Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:03/20/17

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


Security and Communication Networks journal, Special Issue on Emerging and Unconventional: New Attacks and Innovative Detection Techniques, (Submission Due 28 July 2017) [posted here 03/20/17]
Guest Editors: Luca Caviglione (National Research Council of Italy,Italy), Wojciech Mazurczyk (Warsaw University of Technology & FernUniversität in Hagen, Poland), Steffen Wendzel (Fraunhofer FKIE, Germany), and Sebastian Zander (Murdoch University, Australia).

In the last years, advancements of the information and communication technologies have spawned a variety of innovative paradigms, such as cloud and fog computing, the Internet of Things (IoT), or complex vehicle-to-vehicle frameworks. As a consequence, the cybersecurity panorama is now getting populated with complex, emerging, and unconventional attacks, which require deep investigation and proper understanding. For example, the diffusion of online social networks brought social engineering to the next level, while IoT led to a completely new set of hazards also endangering the user at a physical level. Modern threats also exploit a variety of advanced methods to increase their stealthiness in order to remain unnoticed for long periods, as well as reduce the effectiveness of many digital forensics techniques and detection tools. Therefore, new and emerging technologies changed the modern cybersecurity landscape, which nowadays is populated by novel attacks and also requires innovative detection and prevention methods. In this perspective, the special issue aims at investigating the most advanced and innovative forms of attacks and scenarios, for instance, considering automotive or building automation settings. To complete the picture, a relevant attention will be given to works dealing with innovative forms of detection and forensics analysis, which are mandatory to counteract sophisticated malware able to hide or take advantage of unconventional and complex scenarios. This issue accepts high quality papers containing novel original research results and review articles of exceptional merit covering the most cutting-edge cybersecurity threats and countermeasures. Potential topics include but are not limited to the following:
- Novel advanced and persistent threats aiming at automotive and smart buildings/cities
- Security issues and profiling hazards in smart buildings/cities
- IoT and device specific attacks, for example, battery drain attacks or attacks on IoT routing protocols
- Hazards taking advantage from social media, for example, social bots and new social engineering attacks
- Information hiding threats to counteract forensics tools and analysis
- Network steganography for data exfiltration and new information-hiding-capable threats
- Energy-based detection of slow and hidden attacks, including low-attention rising threats for mobile and handheld devices
- Scalable countermeasures for preventing steganography in big-data-like sources
- Novel threats targeting vehicles and cloud and software defined networking technologies
- Bioinspired attacks and detection mechanisms
- Ransomware: novel trends, characteristics, and detection
- Moving Target Defense (MTD) solutions against infections

For more information, please see https://www.hindawi.com/journals/scn/si/761087/cfp/.

Conference and Workshop Call-for-papers

March 2017

TrustBus 2017 14th International Conference on Trust, Privacy, and Security in Digital Business, Lyon, France, August 28-31, 2017. (Submission Due 22 March 2017) [posted here 2/13/17]
TrustBus'2017 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:
- Anonymity and pseudonymity
- Common practices, legal and regulatory issues in digital business
- Delivery technologies and scheduling protocols
- Economics of information systems security and privacy
- Enterprise management and consumer protection
- Intellectual property and digital rights management
- Languages for description of services and contracts
- Models for access control and authentication
- Cryptographic building-blocks for e-business applications
- Business architectures and underlying infrastructures
- Design of business models with security requirements
- Electronic cash, wallets and pay-per-view systems
- Security, privacy and trust in e-services
- Cloud computing security and privacy
- Identity management, identity theft and trust management
- Information audit and trust
- Trust and reputation in digital business environments
- Security and privacy in cyber physical systems
- Methodologies for privacy by design and by default
- Methodologies for privacy impact assessment
- Privacy and Security Patterns
- Security and privacy governance and management
- Intrusion detection and information filtering
- Online transaction processing
- PKI & PMI
- Security of P2P transactions and scenarios
- Security, privacy and trust in real-time Internet e-Services
- Reliability and security of content and data
- Reputation in services provision
- Secure process integration and management
- Reliable auction, e-procurement and negotiation technology
- Transactional Models
- Security, privacy and trust in mobile commerce environments
- Usability of security and privacy technologies and services
- Security and privacy models for pervasive information systems
- Shopping, trading, and contract management tools
- Security and privacy policies
- Multi-factor authentication schemes
- Accountability, Transparency and Intervenability
- Security and privacy in big data systems processing
- Security and privacy of mobile applications

For more information, please see http://www.ds.unipi.gr/trustbus2017/.

RAID 2017 20th International Symposium on Research in Attacks, Intrusions and Defenses, Atlanta, GA, USA, September 18-20, 2017. (Submission Due 28 March 2017) [posted here 12/19/16]
Over the last 20 years, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community. The conference is known for the quality and thoroughness of the reviews of the papers submitted, the desire to build a bridge between research carried out in different communities, and the emphasis given on the need for sound experimental methods and measurement to improve the state of the art in cybersecurity. RAID features a traditional poster session with a walking dinner on the first evening to encourage the presentation of work in progress and the active participation of younger members of the community. In this special year, the 20th anniversary of RAID's creation, we are soliciting research papers on topics covering all well-motivated security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons. Specific topics of interest to RAID include:
- Computer, network and cloud computing security
- SDN for/against security
- Malware and unwanted software
- Program analysis and reverse engineering
- Mobile and Web security and privacy
- Vulnerability analysis techniques
- Usable security and privacy
- Intrusion detection and prevention
- Cyber intelligence techniques and (privacy preserving) threats intel sharing
- Threats against critical infrastructures and mitigation thereof
- Hardware security, Cyber physical systems, IoT security
- Statistical and adversarial learning for computer security
- Cyber crime and underground economies
- The ecosystem behind Denial-of-Service attacks
- Security measurement studies
- Digital forensics
- Computer security visualization techniques

For more information, please see https://www.raid2017.org/.

DSC 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7-10, 2017. (Submission Due 31 March 2017) [posted here 2/27/17]
The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevant to dependability and security concerns are of interest to DSC. Authors are invited to submit original works on research and practice of creating, validating, deploying, and maintaining dependable and secure systems.

For more information, please see http://dsc17.cs.nctu.edu.tw/.

April 2017

CUING 2017 1st International Workshop on Criminal Use of Information Hiding, Held in conjunction with the 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio Calabria, Italy, August 29 - September 1, 2017. (Submission Due 4 April 2017) [posted here 2/13/17]
With the constant rise of the number of Internet users, available bandwidth and an increasing number of services shifting into the connected world, criminals are increasingly active in the virtual world. With improving defensive methods cybercriminals have to utilize more and more sophisticated ways to perform their malicious activities. While protecting the privacy of users, many technologies used in current malware and network attacks have been abused in order to allow criminals to carry out their activities undetected. The aim of the First International Workshop on Criminal Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding (e.g. steganography, covert channels), obfuscation techniques and underground networks (darknets) in order to present novel research regarding the use of data and communication hiding methods in criminal environments and discuss ideas for fighting misuse of privacy enhancing technologies.

For more information, please see https://www.ares-conference.eu/conference/workshops/cuing-2017/.

NSPW 2017 New Security Paradigms Workshop, Islamorada, FL, USA, October 2-4, 2017. (Submission Due 14 April 2017) [posted here 2/20/17]
Since 1992, the New Security Paradigms Workshop (NSPW) has offered a unique forum for information security research involving high-risk, high-opportunity paradigms, perspectives, and positions. The workshop itself is highly interactive with presentations by authors prepared for in-depth discussions, and ample opportunity to exchange views with open-minded peers. NSPW is also distinguished by its deep-rooted tradition of positive feedback, collegiality, and encouragement. NSPW seeks embryonic, disruptive, and unconventional ideas that benefit from early feedback. The ideas are almost always not yet proven, and sometimes infeasible to validate to the extent expected in traditional forums. NSPW seeks ideas pushing the boundaries of science and engineering beyond what would typically be considered mainstream; papers that would be strong candidates in "conventional" information security venues are, as a rule of thumb, a poor fit for NSPW. We welcome papers with perspectives that augment traditional information security, both from computer science and other disciplines that study adversarial relationships (e.g., biology, economics, the social sciences). Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or view problems from an entirely novel angle leading to new solutions. In 2016, more than 50% of the presenters had never attended NSPW before. We are actively trying to continue this trend, and therefore we encourage submissions from new NSPW authors.

For more information, please see http://www.nspw.org/cfp/nspw2017-cfp.pdf.

CNS 2017 5th IEEE Conference on Communications and Network Security, Las Vegas, Nevada, USA, October 9-11, 2017. (Submission Due 14 April 2017) [posted here 3/6/17]
IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in all practical and theoretical aspects of communications and network security.

For more information, please see http://cns2017.ieee-cns.org/.

WCSF 2017 3rd IEEE International Workshop on Cloud Security and Forensics, Held in conjunction with the 16th IEEE International Conference on Trust, Security And Privacy in Computing And Communications (TrustCom2017), Sydney, Australia, August 1-4, 2017. (Submission Due 15 April 2017) [posted here 3/20/17]
Cloud computing offers utility oriented Information and Communications Technology (ICT) services to corporate and consumer-level users all over the world. The evolution of cloud computing is driving the design of datacenters by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cyber security and digital forensic practitioners. The field of digital forensics has grown rapidly over the last decade due to the rise of the Internet and associated crimes. However, while the theory is well established, the practical application of the discipline is still relatively new and constantly developing. Law enforcement agencies can no longer rely on traditional digital forensic methods of data acquisition through device seizure to gather relevant evidence pertaining to an investigation from cloud sources. Using traditional digital forensic methods will lead to the loss or overlooking of valuable evidential material hosted on cloud-based infrastructures. Cloud computing and its impact on digital forensics will continue to grow and traditional digital forensics methods are inadequate for cloud forensic investigations. High quality, previously unpublished submissions are solicited in the areas of cloud security and cloud forensics.

For more information, please see https://forensicsandsecurity.com/workshop.php.

ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017. (Submission Due 19 April 2017) [posted here 2/20/17]
This symposium, the annual European research event in Computer Security, started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Topics of interest include, but are not limited to:
- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- data and computation integrity
- database security
- data protection
- digital content protection
- digital forensics
- distributed systems security
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- information security governance and management
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- privacy preserving data mining
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy for big data
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in content centric networking
- security and privacy in crowdsourcing
- security and privacy in the IoT
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive / ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security and privacy in cyber-physical systems
- security, privacy and resilience in critical infrastructures
- security verification
- software security
- systems security
- trust models and management
- trustworthy user devices
- usable security and privacy
- web security
- wireless security

For more information, please see https://www.ntnu.edu/web/esorics2017/.

May 2017

DASC 2017 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, Orlando, Florida, USA, November 6-10, 2017. (Submission Due 10 May 2017) [posted here 1/23/17]
IEEE DASC 2017 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of particular interests include the following tracks, but are not limited to:
- Autonomic Computing Theory, Models, Architectures and Communications
- Cloud Computing and Fog/edge Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependability Models and Evaluation Algorithms
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- Safety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-Virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security, Dependability and Autonomic Issues in Cyber-Physical System
- Security, Dependability and Autonomic Issues in Big Data, SDN, and IoT Systems
- QoS in Communications and Services
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems

For more information, please see http://cse.stfx.ca/~dasc2017/.

PST 2017 15th Conference on Privacy, Security and Trust, Calgary, Alberta, Canada, August 28-30, 2017. (Submission Due 15 May 2017) [posted here 1/16/17]
PST2017 provides a forum for researchers and practitioners to present their latest research results, developments and ideas in areas of privacy, security and trust. PST 2017 topics are inter-disciplinary across privacy, security and trust. Technologies  of interest include, but are not limited to:
- Access Control
- Adversarial Machine Learning
- Anonymity, Accountability and Audit
- Attacks on Security and Privacy
- Authentication
- Biometrics
- Blockchain and Related Technologies
- Computer and Network Forensics
- Cryptographic Protocols
- Distributed Trust and Consensus
- Formal Methods for Security and Privacy
- Identity Management
- Intrusion Detection
- Key Management
- Metrics for Security and Privacy
- Privacy Preserving/Enhancing Technologies
- Program Analysis for Security and Privacy
- Quantum-resistant Cryptography
- Reputation Systems
- Threat modeling and risk analysis

For more information, please see http://www.ucalgary.ca/pst2017/.

ACM CCS 2017 24th ACM Conference on Computer and Communication Security, Dallas, TX, USA, October 30 - November 3, 2017. (Submission Due 19 May 2017) [posted here 1/23/17]
The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. From its inception, CCS has established itself as a high-standard research conference in its area.

For more information, please see https://www.sigsac.org/ccs/CCS2017.

GraMSec 2017 International Workshop on Graphical Models for Security, Santa Barbara, CA, USA, August 21, 2017. (Submission Due 21 May 2017) [posted here 2/20/17]
Graphical security models provide an intuitive but systematic approach to analyze security weaknesses of systems and to evaluate potential protection measures. Cyber security researchers, as well as security professionals from industry and government, have proposed various graphical security modeling schemes. Such models are used to capture different security facets (digital, physical, and social) and address a range of challenges including vulnerability assessment, risk analysis, defense analysis, automated defensing, secure services composition, policy validation and verification. The objective of the GraMSec workshop is to contribute to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of graphical models for security.

For more information, please see http://gramsec.uni.lu.

June 2017

ACSAC 2017 33rd Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 4-8, 2017. (Submission Due 1 June 2017) [posted here 1/23/17]
The Annual Computer Security Applications Conference (ACSAC) is an internationally recognized forum where practitioners, researchers, and developers in information and system security meet to learn and to exchange practical ideas and experiences. If you are developing, researching, or implementing practical security solutions, consider sharing your experience and expertise at ACSAC. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:
- Access Control
- Anonymity
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Security case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Embedded Systems Security
- Enterprise Security Management
- Evaluation and Compliance
- Digital Forensics
- Identity Management
- Incident Response
- Insider Threat Protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security

For more information, please see http://www.acsac.org.

ISDDC 2017 International Conference on Intelligent, Secure and Dependable Systems in Distributed and Cloud Environments, Vancouver, BC, Canada, October 25-27, 2017. (Submission Due 10 June 2017) [posted here 3/13/17]
The integration of network computing and mobile systems offers new challenges with respect to the dependability of integrated applications. At the same time, new threat vectors have emerged that leverage and magnify traditional hacking methods, enabling large scale and intelligence-driven attacks against a variety of platforms, including mobile, cloud, Internet-of-things (IoT), as well as conventional networks. The consequence of such fast evolving environment is the pressing need for effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems. This conference solicits papers addressing issues related to the design, analysis, and implementation, of dependable and secure infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems. The goal of the ISDDC 2017 conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.

For more information, please see http://www.scs.ryerson.ca/iwoungan/ISDDC17/.

GameSec 2017 8th Conference on Decision and Game Theory for Security, Vienna, Austria, October 23-25, 2017. (Submission Due 29 June 2017) [posted here 2/20/17]
The goal of GameSec is to bring together academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results that highlight the connection between game theory, control, distributed optimization, economic incentives and real world security, reputation, trust and privacy problems in a variety of technological systems. Submissions should solely be original research papers that have neither been published nor submitted for publication elsewhere.
- Game theory and mechanism design for security and privacy
- Pricing and economic incentives for building dependable and secure systems
- Dynamic control, learning, and optimization and approximation techniques
- Decision making and decision theory for cybersecurity and security requirements engineering
- Socio-technological and behavioral approaches to security
- Risk assessment and risk management
- Security investment and cyber insurance
- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems
- New approaches for security and privacy in cloud computing and for critical infrastructure
- Security and privacy of wireless and mobile communications, including user location privacy
- Game theory for intrusion detection
- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy

For more information, please see http://www.gamesec-conf.org/cfp.php.

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.