Call For Papers
2nd International Conference on Cryptology, Computer Security and Applications (I3CSA’25)
FSA, Agadir, Morocco
May 16-17, 2025
Authors are requested and kindly to submit their original and unpublished documents electronically using the Online Conference Management System in PDF format by the deadline, with up to 6 pages for complete documents. including all figures and references, and must be formatted according to the format of the template available on the conference website: https://i3csa25.sciencesconf.org/.
Submissions will follow peer review procedures. Accepted documents will be presented in the conference as oral presentations or posters. Contributions may be in English or French. Selected articles will be invited for publication in special issues.
At least, one author of each accepted document is required to register and attend the conference to present the work.
Submission processes will be managed by Microsoft CMT. If you have used this system before, you can use the same username and password. If this is your first time using Microsoft CMT, you will need to register for an account by clicking on the "create account" link. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.
You can download and relay the document to the system before the submission deadline.
For any other information, do not hesitate to contact us at i3csaconf@gmail.com.
Main Topics :
This edition is organized around the following topics:
- Cryptography
- Advanced Cryptographic Techniques
- Post-Quantum Cryptographic Protocols
- Data Encryption and Secure Data Storage
- Quantum-Resistant Intelligent Devices
- Homomorphic Cryptography
- Blockchain Cryptography
- Embedded Cryptography
- Finance Cryptography
- Cryptographic Hash Functions
- Blockchain, IoT, Intelligent Systems and Cloud/MultiCloud Computing
- Architectures and Protocols in E-Health, E-Finance,E-Economics, Web Industry(4.0 and 5.0) and E-Education Applications
- Edge and Cloud Computing Architectures
- Security and Privacy
- Blockchain Integration in IoT/CC(Cloud computing)/IS Security(Information Systems)
- Self-Adaptive and Resilient IoT Systems
- Multi-objective optimization
- Cybersecurity Innovations
- AI-driven anomaly Detection in Cybersecurity
- Autonomous Cyber-Defense Systems
- Emerging Threats and Mitigation Strategies
- Cybersecurity in Decentralized Networks
- Cybersecurity on Edge/Cloud / Multi-cloud Computing and Edge AI
- Cybersecurity on/in E-Health, E-Finance,E-Economics, and E-Education Applications
- Cybersecurity on Big Data Analytics.
- Cybersecurity on Web Industry
- Cybersecurity in Smart Cities and Smart Grids
- Artificial Intelligence in Security
- AI and Cryptography
- AI on Threat Detection and Mitigation
- AI Models Secured on Blockchain
- AI Models Secured on E-Finance
- AI Models Secured on E-Economics
- AI Models Secured on E-Education
- AI-Driven Secure IoT Systems
- AI-Powered Intelligent Cybersecurity Solutions
- AI Ethics in Cybersecurity
In the following link, you find a template of our conference : Template I3CSA