Conference Information
FC 2025: International Conference on Financial Cryptography and Data Security
https://fc25.ifca.ai/index.html
Submission Date:
2024-10-08
Notification Date:
2024-12-06
Conference Date:
2025-04-14
Location:
Miyakojima, Japan
Years:
29
CCF: c   CORE: b   QUALIS: b1   Viewed: 34983   Tracked: 82   Attend: 15

Call For Papers
Topics

    Access control, authorization and trust management
    Anonymity and privacy enhancing technologies
    Applied cryptography
    Attacks, attack techniques, and attack case studies
    Auctions and incentive design
    Authentication, identity management and biometrics
    Behavioral aspects of security and privacy
    Blockchain applications
    Blockchain protocols, proof-of-work, -stake, -burn
    Censorship circumvention and resistance
    Central bank digital currency (CBDC)
    Certification and audits
    Cloud computing and data outsourcing security
    Cryptographic protocols
    Data security and privacy
    Decentralized finance (DeFi)
    Digital cash and payment systems
    Digital rights management
    Distributed consensus protocols
    Economic and monetary aspects of cryptocurrencies
    Economics of security and privacy
    Electronic crime and underground markets
    Electronic payments and ticketing systems
    Empirical studies, real-world measurements and metrics
    Forensics, monitoring and transaction graph analysis
    Fraud detection and management
    Game theory for security, privacy, and blockchain
    Language-based security and formal verification
    Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments
    Machine learning and AI security
    Malware and software security
    Mobile payments
    Network and distributed system security
    Phishing and social engineering
    Scalability and interoperability of cryptocurrencies
    Security of banking, financial services, and electronic commerce
    Security of peer-to-peer networks
    Smart contracts and financial instruments
    Smartcards, secure tokens, and secure hardware
    Surveillance and tracking
    System security
    Trusted execution environments (TEE), their security and applications
    Usability and security
    Web security
    Zero-knowledge proofs
Last updated by Dou Sun in 2024-09-01
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20141383122.5%
20131253124.8%
2012882933%
2011652640%
20101303426.2%
2009912123.1%
2008862630.2%
2007851720%
2006642539.1%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
DaMiInternational Conference on Data Mining2024-05-182024-06-112022-08-20
IConDAInternational Conference on Computer & Drone Applications2019-11-15 2019-12-19
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2023-03-162023-06-302023-09-17
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2024-10-062024-10-212025-01-10
b2HCIIInternational Conference on Human-Computer Interaction2015-11-062015-12-042016-07-17
FCST'IEEE International Symposium on Future Cyber Security Technologies2024-06-302024-07-302024-09-02
BDITInternational Conference on Big Data and Information Technology2021-06-052021-06-252021-10-22
ICDCITInternational Conference on Distributed Computing and Intelligent Technology2023-08-072023-10-092024-01-17
mLearnWorld Conference on Mobile and Contextual Learning2017-07-202017-08-282017-10-30
Recommendation