区块链可投会议CCF C--FC 2025 截止10.8 附录用率

news/2024/9/28 22:11:49/

图片

Conference:Financial Cryptography and Data Security (FC)

CCF level:CCF C

Categories:network and information security

Year:2025

Conference time:14–18 April 2025, Miyakojima, Japan

录用率:2023年 39 full and 2 short papers selected from 182 submissions.

Topics

  • Access control, authorization and trust management

  • Anonymity and privacy enhancing technologies

  • Applied cryptography

  • Attacks, attack techniques, and attack case studies

  • Auctions and incentive design

  • Authentication, identity management and biometrics

  • Behavioral aspects of security and privacy

  • Blockchain applications

  • Blockchain protocols, proof-of-work, -stake, -burn

  • Censorship circumvention and resistance

  • Central bank digital currency (CBDC)

  • Certification and audits

  • Cloud computing and data outsourcing security

  • Cryptographic protocols

  • Data security and privacy

  • Decentralized finance (DeFi)

  • Digital cash and payment systems

  • Digital rights management

  • Distributed consensus protocols

  • Economic and monetary aspects of cryptocurrencies

  • Economics of security and privacy

  • Electronic crime and underground markets

  • Electronic payments and ticketing systems

  • Empirical studies, real-world measurements and metrics

  • Forensics, monitoring and transaction graph analysis

  • Fraud detection and management

  • Game theory for security, privacy, and blockchain

  • Language-based security and formal verification

  • Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments

  • Machine learning and AI security

  • Malware and software security

  • Mobile payments

  • Network and distributed system security

  • Phishing and social engineering

  • Scalability and interoperability of cryptocurrencies

  • Security of banking, financial services, and electronic commerce

  • Security of peer-to-peer networks

  • Smart contracts and financial instruments

  • Smartcards, secure tokens, and secure hardware

  • Surveillance and tracking

  • System security

  • Trusted execution environments (TEE), their security and applications

  • Usability and security

  • Web security

  • Zero-knowledge proofs

Important Dates

Paper submission8 October 2024
Paper notification6 December 2024
Final pre-proceedings papers14 February 2025
Workshop and tutorial submission13 September 2024*
Workshop and tutorial notification27 September 2024
Conference14–18 April 2025

All submissions are accepted until 23:59, AoE UTC-12.

详情:

https://fc25.ifca.ai/index.html

图片

持续接收区块链最新论文

洞察区块链技术发展趋势

Follow us to keep receiving the latest blockchain papers

Insight into Blockchain Technology Trends


http://www.ppmy.cn/news/1531640.html

相关文章

如何避免IP污染

在互联网使用中,IP污染问题日益显现,尤其在代理IP、网络爬虫、数据采集和跨境业务中。IP污染会导致访问受限、封禁等问题,严重影响正常的网络操作。那么,什么是IP污染?如何有效避免?本文将探讨其原因和预防…

【教学类-18-04】20240508《蒙德里安“黑白格子画” 七款图案挑选》

背景需求 最近有2位客户买了蒙德里安黑白格子画的素材,其中一位问是否是1000张。 【教学类-18-03】20240508《蒙德里安“红黄蓝黑格子画”-A4横版》(大小格子)_processing简单图形画蒙德里安-CSDN博客文章浏览阅读1.1k次,点赞35次…

一文上手SpringSecurity【五】

对于前后端不分离的项目,我们可以采用一文上手SpringSecurity【四】当中的方式来自定义用户的登录页面和数据源,数据源目前采用的是模拟的方式来实现的,本篇内容主要介绍一下spring security对于前后端分离项目如何实现认证和授权的. 一、前后端分离的认证面对的问题 1.1 传统…

biopython解析mmcif文件得到组装体、链、序列、原子坐标、变换矩阵等信息

使用 Biopython 解析 .mmCIF 文件可以提取出蛋白质结构的相关信息,包括模型(model)、链(chain)、序列、原子坐标以及可能存在的变换矩阵。以下是一个完整的示例代码,展示如何使用 Biopython 的 MMCIFParser…

解决iPhone无法有效响应问题的指南

当您触摸、滑动和点击屏幕时,iPhone 没有响应或屏幕冻结是很烦人的。不可否认,iPhone 是最好的智能手机之一,但它并不完美。触摸屏冻结是 iPhone 用户面临的最常见问题之一。 好消息是,这个问题通常是由软件错误而不是硬件损坏引…

volatile关键字最全原理剖析

介绍 volatile是轻量级的同步机制,volatile可以用来解决可见性和有序性问题,但不保证原子性。 volatile的作用: 保证了不同线程对共享变量进行操作时的可见性,即一个线程修改了某个变量的值,这新值对其他线程来说是…

WEB领域是不是黄了还是没黄

进入2024年后,WEB领域大批老表失业,一片哀嚎,个个饿的鬼叫狼嚎,为啥呢,下面是我个人的见解和看法。 中国程序员在应用层的集中 市场需求:中国的互联网行业在过去几年中经历了爆炸性增长,尤其是…

计算机视觉中的2D变换:用Python让图像‘动’起来

嘿,小伙伴们!今天我们要聊的是计算机视觉中的2D变换——那些能让图像‘动’起来的技术。无论你是初学者还是资深开发者,这篇文章都将带你深入了解2D变换,并通过Python代码实战演示。准备好了吗?让我们开始吧&#xff0…