Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026)

IOTBC 2026

Categories

Date of beginning

Sunday, 29 March 2026

Duration

2 days

Deadline for abstracts

Saturday, 14 February 2026

City

Sydney, Australia

Country

Australia

Contact

iotbc@iotbc2026.org

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

100

Memo

4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026) March 30 ~ 31, 2026, Virtual Conference https://iotbc2026.org/index Scope 4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026) is a fully virtual conference (VC) designed to bring together researchers, practitioners, industry professionals, and innovators from around the world. As a virtual event, IOTBC 2026 provides a highly accessible and interactive platform for sharing cutting edge knowledge, discussing emerging trends, and presenting significant advances in the theory, methodology, and applications of the Internet of Things (IoT), Blockchain technologies, and Cryptography. IOTBC 2026 welcomes contributions that explore foundational concepts, propose novel algorithms and architectures, demonstrate real world deployments, or present interdisciplinary research that connects IoT, Blockchain, Cryptography, Artificial Intelligence, and modern cybersecurity.Authors are invited to submit high quality research papers, survey articles, project reports, and industrial case studies that illustrate innovative results and practical experiences. Topics of interest   Machine Learning Theory and Foundations Deep Learning Architectures and Methods SelfSupervised, Unsupervised, and Semi Supervised Learning Transfer Learning, Meta Learning, and Continual Learning Reinforcement Learning and Decision Making ProbabilisticModeling and Statistical Inference Optimization Methods for AI and ML Large Language Models (LLMs) and Foundation Models Multimodal Learning and Vision Language Models Generative AI for Text, Image, Audio, and Video RetrievalAugmented Generation (RAG) and Knowledge Enhanced Models Efficient AI: Model Compression, Distillation, and Acceleration Trustworthy, Robust, and Secure AI Adversarial Machine Learning and Model Hardening Explainable and Interpretable AI (XAI) AI Alignment, AI Safety, and Responsible AI Human AI Interaction and Human in the Loop Systems Neurosymbolic AI and Hybrid Intelligence Causal Inference and Causal Representation Learning Knowledge Graphs, Reasoning, and Automated Planning Program Synthesis, Code Intelligence, and AI for Software Security Federated Learning and Privacy Preserving AI Differential Privacy, Secure Multi Party Computation, and Homomorphic Encryption Cryptography, Cryptographic Protocols, and Post Quantum Security Authentication, Identification, and Access Control Key Management, Trust Models, and Reputation Systems Data Integrity, System Integrity, and Secure Data Management Intrusion Detection, Prevention, and Threat Intelligence Malware Analysis, Vulnerability Assessment, and Insider Threat Detection Security Engineering, Secure Software Development, and DevSecOps Security Requirements, Threat Modeling, and Risk Analysis Security Architecture, Design Patterns, and Deployment Network Security, Secure Connectivity, and QoS Aware Security Security in Distributed Systems, Cloud, Edge, and Fog Computing Security and Privacy in IoT and Cyber Physical Systems Security and Privacy in Mobile, Ubiquitous, and Web Based Systems Sensor Networks and Mobile Ad Hoc Network Security Blockchain Foundations, Consensus, and Scalability Blockchain Security, Privacy, and Attack Analysis Blockchain for IoT, Cloud, Identity, and Digital Forensics Smart Contracts, Decentralized Applications, and Secure Ledger Design Computational Intelligence for Security and Anomaly Detection Bio Inspired and Evolutionary Computation for Security Autonomous Agents and Multi Agent Security Systems Robotics, Embodied AI, and Autonomous System Security AI for Cyber Physical Infrastructure Protection AI for Healthcare, Bioinformatics, and Medical Security AI for Climate, Sustainability, and Critical Infrastructure Cybersecurity Governance, Regulation, and Trust Mechanisms Secure E Commerce, Digital Transactions, and Financial AI Experimental Security Testbeds, Benchmarks, and Real World Deployments   Paper Submission Authors are invited to submit papers through the conference Submission System byFebruary 14, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of nde conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed). Selected papers from IOTBC 2026, after further revisions, will be published in the special issue of the following journals International Journal of Game Theory and Technology (IJGTT) International Journal on Cryptography and Information Security (IJCIS)The International Journal of Security, Privacy and Trust Management (IJSPTM ) International Journal of Ubiquitous Computing (IJU) International Journal of Ambient Systems and Applications (IJASA) Important Dates Third Batch : Submissions after January 31, 2026 Submission Deadline : February 14, 2026   Authors Notification : March 10, 2026 Registration & Camera-Ready Paper Due : March 17, 2026 Contact Us Here’s where you can reach us : This email address is being protected from spambots. You need JavaScript enabled to view it. or This email address is being protected from spambots. You need JavaScript enabled to view it.