The Sixth International Conference on Graph Theory and Information Security 2022August 29-31, 2024Bandung, Indonesia
https://math.sci.unhas.ac.id/icgtis-vi/
The International Conference on Graph Theory and Information Security VI 2024 will be held in Makassar, South Sulawesi, Indonesia on August 29 – 31, 2024. The conference will focus on work-in-progress: problem-oriented papers and an emphasis on informal discussions.
This conference was initially conducted in 2007. Starting in 2015, it was conducted every two years, hosted by various universities in Indonesia, and was supported by the Indonesia Combinatorial Society (InaCombS). The sixth conference was planned to take place in 2024. The ICGTIS VI 2024 is conducted in Celebrating Anna Llado and Oriol Serra. The conference will be conducted in hybrid mode.
Graph Theory is one of the most active branches in Mathematics which nowadays receives tremendous advances and developments due to their applications to information technology. Many concepts and algorithms arise from this field have significant advantages in telecommunication, biotechnology, security databases, cryptography, and even social sciences. Information Security has been also fastly developed recently. Its development has been stimulating the advances of graph theory, and vice versa.
One of the goals of this conference is to bring together Indonesian researchers from both academia and industry with researchers in these fields from abroad to share their recent research results. We will invite speakers from high outstanding researchers in Graph theory and Information Security.
Selected papers from the conference will be published as a special volume in the Electronic Journal of Graph Theory and Applications (EJGTA – Scopus Q2), Journal of Indonesian Mathematical Society (JIMS – Scopus Q4), Indonesia Journal of Combinatorics (IJC – Sinta S2), or Jurnal Matematika, Statistika, dan Computasi (JMSK – Sinta S3). Papers will be refereed in keeping with the standards of EJGTA, JIMS, IJC, and JMSK.
Authors are invited to submit papers presenting original and unpublished research in any areas of graph theory and information security, including but not limited to:
Keynote and Invited Speakers
Besides presentations of accepted papers from contributors, the program of the conference will include 5 lectures from keynote speakers and 3 lectures from invited speakers.
Keynote Speakers
Invited Speakers
Committee
Program Committee:
Organizing Committee
Key dates