Welcome to IOTBC 2023

2nd International Conference IOT, Blockchain and Cryptography (IOTBC 2024)

March 09 ~ 10, 2024, Virtual Conference

Program Committee

More Details...



Accepted Papers

More Details...



Virtual Conference




Scope Call for ParticipationProgram Schedule

2nd International Conference IOT, Blockchain and Cryptography (IOTBC 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT, Blockchain and Cryptography.

technical img

Registered authors are now able to present their work through our online platforms

Call for Papers


2nd International Conference IOT, Blockchain and Cryptography (IOTBC 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT, Blockchain and Cryptography.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.


Topics of interest include, but are not limited to, the following


  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Blockchain Attacks on Existing Systems
  • Blockchain Authentication and authorization
  • Blockchain based security for the IoT
  • Blockchain Consensus Algorithms
  • Blockchain Foundations
  • Blockchain in digital forensic
  • Blockchain issues and trends
  • Blockchain New Design
  • Blockchain Privacy
  • Blockchain Scalability
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Connectivity and Networking
  • Cryptographic protocols
  • Cryptography and Coding
  • Data & System Integrity
  • Data Integrity
  • E- Commerce
  • Electronics and Signal processing for IoT
  • Experimental Results and Deployment Scenarios
  • Fuzzy Systems
  • Identification and Authenticatio
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • IoT Applications and Services
  • IoT-enabled Innovation and Entrepreneurship
  • Key management
  • Models for Authentication, Trust and Authorization
  • Privacy and authentication
  • Quantum cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy for IoT
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust models and metrics

Paper Submission

Authors are invited to submit papers through the conference Submission System by Closed. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).

Important Dates

Third Batch : (Submissions after January 29, 2024)


Submission Deadline

Closed

Authors Notification

March 07, 2024

Registration & camera - Ready Paper Due

March 08, 2024

Proceedings

The soft copy of the proceedings will be available on Journal web pages.

The Registration fee is 250 USD for accepted article Authors. Atleast one author of accepted paper is required to register at the full registration rate.

Speakers


Abdulelah Alkesaiberi
King Abdul Aziz University
Saudi Arabia

James W Snyder Jr
Adobe Inc
USA

Amanda Phaladi
University of Limpopo
South Africa

Datonye B. Omunguye-George
Northwood University
USA

Masoud Eshaghinasrabadi
California State University
Northridge

Omosalewa Itauma
MyMichigan Medical Center
USA

Indranil Ghosh Ray
Queen’s University Belfast
United Kingdom

Lu Wang
Nanjing University of Aeronautics and Astronautics
China

Sponsors