Welcome to CRYPIS 2025
14th International Conference on Cryptography and Information Security (CRYPIS 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark
14th International Conference on Cryptography and Information Security (CRYPIS 2025)
September 20 ~ 21, 2025, Copenhagen, Denmark
Hybrid--Registered authors can present their work online or face to face New
Scope
14th International Conference on Cryptography and Information Security (CRYPIS 2025) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of Cryptography, Coding and Information security.
14th International Conference on Cryptography and Information Security (CRYPIS 2025) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of Cryptography, Coding and Information security.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:
Topics of interest include, but are not limited to, the following
Access Control and Intrusion Detection
Artificial Immune Systems
Authentication
Authentication and Non-repudiation
Autonomy-Oriented Computing
Biological & Evolutionary Computation
Biometric Security
Coevolutionary Algorithms
Computational Intelligence in Security
Cryptographic Protocols
Cryptography and Coding
Data Integrity
Fuzzy Systems
Identification and Authentication
Insider Threats and Countermeasures
Intelligent Agents and Systems
Intrusion Detection & Prevention
Intrusion Detection and Vulnerability Assessment
Key Management
Models for Authentication, Trust and Authorization
Privacy and Authentication
Quantum Cryptography
Regulation and Trust Mechanisms
Reinforcement & Unsupervised Learning
Secure Cloud Computing
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security for Grid Computing
Security in Distributed Systems
Security Information Systems Architecture and Design and Security Patterns
Security Management
Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust Management
Trust Models and Metrics
Untraceability
Paper Submission
Authors are invited to submit papers through the conference Submission System by Closed. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from CRYPIS 2025, after further revisions, will be published in the special issue of the following journal.
Proceedings
Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library
Sponsors
Speakers