Welcome to CCNSC 2026

2026International Conference on Computer Communication, Network Security, and Cryptography

Scopes
(Topics include but are not limited to)
Topic 1: Computer Communication
Communication architecture
Data Center and Big Data Computing
Peer to Peer Computing and Communication
Multimedia and real-time network
Algorithm, modeling and evaluation
Sensors/embedded networks and ubiquitous computing
Network testing and deployment
Delay tolerant network
Network testing and deployment
Scheduling and buffer management
Network based on smart antennas
6G Vision and Potential Key Technologies
Internet of Things and Sensor Networks
Next Generation Network and Internet
Trust, Security, and Privacy
Artificial Intelligence and Machine Learning
Data Science and Big Data Systems Engineering
Cloud, computing, networking, and storage
Wireless and mobile networks
Green communication systems and networks
Topic 2: Network Security
Active Defense System
Adaptive Defense System
Security system analysis, benchmarking
Applied cryptography
Authentication method
Biometric security
Complex system security
Database and System Security
data protection
Data/System Integrity
Distributed Access Control
Distributed attack system
Denial of service
High performance network virtualization
High performance security system
Security in Cloud and Grid Systems
Security in E-commerce
Security in ubiquitous/ubiquitous computing
Security and Privacy in Smart Grid
Security and Privacy in Wireless Networks
Secure Mobile Agent and Mobile
Dynamic code
Security simulation and tools
Trusted computing
Topic 3: Cryptography
Password Protocol
Encryption and encoding
Untraceability
Privacy and authentication
key management
Trust management
Quantum cryptography
Security computing intelligence
Artificial immune system
Biological and evolutionary computing
Intelligent agents and systems
Reinforcement and unsupervised learning
Autonomous oriented computing
Collaborative Evolution Algorithm
fuzzy system
Biometric security
Trust models and metrics
Regulatory and trust mechanisms
Data integrity
Identity verification, trust, and authorization models
Wireless network security
information hiding
Electronic Commerce
Data and System Integrity
Important Dates | 重要日期
  • Submission Deadline: 2026.1.3
  • Registration Deadline: 2026.1.8
  • Conference Date: 2026.1.14
  • Notification Date: About a week after the submission
Submission Portal | 投稿方式

Mail Address:  ei_phihd@163.com

If you have any question or need any assistance regarding the conference, please feel free to contact our conference specialists:

肖老师
  • +86-17172888836(微信同号)
  • 3770887106
--
  • +86---(微信同号)
  • --
Indexing Service | 索引服务