Hybrid -- Registered authors can present their work online or face to face New
Scope Call for Participation Program Schedule
11th International Conference on Cryptography and Information Security (CRIS 2025) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
11th International Conference on Cryptography and Information Security (CRIS 2025) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
Topics of interest include, but are not limited to, the following
Access Control and Intrusion Detection
Artificial Immune Systems
Authentication and Non-repudiation
Autonomy-Oriented Computing
Biological and Evolutionary Computation
Biometric Security
Blockchain Technology
Co-evolutionary Algorithms
Computational Intelligence in Security
Cryptographic Protocols
Cryptography and Coding
Cyber-Physical Systems Security
Data and System Integrity
Data Integrity
E- Commerce
Fuzzy Systems
Identification and Authentication
Information Hiding
Insider Threats and Countermeasures
Intelligent Agents and Systems
Intrusion Detection & Prevention
Intrusion Detection and Vulnerability Assessment
IoT Security
Key Management
Models for Authentication, Trust and Authorizatio
Privacy and Authentication
Quantum Cryptography
Regulation and Trust Mechanisms
Reinforcement and Unsupervised Learning
Secure Cloud Computing
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing
Security in Distributed Systems
Security Information Systems Architecture and Design
Security Management
Security Patterns
Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
Sensor and Mobile Ad Hoc Network Security
Service, Systems Design and QoS Network Security
Software Security
Trust Management
Trust Models and Metrics
Untraceability
Wireless Network Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by Closed. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from CoSIT 2025, after further revisions, will be published in the special issue of the following journal.
International Journal on Cryptography and Information Security (IJCIS)
The International Journal of Network Security & Its Applications (IJNSA) WJCI, ERA Indexed
The International Journal of Wireless & Mobile Networks (IJWMN) WJCI, ERA Indexed
International Journal of Security, Privacy and Trust Management (IJSPTM)
Proceedings
Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library
Sponsors
Speakers