Description

The third International Conference on Codes, Cryptology and Information Security (C2SI-2019) is organized in honor of Professor Said El Hajji. This conference aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research.

Call for paper

Important Dates

Draft paper submission deadline:2018-11-30

Draft paper acceptance notification:2019-01-20

Final paper submission deadline:2019-02-15

Author guidelines

Submission to C2SI-2019 must be original and not substantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings.
      Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. All submissions will be blind-refereed. All papers must be written in English, complete, intelligible and self-contained within at most 20 pages in Springer's Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography.
      Information about the Springer LNCS format can be found at http://www.springer.de/comp/lncs/authors.html . LNCS Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings.
      Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references.
      All submissions must be processed with LaTeX and follow Springer's LNCS format without changing default margins, fonts, fonts size, line spacing etc. Submissions not meeting these guidelines may be rejected without consideration of their merits.
       Papers must be submitted electronically in PDF format via easychair At least one author of each accepted paper is required to register with the conference and present the paper. Papers which are not registred will not be included in the Proceeding. All accepted and registred papers will be published in the series LNCS like in C2SI-2015 and C2SI-2017. Proceedings will be available at the conference. Note that any submission to C2SI 2019 implies the full acknowledgment and commitment of the authors to the entire review process.

Topics of submission

Areas of interest include, but are not limited to:

  • Access Control Models
  • Applied Cryptography
  • Attacks & Malicious Code
  • Authentication, Identification
  • Block & Stream Ciphers
  • Blockchain Security and Privacy
  • Boolean Functions Code-based Cryptography
  • Coding theory
  • Cryptanalysis
  • Cryptographic Algorithms and Primitives Cryptographic Protocols
  • Data Protection
  • Denial of Service Protection
  • Elliptic-curve cryptography
  • Embedded System Security
  • Error correcting codes
  • Fingerprinting
  • Formal Methods for Security
  • Hash Functions Identity and Security in IoT
  • Identity-based encryption (IBE)
  • Information Hiding Information theory
  • Intrusion Detection & Prevention
  • Language-Based Security
  • Lattice-Based Cryptography
  • Malware Analysis and Detection
  • Mobile Agents Security
  • Mobile Security
  • Multivariate cryptography
  • Network Security
  • Post-Quantum cryptography
  • Public Key Cryptography
  • Quantum Cryptology
  • Random and pseudorandom generators
  • RFID security
  • Secure Distributed Computing
  • Security and Privacy for Big Data
  • Security and Privacy in the Cloud
  • Security Architectures
  • Security in Grid Computing
  • Security in Social Networks
  • Security in the Internet of Things
  • Security Models
  • Security Policies
  • Sensor Network
  • Security Side channel attacks
  • Signature, Integrity Smart cards
  • Security Steganography
  • Watermarking Wireless and Mobile Security

Message

Leave a message

Refresh

Contact information

  • contact@c2si-conference.org

Sponsored By

  • Mohammed V University