Call for Papers

Call For Papers

International Conference on Cryptology, Computer Security and Applications (I3CSA’20)

FSA, Agadir, Morocco

December 23-25, 2020

 

    Authors are requested and kindly to submit their original and unpublished documents electronically using the Online Conference Management System “Authentication Central Service CCSD” in PDF format by the deadline, with up to 6 pages for complete documents including all figures and references, and must be formatted according to the format of the template available on the conference website: https://i3csa20.sciencesconf.org/.

   Submissions will follow peer review procedures. Accepted documents will be presented in the conference as oral presentations or posters. Contributions may be in English or French. Selected articles will be invited for publication in special issues.

   At least, one author of each accepted document is required to register and attend the conference to present the work.

  Submission processes will be managed by SciencesConf.org. If you already have an account on SciencesConf.org or on HAL, you can directly log in using your same settings (same username and password). If this is the first time, you are using the "Central Authentication Service of the CCSD", you can directly create an account on Sciencesconf.org or on HAL by clicking on the button "I do not have an account yet". Once registration is complete, you will receive a system notification e-mail and you are ready to submit your document.

You can download and relay the document to the system before the submission deadline.

For any other information, do not hesitate to contact us at inter.i3csa@gmail.com.

Main Topics :

This edition is organized around three main Topics:

  • Computer Cryptology.
  • Security IT and Information systems.
  • Applications in various fields  :
    • Web, Distributed Systems;
    • Cloud Computing;
    • Big Data, Internet of Things;
    • Data warehouse;
    • Sensor and Wireless Networks;
    • Computer and Communication Networks;
    • Security of Images and Medical Data;
    • Network Security;
    • Datacenter;
    • Mobile Networks;
    • Network Function Virtualization (NFV).
    • Embedded Systems
    • Security of images and medical data.

   In the following link,  you find a template of our conference : 

Personnes connectées : 5 Vie privée
Chargement...