CALL FOR PAPERS
Original contributions from researchers, academicians, industry experts and students addressing state-of-the-art research and describing their original, unpublished, research work which is not currently under review by another conference or journal and are invited to share their work in all areas and its societal applications but not limited to the conference tracks.
Earlier IEEE ICBDS Publications Proceedings and also Scopus Indexed
IEEE ICBDS 2022
IEEE Xplore®: IEEE ICBDS 2022 Proceedings
Scopus Indexed Profile Page: IEEE ICBDS 2022 (Record no. 25690)
IEEE ICBDS 2023
IEEE Xplore®: IEEE ICBDS 2023 Proceedings
Scopus Indexed Profile Page: IEEE ICBDS 2023 (Record no. 26701)
Paper Submission through Microsoft CMT: https://cmt3.research.microsoft.com/IEEEICBDS2024
Conference tracks
- Distributed Ledger
- Distributed Consensus
- Smart Contract and Chain Code
- Blockchain Platforms
- Decentralized App Development
- Protocols
- Data Structures and Algorithms Based on Blockchain
- Tokenization
- Technology Policy and Ethics in Technology
- Smart Contracts Verification and Generation
- Blockchain in Edge and Cloud Computing
- Blockchain in the Internet of Things (IoT)
- Blockchain, Big Data, and AI
- Blockchain Interoperability
- Distributed Database Technologies for Blockchain
- Blockchain in Fog and Cloud Computing
- Integration of Artificial Intelligence in Blockchain-based Systems
- Blockchain and Cryptocurrency
- Healthcare
- Blockchain for Data Security
- Blockchain Managed Services
- Internet of Behaviors
- Blockchain-based Applications & Services
- Distributed Supply Chains
- Blockchain-based Security Solutions for Smart Cities Infrastructures
- Blockchain in Social Networking
- Information and Network Security
- Network Intrusion Detection and Prevention
- Security Models and Protocols
- Security, Privacy, Attacks, and Forensics
- Blockchain and Security
- Distributed Trust
- Vulnerabilities and Attacks in Blockchain-based Systems
- Access Control
- Decentralized Identity
- Secure Multiparty Computing
- Privacy-enhancing Computation
- Cybersecurity Mesh
- Self Sovereign Identity Blockchains
- Provenance with Blockchain
- Dependable and Trustworthy Computing and Systems
- Cryptosystems, Algorithms, Primitives
- Security and Privacy in Networked Systems
- System Security
- Multimedia Security
- Security Modeling
- Experiments, Simulation, and Tools
- AI/ML for Privacy and Security
- Security of AI/ML Models
- Lightweight Cryptographic Algorithms for Constrained Environments
- Key Management and Distribution
- Distributed Computing
- Cloud Computing
- Grid Computing
- Fog Computing
- Pervasive and Ubiquitous Computing
- Quantum Computing
- High-performance, Cluster, Cloud, and Grid Computing
- Edge Computing
- Mobile and Wireless Computing
- Scalable Computing and Communications
- Volunteer Computing
- Data Centric Computing and Data Intensive Computing
- Heterogeneous Computing
- Autonomic Computing
- Reconfigurable Computing
- Middleware
- Distributed Resource Management and Scheduling
- Fault-tolerance, Reliability
- Peer-to-Peer Systems
- Overlay Networks
- Distributed Real-Time Systems
- Load Balancing Algorithms
- Network and Communication System Design
- Decentralized/Collaborative System
- Distributed AI/ML Models
Important Dates
Date | Event |
---|---|
Full Paper Submission | |
Notification of Acceptance | |
Camera Ready Paper Submission | |
17th - 19th October 2024 | Conference Dates |
Author Instructions:
Please comply with the following guidelines:
- All papers must be in English.
- The paper must discuss only new and previously unpublished results.
- The paper must be formatted according to the IEEE Manuscript Templates for Conference Proceedings, have a minimum of four pages, and must not exceed 6 pages, including figures and references.
- The paper must address at least one category specified in the Call for Papers.
Additional guidelines:
- The plagiarism check will be done on all submitted papers. Plagiarism and self-plagiarism applies to all previously published work, irrespective of whether the other publication is inside or outside of IEEE. We are very serious about Plagiarism Content; we accept only original articles. The article may be rejected at any time if found plagiarized. For more information refer IEEE page – Plagiarism FAQs.
- All papers that are accepted must be presented at the conference. In case a paper is not presented at the conference, it shall be deemed a “no-show.” No-shows will be removed from post-conference distribution.
- All accepted, registered, and presented papers will be submitted to IEEE for possible inclusion in IEEE Xplore® digital library.