International Conference on Networks and Cryptology (NetCrypt)

14-16 June, 2019
Jawaharlal Nehru University, New Delhi

International Conference on Networks and Cryptology (NetCrypt)

14-16 June, 2019
Jawaharlal Nehru University, New Delhi

Slider

Call for Paper

Paper Submission

Over the years, the focus of the conference has shifted from raising awareness towards sharing security event histories and discussing solutions and protection strategies. The main objective of this conference is to emphasize the recent technological developments in Network and Cryptology. It will serve as a forum for researchers to present the latest research results on WSN, IoV, IoT, BAN, Fog computing, stream cipher, block cipher, and quantum cryptography. The conference will feature prominent invited speakers as well as papers by top researchers in the field from all over the world. Topics of interest include, but are not limited to, the following topics :

TRACK 1: NETWORKS

  • Wireless Sensor Network
  • Wireless ad hoc Network
  • Internet of Thing
  • Internet of Every Thing
  • Internet of Vehicles
  • Body Area Network
  • Cloud Computing
  • Distributed Computing
  • Fog Computing
  • Mobile Computing
  • Cellular Network
  • Cognitive Network
  • Delay Tolerant Network
  • 4G/5G Networks
  • Satellite Communication
  • Group Communication
  • Radio Frequency Identification (RFID)
  • Neural Network
  • Neurocomputing
  • Big Data for Networks
  • Reliability and Robustness

TRACK 2: CRYPTOLOGY 

  • Cyber-Physical System
  • Cryptographic Algorithms
  • Trust Management
  • Attacks and Defenses
  • Authentication
  • Stream Cipher
  • Block Cipher
  • Key Management
  • Block Chain
  • Bitcoin 
  • Security and Privacy
  • Public Key Infrastructure (PKI)
  • Quantum Cryptography
  • ABE, KDE
  • Cyber Security
  • Web Security
  • Android Security
  • FUZZY LOGIC-based Information Security Systems
  • Vulnerability Assessment
  • Cyber Forensic
  • Secure Techniques using AI
  • Secure Techniques for Big Data
  • Security in  Image and Computer  Vision 
  • Honeypot
  • FOBO, NOMO
  • Secure and privacy-preserving V2X communication in Automotive
  • Security in intelligent mobile App for transport service
  • Secure cloud/edge computing architectures for Automotive
  • Interoperable security for transport service platform
  • Cyber-security detection and prevention in Automotive
  • Critical infrastructures resilience and security in Automotive
  • Secure data management, data processing and analytics in Automotive
  • Location verification in Automotive
  • Secure sensor and RFID applications in Automotive
  • Security life-cycle management of cars
  • Secure over the air update of software
  • Protection of in-car networks

Submission Guidelines

  • Papers should be in English.
  • Regular papers and invited papers are allowed up to 8-10 pages including all figures, tables, and references. Extra pages will incur additional charges decided by the committee.
  • Short and workshop papers should be up to 4 pages.
  • Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
  • The paper submissions must follow the Template
  • Papers are under review. The final result will be updated on 25 May 2019. 

Paper Submission Process

The authors may follow the following process for the submission of the manuscript.

  • Visit the website https://www.easychair.org/
  • Create an account by choosing your username and password
  • Check your email account you have submitted on EasyChair
  • Confirm your authentication by clicking on the link provided in the confirmation mail.
  • Log in with your username and password to:

https://www.easychair.org/

  • Go to my conference link
  • Select NetCrypt2019
  • Select your appropriate track for submission
  • Submit and upload your formatted paper (according to given instruction Author's kit Section.
  • Confirm your submission

Technical Support

Send mail to PUBLICATION Chair on This email address is being protected from spambots. You need JavaScript enabled to view it. for technical support in paper submission.

Authors Guidelines:  images/guidlines.pdf

Template for the Conference  

i) Word Template:  Download

ii) Latex template: Download

Special issue on “Towards Automotive Cybersecurity” of Transactions on Emerging Telecommunications Technologies- Wiley (SCIE, IF-1.61)

Guest Editors: SaruKumari, Hu Xiong, Kuan Zhang, Wanzhong Zhao, Yue Cao

For more Details: https://onlinelibrary.wiley.com/journal/21613915

Special issue on “Distributed Big Data Processing in SCADA Communication Networks” of EURASIP Journal on Wireless Communications and Networking -Springer (SCIE, IF 2.407)

Lead Editor: Dr. Mohamed Elhoseny,  Guest Editors: Xiaohui Yuan, SaruKumari

For more Details: https://jwcn-eurasipjournals.springeropen.com/scada-communication-networks

Special Issue on “Remote sensing for Intelligent Transportation Systems” Journal of Remote Sensing-MDPI (SCIE, IF 3.406)      

Guest Editors: Dr. Mohamed Elhoseny, Dr. K. Shankar

For more Details: https://www.mdpi.com/journal/remotesensing/special_issues/RS_ITS

Special Issue on “Quantum computation for Big Data Processing in Large Scale Applications” of Concurrency and Computation: Practice and Experience- Wiley (SCIE, IF 1.114)

Editors: Dr. Ahmed Farouk, Dr. SaruKumari

For more Details: https://onlinelibrary.wiley.com/journal/15320634