iQ-CCHESS’23 2023 : IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security IIIT Kottayam
|
|||||||
Event Date: | September 15, 2023 - September 16, 2023 |
---|---|
Submission Deadline: | June 02, 2023 |
Notification of Acceptance: | July 05, 2023 |
Camera Ready Version Due: | July 20, 2023 |
Call for Papers |
iQ-CCHESS’23 invites contributions in all areas related to Computer Science and Engineering, but not limited to, the following streams:
Quantum Computing and Security Wireless Communication and Security Computational Intelligence and Security Security and privacy Hardware Security Blockchain technology and its applications TRACK 1: QUANTUM COMPUTING AND SECURITY Quantum Computing, Quantum Algorithms, Quantum Machine Learning, Quantum Hardware, Quantum Optimization, Quantum Information Theory, Quantum Error Correction, Quantum Simulators, Quantum Communication, Quantum Networks, Quantum Sensing, Blind Computing, Quantum Cryptography, Post-Quantum Cryptography. TRACK 2: WIRELESS COMMUNICATION AND SECURITY Green Computing and Networking for 5G, Ubiquitous Computing and Sensor Networks, ML and DL for Intelligent WSN, ML and DL 5G and 6G, Mobile Communication networks, and Computing, Green communications in 5G, Security in WSNs, Communication Networks Architecture, Secured Routing Algorithms, Network Virtualization Technologies (NFV), AdHoc, Mesh, and Cellular Networks (AMCN), Wearable sensors for Healthcare Monitoring, Security in Smart cities, Software Defined Networks and IoT, Vehicular Ad- hoc Networks and Security, RFID, Cyber-Physical Networks, Intrusion Detection. Cloud High Performance Computing, Data center networking, Cloud security and privacy; Cloud Metaverse. TRACK 3: COMPUTATIONAL INTELLIGENCE AND SECURITY Computational Intelligence and its applications, Computational Intelligence using Machine Learning, Computational Intelligence using Federated Learning, Intelligent Systems Security with Deep Learning and Neural Networks, Secure fuzzy Logic, Expert System Security, Crowd Sourcing & Social Intelligence, Context-aware pervasive systems, Ambient intelligence and Security Applications, Secure Intelligent Control and their Applications, Secure Network Control System, Information Forensic and Security. TRACK 4: SECURITY AND PRIVACY Security:Access control, Cryptographic protocols, Language-based security, Authorization and trust, Verification techniques, Integrity and Availability models, Applied Cryptography, Audit and Accountability, Malware, Unwanted software, Usable Security, Web Security, Security analysis and Formal Analysis, Design and test strategies for secure and survivable systems and Cryptology, Secure Operating System and applications, Analysis of Vulnerabilities and attack, Electronic commerce security, Multimedia Security, Key Management, Ownership Management, Revocation of malicious parties, Security policies, Trade-off analysis between performance and security, Secure use of biometrics, Lightweight Cryptography, Secure Data Sharing, Cloud Security, Authentication Protocols, Data- driven security attacks and countermeasures. Privacy:Anonymity, Privacy Metrics, Identity Management, Web and mobile privacy, Privacy- preserving computation, Privacy attacks, Cryptography tools for privacy, Building and deploying privacy-enhancing systems, Differential privacy and private data analysis, Economics and game-theoretical approaches to privacy, Forensics and privacy, Genomic and medical privacy, Interdisciplinary research connecting privacy to economics, law, psychology, etc., Measurement of privacy in real-world systems, Transparency, robustness, and abuse in privacy systems, Privacy Protection, Psychological, sociological, and economic aspects of security and privacy, Research and design methodologies for human-centric security and privacy research. TRACK 5: HARDWARE SECURITY Machine learning in hardware security, security of AI hardware systems, Post- Quantum Hardware Security, Neuromorphic Security, Security of Emerging Memory Chips, Cryptographic Hardware and their Implementation, Optimization of Cryptographic Hardware on FPGA, Hardware Trojan, Physically Unclonable Functions (PUFs), Side-channel, Logic locking for IP protection. TRACK 6: BLOCKCHAIN TECHNOLOGY AND ITS APPLICATIONS Distributed Consensus & Fault Tolerance Algorithms, Performance and Scalability Issues, Blockchain-based Applications & Services, Decentralized App Development, Smart Contracts and Verification, Transaction Monitoring and Analysis, Decentralized Internet Infrastructure, Decentralized Financial Services, Blockchain for Internet of Things/Cyber Physical Services, Blockchain and Machine Learning/Artificial Intelligence. |
Summary |
iQ-CCHESS’23 2023 : IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security will take place in IIIT Kottayam. It’s a 2 days event starting on Sep 15, 2023 (Friday) and will be winded up on Sep 16, 2023 (Saturday). iQ-CCHESS’23 2023 falls under the following areas: QUANTUM COMPUTING AND SECURITY, WIRELESS SECURITY, SECURITY AND PRIVACY, HARDWARE SECURITY, etc. Submissions for this Conference can be made by Jun 2, 2023. Authors can expect the result of submission by Jul 5, 2023. Upon acceptance, authors should submit the final version of the manuscript on or before Jul 20, 2023 to the official website of the Conference. Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines. Other Details of the iQ-CCHESS’23 2023
|
Credits and Sources |
[1] iQ-CCHESS’23 2023 : IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security |