Scopes
Network security: electronic payment Network firewall Network Protocol access control Identity verification and identification cryptography Network attacks and defense data encryption Cloud data security and privacy Internet of Things privacy protection Intrusion detection Secure terminal system Secure operating system database security Security infrastructure Security assessment Malicious software feature extraction Malware detection Privacy protection mechanism cryptographic algorithm key management Distributed database cloud computing Security architecture Facial recognition Data Desensitization Intrusion detection and defense data encryption Vulnerability detection identity authentication Collaborative computing Digital Economy: Smart contracts and verification Cryptocurrency Distributed ledger Decentralized financial services Digital Asset Management Digital payment data sharing data mining Data analysis Blockchain Technology and Regional Economy
Submission Portal
If you have any questions or need any help about the conference, please feel free to contact our conference experts on the right:
姚老师
TEL:19980549140
QQ:1912800772
E-mail:iccde@sub-paper.com
About Plagiarism Check
Crosscheck Powered by iThenticate will be used for plagiarism check. The amount of duplication from previously published content should be less than 20%; If the amount of duplication is 20% - 35%, modification maybe required; if the amount of duplication exceeds 35%, the article will be rejected. Please note that there will be no refund for no-shows.