Welcome to IOTBC 2025

3rd International Conference IOT, Blockchain and Cryptography (IOTBC 2025)

March 28 ~ 29, 2025, Virtual Conference

Program Committee

More Details...



Accepted Papers

More Details...



Virtual Conference




Scope 

3rd International Conference IOT, Blockchain and Cryptography (IOTBC 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT, Blockchain and Cryptography.


Registered authors are now able to present their work through our online platforms

Call for Papers


3rd International Conference IOT, Blockchain and Cryptography (IOTBC 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT, Blockchain and Cryptography.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.


Topics of interest include, but are not limited to, the following


  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Blockchain Attacks on Existing Systems
  • Blockchain Authentication and authorization
  • Blockchain based security for the IoT
  • Blockchain Consensus Algorithms
  • Blockchain Foundations
  • Blockchain in digital forensic
  • Blockchain issues and trends
  • Blockchain New Design
  • Blockchain Privacy
  • Blockchain Scalability
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Connectivity and Networking
  • Cryptographic protocols
  • Cryptography and Coding
  • Data & System Integrity
  • Data Integrity
  • E- Commerce
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • IoT Applications and Services
  • IoT-enabled Innovation and Entrepreneurship
  • Key management
  • Electronics and Signal processing for IoT
  • Experimental Results and Deployment Scenarios
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Models for Authentication, Trust and Authorization
  • Privacy and authentication
  • Quantum cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy for IoT
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust models and metrics

Paper Submission

Authors are invited to submit papers through the conference Submission System by December 21, 2024. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).

Important Dates
Submission Deadline

December 21, 2024

Authors Notification

January 31, 2025

Registration & camera - Ready Paper Due

February 08, 2025

Proceedings

The soft copy of the proceedings will be available on Journal web pages.

The Registration fee is 250 USD for accepted article Authors. Atleast one author of accepted paper is required to register at the full registration rate.

Sponsors