How to write an article
Dear friends, you can download the sample article from the links below and send your articles in the same format.
Each author - either as a speaker or as an author - is able to submit a maximum of 3 articles.
Link to download English samples of articles
Link to download Persian samples of articles
Conference objectives:
- Presentation of the latest findings of scientific and exchange of views of researchers and researchers
- Scientific culture building and expanding the boundaries of knowledge
- Expanding interdisciplinary research
Conference themes:
A) Combinations
- Graph
- code
- Composite designs
- Trees
- Latin squares
- Networks
B) Cryptography
- Mathematical basics of encryption
- Design and analysis of symmetric and asymmetric codes
- Analysis of password systems
- Encryption
- Hidden mining
- Abstracting functions
- Encryption protocols
- Security
- Key management
C) Calculations
- Numerical calculations
- Cloud Computing
- Quantum computing
- Random calculations
- Fuzzy calculations
- Algorithmic calculations
- Computational complexity
- Quantum computing
Subtopics:
- Parallel and distributed computing
- Graph theory, grid models and optimization
- Computational algebra, computational geometry and number theory
- Complexity of algorithms and data structure
- Game theory
- Approximate and online algorithms
- Data mining
- Theoretical foundations of cryptography
- Design and analysis of flow and symmetric format encryption algorithms
- Design and analysis of asymmetric code algorithms and numerical signature schemes
- New methods in encryption (such as post-quantum, functional encryption, hybrid encryption)
- Software and hardware implementation of encryption algorithms
- Side channel attacks and ways to deal with it
- Hidden encryption systems
- Hardware manipulation and methods to deal with it
- Hardware accelerators for security protocols
- Correctness and fault finding of implementations
- Security of wireless and mobile networks
- Security of network infrastructures
- Security of protocols and network layers
- Detection, tracking and intrusion prevention systems
- Security of vital infrastructures
- Authentication and authenticity
- Anonymity, privacy and trust management
- Analysis of security protocols
- Security and trust models
- Formal methods in information security
- Information Security Management System (ISMS)
- Business security and electronic services
- Electronic health security
- Electronic banking security
- Electronic education security
- New algorithms in hiding and marking
- Modeling attacks and marking channels
- Hidden information mining
- Applications of information hiding
- Digital scaling and rooting methods
- Database and network criminalization
- Fraud detection
- Diagnosis and prevention of manipulation
- Malware and anti-malware analysis
The conference fees are as follows:
Conference costs |
Cost in Rials |
The cost of registration and participation in the conference for people whose articles have been accepted (holder of an article) |
4,500,000 |
The cost of submitting any additional article |
1,000,000 |
Please pay the fees through the link in the article acceptance email. If you have any questions, you can contact
Providers of accepted articles should note that live presentations for 15 and 5 minutes Questions and answers Will have. Also, a video for use in special circumstances should be prepared and sent to us. Sending presentation slides and videos, by the deadline and attending the question and answer session live Mandatory Is. Because it is intended as an alternative to physical attendance at the conference.
Each of the providers must make and submit a video of their presentation. The deadline for sending the aforementioned items is until 20 December Is. Slides and videos presented by the presenters will be available only by the participants of the conference. After the presentation, slides and videos will be available to the public on the conference site.
What information should I send?
- A maximum of 15 minutes of video that provides an in-depth description of the work (slides with narration and optional video from the presenter).
- The pure slide should be provided to us in PDF format.
- Also, you have sent us the final version of your article before these items.
Format for sending files
- The video must be in MP4 format.
- The resolution should be 720p or higher. The aspect ratio should be 16:9.
- The presence of subtitles in the movie is optional. (If available, they must be accurate and legible and included in the MP4 file and not separate).
- Slides must be loaded into PDF format.
How do I provide these files?
Screen recording tools: There are different types of screen recording (free/paid) for different operating systems such as Mac and Windows. Make a video of your presentation using these tools and send it to us. (Powerpoint software with narration can also be used.)
Where do you send it?
You can share your file in a place on the internet and send its link via the way sent to the emails of the accepted articles.
Discussions in live meetings
At the time of presentation, providers should be able to connect to the system using Adobe Connect software and at the same time ask their questions and get their answers from the provider.
Tip: Preferably, put your microphone in inactive mode when you are not speaking. Also, try to use a headset or handsfree for better use. Providers can share their image if there is a webcam.
In order to use Adobe Connect software, you can use the following tips.
شماره تلفن:
+982331535770
شماره تلفکس:
+982331539523
پست الکترونیکی:
آدرس سایت:
نشانی دبیرخانه:
سمنان، روبهروی پارک سوکان، دانشکده ریاضی، آمار و علوم کامپیوتر
کد پستی: 19111-35131