2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

2nd International Conference on Networks and Cryptology (NetCrypt)

4-6 December, 2020
Jawaharlal Nehru University, New Delhi

Slider

Call for Paper

Paper Submission

Over the years, the focus of the conference has shifted from raising awareness towards sharing security event histories and discussing solutions and protection strategies. The main objective of this conference is to emphasize the recent technological developments in Network and Cryptology. It will serve as a forum for researchers to present the latest research results on WSN, IoV, IoT, BAN, Fog computing, stream cipher, block cipher, and quantum cryptography. The conference will feature prominent invited speakers as well as papers by top researchers in the field from all over the world. Topics of interest include, but are not limited to, the following topics :

TRACK 1: NETWORKS

  • Wireless Sensor Network
  • Wireless ad hoc Network
  • Internet of Thing
  • Internet of Every Thing
  • Internet of Vehicles
  • Body Area Network
  • Cloud Computing
  • Distributed Computing
  • Fog Computing
  • Mobile Computing
  • Cellular Network
  • Cognitive Network
  • Delay Tolerant Network
  • 4G/5G Networks
  • Satellite Communication
  • Group Communication
  • Radio Frequency Identification (RFID)
  • Neural Network
  • Neurocomputing
  • Big Data for Networks
  • Reliability and Robustness

TRACK 2: CRYPTOLOGY 

  • Cyber-Physical System
  • Cryptographic Algorithms
  • Trust Management
  • Attacks and Defenses
  • Authentication
  • Stream Cipher
  • Block Cipher
  • Key Management
  • Block Chain
  • Bitcoin 
  • Security and Privacy
  • Public Key Infrastructure (PKI)
  • Quantum Cryptography
  • ABE, KDE
  • Cyber Security
  • Web Security
  • Android Security
  • FUZZY LOGIC-based Information Security Systems
  • Vulnerability Assessment
  • Cyber Forensic
  • Secure Techniques using AI
  • Secure Techniques for Big Data
  • Security in  Image and Computer  Vision 
  • Honeypot
  • FOBO, NOMO
  • Secure and privacy-preserving V2X communication in Automotive
  • Security in intelligent mobile App for transport service
  • Secure cloud/edge computing architectures for Automotive
  • Interoperable security for transport service platform
  • Cyber-security detection and prevention in Automotive
  • Critical infrastructures resilience and security in Automotive
  • Secure data management, data processing and analytics in Automotive
  • Location verification in Automotive
  • Secure sensor and RFID applications in Automotive
  • Security life-cycle management of cars
  • Secure over the air update of software
  • Protection of in-car networks

Submission Guidelines

  • The authors may follow the following process for the submission of the manuscript.

    • Visit the website https://www.easychair.org/
    • Create an account by choosing your username and password
    • Check your email account you have submitted on EasyChair
    • Confirm your authentication by clicking on the link provided in the confirmation mail.
    • Log in with your username and password to:

    https://www.easychair.org/

     FORMAT: Click Here