International Conference on Cryptography and Network Security ICCNS

Date: 06 Nov 2023 to 07 Nov 2023
Venue: Cape Town, South Africa

The International Research Conference Aims and Objectives

The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.

International Conference on Cryptography and Network Security aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Cryptography and Network Security. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Cryptography and Network Security.

Conference Tags: network security cryptography security

Access control
Applied cryptography
Automated protocols analysis
Biometric security and privacy
Complex systems security
Critical infrastructure protection
Cryptographic primitives and protocols
Data protection
Database and system security
Digital rights management
Email and web security
Identity management
Intellectual property protection
Internet fraud
Intrusion detection and prevention
Key management
Network security protocols
Privacy, anonymity, and untraceability
Privacy-enhancing technology
Protection for the future Internet
Secure mobile agents and mobile code
Security and privacy in cloud and grid systems
Security and privacy in smart grids
Security and privacy in wireless networks
Security and privacy metrics
Security in distributed systems
Security in e-commerce
Security in P2P systems
Security in pervasive/ubiquitous computing
Trust management
Usability and security

For more info see: