Scope

6th International Conference on Cryptography and Blockchain (CRBL 2026)

Topics

Access Control and Intrusion Detection, Artificial Immune Systems, Authentication, Authentication and Non-repudiation, Autonomy-Oriented Computing, Biological & Evolutionary Computation, Biometric Security

Submission System

Authors are invited to submit papers through the Conference Submission System.

Proceedings

Hard copy of the proceedings will be distributed during the Conference.

Welcome to CRBL 2026!

Scope 

6th International Conference on Cryptography and Blockchain (CRBL 2026) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:



Topics of Interest

  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Blockchain Attacks on Existing Systems
  • Blockchain Consensus Algorithms
  • Blockchain Foundations
  • Blockchain in digital forensic
  • BlockChain issues and trends
  • Blockchain New Design
  • Blockchain Privacy
  • Blockchain Scalability
  • Blockchain Authentication and authorization
  • Blockchain based security for the IoT
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic protocols
  • Cryptography and Coding
  • Data & System Integrity
  • E- Commerce
  • Data Integrity
  • Fuzzy Systems
  • Identification and Authentication
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • Key management
  • Models for Authentication, Trust and Authorization
  • Privacy and authentication
  • Quantum cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust models and metrics
  • Untraceability

Proceedings

The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series(Confirmed). Hard copy of the proceedings will be distributed during the Conference.

Important Dates

Submission Deadline

Authors Notification

Registration & Camera-Ready Paper Due