SlideShare a Scribd company logo
International Conference on Cryptography and Blockchain (CRBL 2021)
October 29 ~ 30, 2021, Vienna, Austria
https://comit2021.org/crbl/index
SCOPE
International Conference on Cryptography and Blockchain (CRBL 2021) will act as a major
forum for the presentation of innovative ideas, approaches, developments, and research projects
in the areas of Cryptography and Blockchain. It will also serve to facilitate the exchange of
information between researchers and industry professionals to discuss the latest issues and
advancement in the area of Cryptography and Blockchain.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO THE FOLLOWING
 Access Control and Intrusion Detection
 Artificial Immune Systems
 Authentication
 Authentication and Non-repudiation
 Autonomy-Oriented Computing
 Biological & Evolutionary Computation
 Biometric Security
 Blockchain Attacks on Existing Systems
 Blockchain Consensus Algorithms
 Blockchain Foundations
 Blockchain in digital forensic
 BlockChain issues and trends
 Blockchain New Design
 Blockchain Privacy
 Blockchain Scalability
 Blockchain Authentication and authorization
 Blockchain based security for the IoT
 Coevolutionary Algorithms
 Computational Intelligence in Security
 Cryptographic protocols
 Cryptography and Coding
 Data & System Integrity
 E- Commerce
 Data Integrity
 Fuzzy Systems
 Identification and Authentication
 Information Hiding
 Insider Threats and Countermeasures
 Intelligent Agents and Systems
 Intrusion Detection & Prevention
 Intrusion Detection and Vulnerability Assessment
 Key management
 Models for Authentication, Trust and Authorization
 Privacy and authentication
 Quantum cryptography
 Regulation and Trust Mechanisms
 Reinforcement & Unsupervised Learning
 Secure Cloud Computing
 Security and Privacy in Mobile Systems
 Security and Privacy in Pervasive/Ubiquitous Computing
 Security and Privacy in Web Services
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering
 Security for Grid Computing
 Security in Distributed Systems
 Security Information Systems Architecture and Design and Security Patterns
 Security Management
 Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
 Sensor and Mobile Ad Hoc Network Security
 Service and Systems Design and QoS Network Security
 Software Security
 Trust Management
 Trust models and metrics
 Untraceability
PAPER SUBMISSION
Authors are invited to submit papers through the conference Submission System by September
25, 2021. Submissions must be original and should not have been published previously or be
under consideration for publication while being evaluated for this conference. The proceedings
of the conference will be published by Computer Science Conference Proceedings in Computer
Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from CRBL 2021, after further revisions, will be published in the special issue
of the following journal.
 International Journal of Computer Networks & Communications (IJCNC) - Scopus Indexed,
ERA Indexed
 International Journal On Cryptography And Information Security (IJCIS)
 International Journal of Security, Privacy and Trust Management (IJSPTM)
 International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
 Information Technology in Industry (ITII)New
- ESCI(WOS) Indexed
IMPORTANT DATES
Second Batch : (Submissions after September 06, 2021)
 Submission Deadline : September 25, 2021
 Authors Notification : October 18, 2021
 Registration & Camera-Ready Paper Due : October 21, 2021
CONTACT US
Here's where you can reach us : crbl@comit2021.org or crblconf@yahoo.com
Submission system: https://comit2021.org/submission/index.php

More Related Content

What's hot

Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
ijcisjournal
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
ijseajournal
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
IJNSA Journal
 
2nd International Conference on Networks, Blockchain and Internet of Things (...
2nd International Conference on Networks, Blockchain and Internet of Things (...2nd International Conference on Networks, Blockchain and Internet of Things (...
2nd International Conference on Networks, Blockchain and Internet of Things (...
pijans
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
IJNSA Journal
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
ijasuc
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
ijujournal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
MiajackB
 
Call for papers - 2nd International Conference on Networks, Blockchain and In...
Call for papers - 2nd International Conference on Networks, Blockchain and In...Call for papers - 2nd International Conference on Networks, Blockchain and In...
Call for papers - 2nd International Conference on Networks, Blockchain and In...
ijassn
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Nexgen Technology
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
ijcga
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
pijans
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
ijfcst journal
 
2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)
pijans
 

What's hot (19)

Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...Call for Paper - 9th International Conference of Security, Privacy and Trust ...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
 
2nd International Conference on Networks, Blockchain and Internet of Things (...
2nd International Conference on Networks, Blockchain and Internet of Things (...2nd International Conference on Networks, Blockchain and Internet of Things (...
2nd International Conference on Networks, Blockchain and Internet of Things (...
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
2 nd International Conference on IoT, Blockchain & Cloud Computing (IBCOM 2021)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Call for papers - 2nd International Conference on Networks, Blockchain and In...
Call for papers - 2nd International Conference on Networks, Blockchain and In...Call for papers - 2nd International Conference on Networks, Blockchain and In...
Call for papers - 2nd International Conference on Networks, Blockchain and In...
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)
 

Similar to International Conference on Cryptography and Blockchain (CRBL 2021)

International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
ijasuc
 
Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...
ijgca
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
ijistjournal
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
IJNSA Journal
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
ijait
 
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
ijmnct
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
IJNSA Journal
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
mlaij
 
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
ijgca
 
Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...
ijistjournal
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
ijistjournal
 
Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...
ijasuc
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
ijgca
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
ijgca
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023) International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
mlaij
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
ijujournal
 
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
dannyijwest
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
ClaraZara1
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
ijistjournal
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
IJNSA Journal
 

Similar to International Conference on Cryptography and Blockchain (CRBL 2021) (20)

International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
International Conference on Cryptography and Blockchain (CRBL 2021) will act ...
 
Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...Call for Papers - 9th International Conference on Cryptography and Informatio...
Call for Papers - 9th International Conference on Cryptography and Informatio...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
 
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
Call for Paper - International Conference IOT, Blockchain and Cryptography (I...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
 
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
Call for Paper- International Conference IOT, Blockchain and Cryptography (IO...
 
Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...Submit Your Research Articles - International Conference IOT, Blockchain and ...
Submit Your Research Articles - International Conference IOT, Blockchain and ...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023) International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
 
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
International Conference IOT, Blockchain and Cryptography (IOTBC 2023)
 
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
SUBMIT YOUR RESEARCH PAPER - International Conference IOT, Blockchain and Cry...
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...Call for Papers - International Conference IOT, Blockchain and Cryptography (...
Call for Papers - International Conference IOT, Blockchain and Cryptography (...
 

More from ijujournal

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
ijujournal
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
ijujournal
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ijujournal
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
ijujournal
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
ijujournal
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ijujournal
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
ijujournal
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
ijujournal
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
ijujournal
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
ijujournal
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
ijujournal
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
ijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
ijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
ijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
ijujournal
 

More from ijujournal (20)

Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
Users Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase IIUsers Approach on Providing Feedback for Smart Home Devices – Phase II
Users Approach on Providing Feedback for Smart Home Devices – Phase II
 
October 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdfOctober 2023-Top Cited Articles in IJU.pdf
October 2023-Top Cited Articles in IJU.pdf
 
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERS
 
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID dataA novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIES
 
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEHMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCE
 
SERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISONSERVICE DISCOVERY – A SURVEY AND COMPARISON
SERVICE DISCOVERY – A SURVEY AND COMPARISON
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...
 
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion MiningA proposed Novel Approach for Sentiment Analysis and Opinion Mining
A proposed Novel Approach for Sentiment Analysis and Opinion Mining
 
International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)International Journal of Ubiquitous Computing (IJU)
International Journal of Ubiquitous Computing (IJU)
 
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
PERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLSPERFORMANCE COMPARISON OF OCR TOOLS
PERFORMANCE COMPARISON OF OCR TOOLS
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 

Recently uploaded

ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf
devtomar25
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
amrita chaturvedi
 
Operational amplifiers and oscillators notes
Operational amplifiers and oscillators notesOperational amplifiers and oscillators notes
Operational amplifiers and oscillators notes
ShachiPGowda
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Introduction to verilog basic modeling .ppt
Introduction to verilog basic modeling   .pptIntroduction to verilog basic modeling   .ppt
Introduction to verilog basic modeling .ppt
AmitKumar730022
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 

Recently uploaded (20)

ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf5g-5G SA reg. -standalone-access-registration.pdf
5g-5G SA reg. -standalone-access-registration.pdf
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Bayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptxBayesian Decision Theory details ML.pptx
Bayesian Decision Theory details ML.pptx
 
Operational amplifiers and oscillators notes
Operational amplifiers and oscillators notesOperational amplifiers and oscillators notes
Operational amplifiers and oscillators notes
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Introduction to verilog basic modeling .ppt
Introduction to verilog basic modeling   .pptIntroduction to verilog basic modeling   .ppt
Introduction to verilog basic modeling .ppt
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 

International Conference on Cryptography and Blockchain (CRBL 2021)

  • 1. International Conference on Cryptography and Blockchain (CRBL 2021) October 29 ~ 30, 2021, Vienna, Austria https://comit2021.org/crbl/index SCOPE International Conference on Cryptography and Blockchain (CRBL 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cryptography and Blockchain. TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO THE FOLLOWING  Access Control and Intrusion Detection  Artificial Immune Systems  Authentication  Authentication and Non-repudiation  Autonomy-Oriented Computing  Biological & Evolutionary Computation  Biometric Security  Blockchain Attacks on Existing Systems  Blockchain Consensus Algorithms  Blockchain Foundations  Blockchain in digital forensic  BlockChain issues and trends  Blockchain New Design  Blockchain Privacy  Blockchain Scalability  Blockchain Authentication and authorization  Blockchain based security for the IoT  Coevolutionary Algorithms  Computational Intelligence in Security  Cryptographic protocols  Cryptography and Coding  Data & System Integrity  E- Commerce  Data Integrity  Fuzzy Systems  Identification and Authentication  Information Hiding  Insider Threats and Countermeasures
  • 2.  Intelligent Agents and Systems  Intrusion Detection & Prevention  Intrusion Detection and Vulnerability Assessment  Key management  Models for Authentication, Trust and Authorization  Privacy and authentication  Quantum cryptography  Regulation and Trust Mechanisms  Reinforcement & Unsupervised Learning  Secure Cloud Computing  Security and Privacy in Mobile Systems  Security and Privacy in Pervasive/Ubiquitous Computing  Security and Privacy in Web Services  Security and Privacy Policies  Security Area Control  Security Deployment  Security Engineering  Security for Grid Computing  Security in Distributed Systems  Security Information Systems Architecture and Design and Security Patterns  Security Management  Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)  Sensor and Mobile Ad Hoc Network Security  Service and Systems Design and QoS Network Security  Software Security  Trust Management  Trust models and metrics  Untraceability PAPER SUBMISSION Authors are invited to submit papers through the conference Submission System by September 25, 2021. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
  • 3. Selected papers from CRBL 2021, after further revisions, will be published in the special issue of the following journal.  International Journal of Computer Networks & Communications (IJCNC) - Scopus Indexed, ERA Indexed  International Journal On Cryptography And Information Security (IJCIS)  International Journal of Security, Privacy and Trust Management (IJSPTM)  International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed  Information Technology in Industry (ITII)New - ESCI(WOS) Indexed IMPORTANT DATES Second Batch : (Submissions after September 06, 2021)  Submission Deadline : September 25, 2021  Authors Notification : October 18, 2021  Registration & Camera-Ready Paper Due : October 21, 2021 CONTACT US Here's where you can reach us : crbl@comit2021.org or crblconf@yahoo.com Submission system: https://comit2021.org/submission/index.php