Our Sponsors
Website https://cosit2026.org/cris/index |
Edit Freely
Category CRIS 2026
Deadline: January 02, 2026 | Date: May 16, 2026-May 17, 2026
Venue/Country: Zurich, Switzerland, Switzerland
Updated: 2026-01-20 16:13:53 (GMT+9)
Scope & Topics12th International Conference on Cryptography and Information Security (CRIS 2026) serves as a premier platform for presenting cutting edge research and advances in cryptography, coding theory, and information security. As digital systems continue to expand in scale, complexity, and societal impact, the need for robust security foundations and innovative protection mechanisms has never been greater. CRIS 2026 provides a peer reviewed forum for researchers, practitioners, and industry experts to share breakthroughs, exchange ideas, and explore emerging challenges across the full spectrum of security and cryptographic technologies.The conference aims to bring together scientists, researchers, engineers, and students from academia, industry, and government to discuss novel theories, methodologies, applications, and practical implementations. Authors are invited to submit original research articles, case studies, survey papers, and industrial experiences that demonstrate significant progress, innovative approaches, or insightful perspectives in the conference’s areas of interest.Topics of interest include, but are not limited to, the following:Applied and theoretical cryptographyCryptographic protocols, secure multiparty computation, and zero knowledge proofsPost quantum cryptography and quantum resistant algorithmsQuantum cryptography and quantum safe key exchangeBlockchain security, consensus mechanisms, and cryptographic primitives for distributed ledgersPrivacy enhancing technologies (PETs), including differential privacy and homomorphic encryptionSecure key management, key exchange, and secret sharingAuthentication, authorization, and access controlIdentity management, digital credentials, and decentralized identityBiometric security and privacy preserving biometricsInformation hiding, steganography, and digital watermarkingData integrity, system integrity, and tamper resistant architecturesSoftware security, secure coding, and vulnerability discoveryHardware and embedded system security (TPMs, TEEs, side channel attacks, fault injection)Trusted execution environments and confidential computingNetwork security, wireless security, and mobile system securityIoT and cyber physical systems securitySensor network and ad hoc network securityCloud, edge, and distributed system securityWeb and browser securitySecurity engineering, secure system design, and formal verificationSecurity requirements, threat modeling, and risk assessmentIntrusion detection, intrusion prevention, and anomaly detectionMalware analysis, reverse engineering, and threat intelligenceVulnerability assessment, exploit mitigation, and attack surface reductionInsider threats, behavioral analytics, and organizational securitySecurity management, governance, and policyTrust management, trust models, and reputation systemsPrivacy and data protection in distributed and pervasive environmentsSecurity and privacy in AI/ML systemsAdversarial machine learning and robust model designMachine learning for security (intrusion detection, malware classification, fraud detection)Reinforcement learning and unsupervised learning for security analyticsSecure federated learning and privacy preserving AIBlockchain based security applications and smart contract securityDigital forensics, incident response, and cybercrime investigationUntraceability, anonymity systems, and anonymous communication networksRegulation, compliance, and trust mechanisms in digital ecosystemsE commerce security, payment systems, and financial cryptographySecurity in pervasive, ubiquitous, and mobile computingSecurity in distributed ledger systems and decentralized applicationsService oriented architectures, QoS, and secure systems designEmerging threats, novel attack vectors, and future security challengesPaper SubmissionAuthors are invited to submit papers through the conference Submission System by February 07, 2026 Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).Selected papers from CRIS 2026, after further revisions, will be published in the special issues of the following journalsInternational Journal on Cryptography and Information Security (IJCIS)The International Journal of Network Security & Its Applications (IJNSA) – ERA IndexedThe International Journal of Wireless & Mobile Networks (IJWMN) – ERA IndexedInternational Journal of Security, Privacy and Trust Management (IJSPTM)Information Technology in Industry (ITII)Important DatesSubmission Deadline : February 07, 2026Authors Notification : March 28, 2026Registration & Camera-Ready Paper Due : April 04, 2026Contact UsHere’s where you can reach us : cris
cosit2026.org or cris2025
myyahoo.comKeywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.