Call for papers

Research papers are invited in the following areas but not limited to:

  • Public Key Systems
  • Signature Schemes
  • Cryptanalysis
  • Steganography
  • Security Protocols
  • Data Integrity & Message Digests
  • Block & Stream Ciphers
  • Elliptic Curve Cryptography
  • Block Chain Technology
  • Bitcoin
  • Image Security

 

Papers submitted by the authors will be strictly reviewed by a review panel. Authors of selected papers need to incorporate the comments from the reviewers in their camera ready submission. The full paper should not be more than 10 pages (maximum) and the paper should be in IEEE format. All submissions in PDF format can be forwarded to workshop mail id: nwc2k17@gmail.com

All accepted papers will be published in the conference proceedings.

Some of the Selected papers with revision will be considered for publication in the following journals:

1. Journal of Internet Services and Information Security (JISIS)
2. Research Briefs on Information & Communication Technology Evolution (ReBICTE)

Advertisements