Scopes
Topic 1: Cryptography
Cryptographic protocol
Encryption and encoding
Untraceability
Privacy and authentication
Key Management
Trust Management
Cryptography
Secure computing intelligence
Artificial Immune System
Biology and Evolutionary Computing
Intelligent agents and systems
Reinforcement and Unsupervised Learning
Autonomous Computing
Coevolutionary algorithm
Fuzzy system
Biometric Security
Trust Model and Metrics
Regulatory and trust mechanisms
Data integrity
Identity verification
Trust and Authorization Model
Wireless Network Security
Information Hiding
Data and system integrity, etc
Topic 2: Cybersecurity
Malicious software and botnets
Communication privacy and anonymity
Distributed denial of service
Public key infrastructure
Key Management
Credentials
Cybersecurity
Routing
Naming/Addressing
Network management
Security and Privacy in Ubiquitous Computing
Security and Privacy of Emerging Technologies: VoIP
Point to point and overlay network systems
Information leakage
Data tampering
Data deletion
Computer virus
Security vulnerability
Attack monitoring
Encrypted communication
Information dissemination security
Network Isolation
Application security
Email Security
Anti virus and anti malware software
Network Partitioning
Application security
Behavioral Analysis
Cloud security
Intrusion Prevention System
Mobile device security
Security Information and Event Management
Wireless security, etc
Topic 3: Privacy Protection
Privacy technologies and mechanisms
Protocol security
Secure information flow
Security and Privacy of the Internet of Things
Security and Privacy Metrics
Security and Privacy Policy
Security architecture
Available security and privacy
The Theory and Foundation of Privacy Computing
Programming languages and compilers for privacy computing
Privacy computing model
Privacy quantification, formal description
Privacy Information Engineering, Providers, Collectors, and Users
Privacy Operations and Modeling
Data utility and privacy loss
Context adaptive cryptography for privacy protection
Information hiding and sharing based on privacy protection
Privacy Control and Protection for Data Analysis
Privacy awareness information collection
Privacy awareness and distribution
Comprehensive privacy protection
Privacy Protection Data Release
Private information storage
Integration and synergy of the private sector
Private information exchange and sharing
Privacy inference and inference
Cloud Privacy
Privacy in Online Social Networks
Privacy in the Internet of Things and Industrial Internet
Privacy and Artificial Intelligence
Privacy and Blockchain
Legal issues in privacy computing and other interdisciplinary topics
Important Dates/重要日期
  • Submission Deadline: 2025.10.17
  • Registration Deadline: 2025.10.24
  • Conference Date: 2025.11.6
  • Notification Date: About a week after the submission
Submission Portal/投稿方式

Mail Address:  cq_committee@126.com

If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:

田老师
  • +86-17162865530(微信同号)
  • 3766818743
--
  • +86---(微信同号)
  • --