F 11th International Conference on Cryptography and Information Security (CRIS 2025) </b>
Welcome to CRIS 2025

11th International Conference on Cryptography and Information Security (CRIS 2025)

April 26 ~ 27, 2025, Copenhagen, Denmark

Hybrid--Registered authors can present their work online or face to face New

Program Committee

More Details...



Accepted Papers

More Details...



Copenhagen, Denmark

More Details...



Scope

11th International Conference on Cryptography and Information Security (CRIS 2025) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:


Call for Papers


11th International Conference on Cryptography and Information Security (CRIS 2025) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Topics of interest include, but are not limited to, the following


  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological and Evolutionary Computation
  • Biometric Security
  • Blockchain Technology
  • Co-evolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic Protocols
  • Cryptography and Coding
  • Cyber-Physical Systems Security
  • Data and System Integrity
  • Data Integrity
  • E- Commerce
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • IoT Security
  • Key Management
  • Models for Authentication, Trust and Authorizatio
  • Privacy and Authentication
  • Quantum Cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement and Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design
  • Security Management
  • Security Patterns
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service, Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust Models and Metrics
  • Untraceability
  • Wireless Network Security

Paper Submission

Authors are invited to submit papers through the conference Submission System by January 04, 2025. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Important Dates

Submission Deadline

January 04, 2025

Authors Notification

February 21, 2025

Registration & camera - Ready Paper Due

February 28, 2025

Proceedings

Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library

Sponsors