Scopes
(The following topics include but are not limited to)
Topic 1: Quantum Computing
Quantum Algorithm and Complexity Theory
Quantum Computing Model and Architecture
Comparison between Quantum Paradigm and Classical Computing
Quantum devices and quantum bits
Quantum Error Correction and Fault Tolerant Computing
Topic 2: Network Security
Cloud Security
network security
information leakage
Information theft
Data tampering
Data Delete
computer virus
wireless security
Distributed System
database security
Computer forensics
Security scheme design
application security
Intrusion Prevention System
Mobile device security
quantum communication network
computer architecture
Introduction to Computer Security
Coding Theory and Applications
Application of Password Technology
distributed denial of service
Topic 3: Cryptography
Password protocol, encryption, and encoding
Privacy and authentication
Key management, trust management
cryptography
Secure computing intelligence, artificial immune systems, biological and evolutionary computing, intelligent agents and systems
Autonomous computing and collaborative evolutionary algorithms
Fuzzy systems, biometric security
Regulatory and trust mechanisms, data integrity
Trust and Authorization Model, Wireless Network Security
Information hiding, data and system integrity
Topic 1: Quantum Computing
Quantum Algorithm and Complexity Theory
Quantum Computing Model and Architecture
Comparison between Quantum Paradigm and Classical Computing
Quantum devices and quantum bits
Quantum Error Correction and Fault Tolerant Computing
Topic 2: Network Security
Cloud Security
network security
information leakage
Information theft
Data tampering
Data Delete
computer virus
wireless security
Distributed System
database security
Computer forensics
Security scheme design
application security
Intrusion Prevention System
Mobile device security
quantum communication network
computer architecture
Introduction to Computer Security
Coding Theory and Applications
Application of Password Technology
distributed denial of service
Topic 3: Cryptography
Password protocol, encryption, and encoding
Privacy and authentication
Key management, trust management
cryptography
Secure computing intelligence, artificial immune systems, biological and evolutionary computing, intelligent agents and systems
Autonomous computing and collaborative evolutionary algorithms
Fuzzy systems, biometric security
Regulatory and trust mechanisms, data integrity
Trust and Authorization Model, Wireless Network Security
Information hiding, data and system integrity
Important Dates | 重要日期
- Submission Deadline: 2025.12.5
- Registration Deadline: 2025.12.10
- Conference Date: 2025.12.20
- Notification Date: About a week after the submission
Submission Portal | 投稿方式
Mail Address: confer_acad@163.com
If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:
墨老师
15680957221
2580953988
--
--
--
Indexing Service | 索引服务
Follow Us | 联系我们
墨老师
--
