday, 20 September 2025

Duration

2 days

Deadline for abstracts

Saturday, 06 September 2025

City

Copenhagen

Country

Denmark

Contact

crypis@itcse2025.org

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

100

Memo

14th International Conference on Cryptography and Information Security (CRYPIS 2025) September 20 ~ 21, 2025, Copenhagen, Denmark https://itcse2025.org/crypis/index Scope 14th International Conference on Cryptography and Information Security (CRYPIS 2025) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of Cryptography, Coding and Information security. Topics of interest include, but are not limited to, the following Access Control and Intrusion Detection Artificial Immune Systems Authentication Authentication and Non-repudiation Autonomy-Oriented Computing Biological & Evolutionary Computation Biometric Security Coevolutionary Algorithms Computational Intelligence in Security Cryptographic Protocols Cryptography and Coding Data Integrity Fuzzy Systems Identification and Authentication Insider Threats and Countermeasures Intelligent Agents and Systems Intrusion Detection & Prevention Intrusion Detection and Vulnerability Assessment Key Management Models for Authentication, Trust and Authorization Privacy and Authentication Quantum Cryptography Regulation and Trust Mechanisms Reinforcement & Unsupervised Learning Secure Cloud Computing Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security for Grid Computing Security in Distributed Systems Security Information Systems Architecture and Design and Security Patterns Security Management Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust Management Trust Models and Metrics Untraceability Paper Submission Authors are invited to submit papers through the conference Submission System by September 06 2020(Final call). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).   Selected papers from CRYPIS 2025, after further revisions, will be published in the special issue of the following journal. International Journal of Information Technology Convergence and Services (IJITCS) International Journal of Network Security & Its Applications (IJNSA) – WJCI Indexed International Journal on Cryptography And Information Security (IJCIS) International Journal of Security, Privacy and Trust Management (IJSPTM) Information Technology in Industry (ITII) Important Dates Submission Deadline :  Fourth Batch : (Submissions after August 24, 2025) Submission Deadline: September 06 2020(Final call)Authors Notification: September 13, 2025 Registration & camera – Ready Paper Due : September 18, 2025 Contact Us Here’s where you can reach us : This email address is being protected from spambots. You need JavaScript enabled to view it. (or) This email address is being protected from spambots. You need JavaScript enabled to view it.