Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    IOTBC 2026 - 4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026)

    View: 673

    Website https://iotbc2026.org/index | Want to Edit it Edit Freely

    Category IOT; Blockchain

    Deadline: January 17, 2026 | Date: March 30, 2026-March 31, 2026

    Venue/Country: Virtual Conference, Online

    Updated: 2026-01-14 13:39:04 (GMT+9)

    Call For Papers - CFP

    4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026)

    March 30 ~ 31, 2026, Virtual Conference

    https://iotbc2026.org/index

    Scope

    4th International Conference IOT, Blockchain and Cryptography (IOTBC 2026) is a fully virtual conference (VC) designed to bring together researchers, practitioners, industry professionals, and innovators from around the world. As a virtual event, IOTBC 2026 provides a highly accessible and interactive platform for sharing cutting edge knowledge, discussing emerging trends, and presenting significant advances in the theory, methodology, and applications of the Internet of Things (IoT), Blockchain technologies, and Cryptography.

    IOTBC 2026 welcomes contributions that explore foundational concepts, propose novel algorithms and architectures, demonstrate real world deployments, or present interdisciplinary research that connects IoT, Blockchain, Cryptography, Artificial Intelligence, and modern cybersecurity.Authors are invited to submit high quality research papers, survey articles, project reports, and industrial case studies that illustrate innovative results and practical experiences.

    Topics of interest

    Machine Learning Theory and Foundations

    Deep Learning Architectures and Methods

    SelfSupervised, Unsupervised, and Semi Supervised Learning

    Transfer Learning, Meta Learning, and Continual Learning

    Reinforcement Learning and Decision Making

    ProbabilisticModeling and Statistical Inference

    Optimization Methods for AI and ML

    Large Language Models (LLMs) and Foundation Models

    Multimodal Learning and Vision Language Models

    Generative AI for Text, Image, Audio, and Video

    RetrievalAugmented Generation (RAG) and Knowledge Enhanced Models

    Efficient AI: Model Compression, Distillation, and Acceleration

    Trustworthy, Robust, and Secure AI

    Adversarial Machine Learning and Model Hardening

    Explainable and Interpretable AI (XAI)

    AI Alignment, AI Safety, and Responsible AI

    Human AI Interaction and Human in the Loop Systems

    Neurosymbolic AI and Hybrid Intelligence

    Causal Inference and Causal Representation Learning

    Knowledge Graphs, Reasoning, and Automated Planning

    Program Synthesis, Code Intelligence, and AI for Software Security

    Federated Learning and Privacy Preserving AI

    Differential Privacy, Secure Multi Party Computation, and Homomorphic Encryption

    Cryptography, Cryptographic Protocols, and Post Quantum Security

    Authentication, Identification, and Access Control

    Key Management, Trust Models, and Reputation Systems

    Data Integrity, System Integrity, and Secure Data Management

    Intrusion Detection, Prevention, and Threat Intelligence

    Malware Analysis, Vulnerability Assessment, and Insider Threat Detection

    Security Engineering, Secure Software Development, and DevSecOps

    Security Requirements, Threat Modeling, and Risk Analysis

    Security Architecture, Design Patterns, and Deployment

    Network Security, Secure Connectivity, and QoS Aware Security

    Security in Distributed Systems, Cloud, Edge, and Fog Computing

    Security and Privacy in IoT and Cyber Physical Systems

    Security and Privacy in Mobile, Ubiquitous, and Web Based Systems

    Sensor Networks and Mobile Ad Hoc Network Security

    Blockchain Foundations, Consensus, and Scalability

    Blockchain Security, Privacy, and Attack Analysis

    Blockchain for IoT, Cloud, Identity, and Digital Forensics

    Smart Contracts, Decentralized Applications, and Secure Ledger Design

    Computational Intelligence for Security and Anomaly Detection

    Bio Inspired and Evolutionary Computation for Security

    Autonomous Agents and Multi Agent Security Systems

    Robotics, Embodied AI, and Autonomous System Security

    AI for Cyber Physical Infrastructure Protection

    AI for Healthcare, Bioinformatics, and Medical Security

    AI for Climate, Sustainability, and Critical Infrastructure

    Cybersecurity Governance, Regulation, and Trust Mechanisms

    Secure E Commerce, Digital Transactions, and Financial AI

    Experimental Security Testbeds, Benchmarks, and Real World Deployments

    Paper Submission

    Authors are invited to submit papers through the conference Submission System by January 17, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of nde conference will be published by International Journal on Cybernetics & Informatics (IJCI) (Confirmed).

    Selected papers from IOTBC 2026, after further revisions, will be published in the special issue of the following journals

    · International Journal of Game Theory and Technology (IJGTT)

    · International Journal on Cryptography and Information Security (IJCIS)

    · The International Journal of Security, Privacy and Trust Management (IJSPTM )

    · International Journal of Ubiquitous Computing (IJU)

    · International Journal of Ambient Systems and Applications (IJASA)

    Important Dates

    2nd batch: Submissions after December 29, 2025

    Submission Deadline : January 17, 2026

    Authors Notification : February 14, 2026

    Registration & Camera-Ready Paper Due : February 21, 2026

    Contact Us

    Here’s where you can reach us : iotbcatiotbc2026.org or iotbcconferenceatgmail.com


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.