Excellence in Research and Innovation for Humanity

ICAIC 2018 : 20th International Conference on Algebraic Informatics and Cryptography

London, United Kingdom
March 15 - 16, 2018

Conference Code: 18UK03ICAIC

Conference Proceedings

All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the International Science Index (ISI), Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.

Special Journal Issues

ICAIC 2018 has teamed up with the Special Journal Issue on Algebraic Informatics and Cryptography. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.

Conference Sponsor and Exhibitor Opportunities

The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.

Important Dates

Abstracts/Full-Text Paper Submission Deadline   February 15, 2018
Notification of Acceptance/Rejection   February 28, 2018
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline   February 14, 2018
Conference Dates   March 15 - 16, 2018

Important Notes

Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.

Please refer to the Paper Submission GUIDE before submitting your paper.

Selected Conference Papers

1) A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
Ramon Santana
2) Secure E-Pay System Using Steganography and Visual Cryptography
K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
3) Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Anthony Overmars, Sitalakshmi Venkatraman
4) Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Carlos Gonzalez
5) VANETs: Security Challenges and Future Directions
Jared Oluoch
6) Digital Watermarking Based on Visual Cryptography and Histogram
R. Rama Kishore, Sunesh
7) A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks
J. Jenefa, E. A. Mary Anita
8) Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
9) Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis
Hyun-Ho Lee, Kee-Won Kim
10) A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables
M. Hamdi, R. Rhouma, S. Belghith
11) Survey on Jamming Wireless Networks: Attacks and Prevention Strategies
S. Raja Ratna, R. Ravi
12) Cryptography over Sextic Extension with Cubic Subfield
A. Chillali, M. Sahmoudi
13) Encryption Image via Mutual Singular Value Decomposition
Adil Al-Rammahi
14) Improved of Elliptic Curves Cryptography over a Ring
A. Chillali, A. Tadmori, M. Ziane
15) New Security Approach of Confidential Resources in Hybrid Clouds
Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander Ghorbel

Similar conferences about Mathematical and Computational Sciences