Our Sponsors
Website https://iotbc2026.org/index |
Edit Freely
Category IOT; Blockchain
Deadline: January 17, 2026 | Date: March 30, 2026-March 31, 2026
Venue/Country: Virtual Conference, Online
Updated: 2026-01-14 13:39:04 (GMT+9)
Scope4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026) is a fully virtual conference (VC) designed to bring together researchers, practitioners, industry professionals, and innovators from around the world. As a virtual event, IOTBC 2026 provides a highly accessible and interactive platform for sharing cutting edge knowledge, discussing emerging trends, and presenting significant advances in the theory, methodology, and applications of the Internet of Things (IoT), Blockchain technologies, and Cryptography.IOTBC 2026 welcomes contributions that explore foundational concepts, propose novel algorithms and architectures, demonstrate real world deployments, or present interdisciplinary research that connects IoT, Blockchain, Cryptography, Artificial Intelligence, and modern cybersecurity.Authors are invited to submit high quality research papers, survey articles, project reports, and industrial case studies that illustrate innovative results and practical experiences. Topics of interestMachine Learning Theory and FoundationsDeep Learning Architectures and MethodsSelfSupervised, Unsupervised, and Semi Supervised LearningTransfer Learning, Meta Learning, and Continual LearningReinforcement Learning and Decision MakingProbabilisticModeling and Statistical InferenceOptimization Methods for AI and MLLarge Language Models (LLMs) and Foundation ModelsMultimodal Learning and Vision Language ModelsGenerative AI for Text, Image, Audio, and VideoRetrievalAugmented Generation (RAG) and Knowledge Enhanced ModelsEfficient AI: Model Compression, Distillation, and AccelerationTrustworthy, Robust, and Secure AIAdversarial Machine Learning and Model HardeningExplainable and Interpretable AI (XAI)AI Alignment, AI Safety, and Responsible AIHuman AI Interaction and Human in the Loop SystemsNeurosymbolic AI and Hybrid IntelligenceCausal Inference and Causal Representation LearningKnowledge Graphs, Reasoning, and Automated PlanningProgram Synthesis, Code Intelligence, and AI for Software SecurityFederated Learning and Privacy Preserving AIDifferential Privacy, Secure Multi Party Computation, and Homomorphic EncryptionCryptography, Cryptographic Protocols, and Post Quantum SecurityAuthentication, Identification, and Access ControlKey Management, Trust Models, and Reputation SystemsData Integrity, System Integrity, and Secure Data ManagementIntrusion Detection, Prevention, and Threat IntelligenceMalware Analysis, Vulnerability Assessment, and Insider Threat DetectionSecurity Engineering, Secure Software Development, and DevSecOpsSecurity Requirements, Threat Modeling, and Risk AnalysisSecurity Architecture, Design Patterns, and DeploymentNetwork Security, Secure Connectivity, and QoS Aware SecuritySecurity in Distributed Systems, Cloud, Edge, and Fog ComputingSecurity and Privacy in IoT and Cyber Physical SystemsSecurity and Privacy in Mobile, Ubiquitous, and Web Based SystemsSensor Networks and Mobile Ad Hoc Network SecurityBlockchain Foundations, Consensus, and ScalabilityBlockchain Security, Privacy, and Attack AnalysisBlockchain for IoT, Cloud, Identity, and Digital ForensicsSmart Contracts, Decentralized Applications, and Secure Ledger DesignComputational Intelligence for Security and Anomaly DetectionBio Inspired and Evolutionary Computation for SecurityAutonomous Agents and Multi Agent Security SystemsRobotics, Embodied AI, and Autonomous System SecurityAI for Cyber Physical Infrastructure ProtectionAI for Healthcare, Bioinformatics, and Medical SecurityAI for Climate, Sustainability, and Critical InfrastructureCybersecurity Governance, Regulation, and Trust MechanismsSecure E Commerce, Digital Transactions, and Financial AIExperimental Security Testbeds, Benchmarks, and Real World DeploymentsPaper SubmissionAuthors are invited to submit papers through the conference Submission System by January 17, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of nde conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).Selected papers from IOTBC 2026, after further revisions, will be published in the special issue of the following journals· International Journal of Game Theory and Technology (IJGTT)· International Journal on Cryptography and Information Security (IJCIS)· The International Journal of Security, Privacy and Trust Management (IJSPTM )· International Journal of Ubiquitous Computing (IJU)· International Journal of Ambient Systems and Applications (IJASA)Important Dates2nd batch: Submissions after December 29, 2025Submission Deadline : January 17, 2026Authors Notification : February 14, 2026Registration & Camera-Ready Paper Due : February 21, 2026Contact UsHere’s where you can reach us : iotbc
iotbc2026.org or iotbcconference
gmail.comKeywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.