Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:7/30/18

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


Springer International Journal of Information Security, Special Issue on IoT Security and Privacy, (Submission Due 1 October 2018) [posted here 03/5/18]
Guest Editors: akeshi Takahashi (National Institute of Information and Communications Technology, Japan), Rodrigo Roman Castro (Universidad de Malaga, Spain), Ryan Ko (University of Waikato, New Zealand), Bilhanan Silverajan (Tampere University of Technology, Finland), and Said Tabet (Dell EMC, USA).

The Internet is gradually transforming from a communication platform for conventional IT appliances into the Internet of Things (IoT), increasingly interconnecting many assorted devices and sensors. These devices are generally referred as IoT devices, and many of them are inexpensive and can be constrained in terms of energy, bandwidth and memory. The establishment of IoT ecosystems in various domains is bringing multiple benefits to human users and companies alike. Example of such domains include Smart Homes, Smart Cities, the Industrial Internet and even Intelligent Transportation Systems. However, the IoT as a whole - including related paradigms such as Machine-to-Machine (M2M) and Cyber-Physical Systems (CPS) - is susceptible to a multitude of threats. In fact, many IoT devices currently are insecure and have many security vulnerabilities. For example, many vulnerable IoT devices which have been infected with malware have subsequently become comprised into large botnets, resulting in devastating DDOS attacks. Consequently, ensuring the security of such IoT ecosystems - before, during, and after an attack takes place - is a crucial issue for our society at this moment. This special issue aims to collect contributions by leading-edge researchers from academia and industry, show the latest research results in the field of IoT security and privacy, and provide valuable information to researchers as well as practitioners, standards developers and policymakers. Its aim is to focus on the research challenges and issues in IoT security. Manuscripts regarding novel algorithms, architectures, implementations, and experiences are welcome. Topics include but are not limited to:
- Secure protocols for IoT devices
- Privacy solutions and privacy helpers for IoT environments
- Trust frameworks and secure/private collaboration mechanisms for IoT environments
- Secure management and self-healing for IoT environments
- Operative systems security for IoT devices
- Security diagnosis tools for IoT devices
- Threat and vulnerability detection in IoT environments
- Anomaly detection and prevention mechanisms in IoT networks
- Case studies of malware analysis in IoT environments
- IoT forensics and digital evidence
- Testbeds and experimental facilities for IoT security analysis and research
- Standardization activities for IoT security
- Security and privacy solutions tailored to specific IoT domains and ecosystems

For more information, please see https://link.springer.com/journal/10207.

IEEE Internet of Things Journal, Special Issue on Secure Embedded IoT Devices for Resilient Critical Infrastructures, (Submission Due 1 October 2018) [posted here 7/23/18]
Guest Editors: Cristina Alcaraz (University of Malaga, Spain), Mike Burmester (Florida State University, USA), Jorge Cuellar (Siemens, Germany), Xinyi Huang (Fujian Normal University, China), Panayiotis Kotzanikolaou (University of Piraeus, Greece), and Mihalis Psarakis (University of Piraeus, Greece).

The Internet of Things (IoT) opens the door to new technological opportunities for a wide range of applications that cover e-health, smart homes and automation, e-commerce, location-based services, smart vehicles, fleet management and remote system monitoring. However, at the same time as these technological opportunities grow so does the threat surface for potential adversaries targeting at various, interconnected ICT systems and consequently at ICT-dependent critical systems, such as SCADA (Supervisory Control and Data Acquisition Systems) systems. At this point, attackers could take advantage from the incorporation of the paradigm to exploit new security gaps, probably caused by unforeseen interoperability and adaptability problems.

Indeed, the deployment of Internet-enabled embedded devices that are distributed over major critical domains, may create indirect and non-obvious inter-connections with the underlying Critical Infrastructures (CIs). Examples of such inter-connected systems may include traffic monitoring and control systems communicating with smart vehicles, energy related systems communicating with smart homes and smart meters, monitoring systems connected with autonomous sensors in nuclear plants, power grids and body area networks. There is a need to further explore the security issues related to IoT technologies to assure the resilience of CIs against advanced IoT-based attacks. The goal of this special issue is therefore to address the diverse security challenges and related to IoT-enabled CIs (IoT-CIs) and their resilience to advanced threats.

Suggested topics include, but are not limited to, the following:
- Security analysis and requirements in the coupling of IoT-CIs - Vulnerabilities, threat models and risk management in IoT-CIs
- Reference architectures for the secure coupling of IoT in CI scenarios
- Embedded security for mobile devices and BYOD
- Network-layer attacks and defense mechanisms between IoT devices and CIs
- Key management and access control in IoT-CIs
- Resilience models for advanced threats in IoT-CIs
- Advanced and lightweight awareness models for large IoT-CIs
- Privacy and location privacy for IoT-CIs

For more information, please see http://ieee-iotj.org/wp-content/uploads/2018/07/CFP-SI-Secure-Embedded-IoT-Devices-for-Resilient-CIs.pdf.

Human-centric Computing and Information Sciences, Thematic Issue on Security, Trust and Privacy for Human-centric Internet of Things, (Submission Due 30 October 2018) [posted here 7/30/18]
Guest Editors: Kyung-Soo Lim (Electronics and Telecommunication Research Institute, Korea), Isaac Woungang (Ryerson University, Canada), Javier Lopez (University of Malaga, Spain), Sherali Zeadally (University of Kentucky, USA), and Damien Sauveron (XLIM (UMR CNRS 7252 / Universite de Limoges), France).

The aim of this thematic series is to publish articles that cover the various developments in theory and practice related to the latest methods, solutions, and case studies in security, trust, and privacy for human-centric internet of things (IoT). Submitted articles should present research contributions that help solve the challenges that arise in developing a secure and privacy-aware human-centric IoT. This can be achieved by proposing security policies, algorithms, protocols, frameworks, and solutions for human-centric IoT ecosystems. We also welcome high-quality review articles, which focus on the analysis and integration of diverse kinds of approaches such as artificial intelligence cognitive computing, blockchain, big data mining, or soft computing in the area of human-centric IoT security. Topics of interest include but are not limited to:
- Security and privacy issues in human-centric IoT
- Trust management for human-centric IoT
- Intrusion detection technique for human-centric IoT
- Artificial intelligence for secure human-centric IoT
- Cognitive computing for secure human-centric IoT
- Social considerations, legal, and ethics in human-centric IoT security
- Blockchain for human-centric IoT security
- Cyber-attack detection and prevention systems for human-centric IoT
- Biometric security in human-centric IoT
- Reverse engineering for human-centric IoT
- Human-centric IoT security using digital forensics investigation
- Big data mining for privacy-aware human-centric IoT
- Innovative deep learning approach for human-centric IoT security
- Fuzzy fusion of Information, data and sensors
- Advance persistent threats in human-centric IoT

For more information, please see https://hcis-journal.springeropen.com/securityhciot.

IEEE Internet Computing Magazine, Special Issue on the Meaning of Identity on the Internet, (Submission Due 4 December 2018) [posted here 7/9/18]
Guest Editors: Hilarie Orman (Purple Streak, Inc., USA) and Kent Seamons (Brigham Young University, USA).

An online identity used to be a simple login name for a time-sharing system, but today an online presence consists of a fabric of identities created through websites, apps, and constantly evolving social media. We constantly deal with people, things, and institutions that have attributes and history that are varied, subject to change, secured through questionable practices, and authenticated both formally and informally. How do we transfer the concept of ÒwhoÓ to an Internet environment? This special issue will explore new trends in identity granting, establishment, verification, management, use, and trust in an Internet computing environment. We would like to highlight methods that have the potential for easily enabling identities to be used for a variety of Internet purposes. We envision a Internet with a secure identity ecosystem that meets the needs of the worldÕs population of billions of individuals and objects while balancing privacy and accountability.

The technologies of the future may include blockchain, smart identity contracts, artificial intelligence, functional encryption, expanded use of social media identities, identity aggregation techniques, new types of biometrics, etc. We are interested in articles that cover how they can contribute to the overall vision. Topics of interest include but arenÕt limited to the following:
- Methods and architectures that enable decentralized identity granting
- Bringing digital online identities to the digitally disadvantaged
- Attributing trust to an Internet identity
- Innovation in secure identity management
- New methods of proving identity
- Usability issues in managing multiple identities

For more information, please see https://publications.computer.org/internet-computing/2018/05/31/meaning-identity-internet-call-papers/.

Conference and Workshop Call-for-papers

July 2018

BigTrust 2018 2nd International Workshop on Trust, Security and Privacy for Big Data, Chengdu, China, October 9-12, 2018. (Submission Due 30 July 2018) [posted here 6/18/18]
Big Data has the potential for enabling new insights to change science, engineering, medicine, healthcare, finance, business, and ultimately society itself. Current work on Big Data focuses on information processing such as data mining and analysis. However, trust, security and privacy of Big Data are vital concerns that have received less research focus. Regarding the above context, this workshop proposal is aimed at bringing together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. BigTrust 2018 is a part of MASS 2018, the 15th IEEE International Conference on Mobile Ad-hoc and Sensor Systems.

For more information, please see http://res.hnu.edu.cn/hbs/Bigtrust2018/.

August 2018

SP 2019 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-22, 2019. (Submission Due first day of each month) [posted here 06/12/17]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
- Access control and authorization
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship resistance
- Cloud security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection and prevention
- Malware and unwanted software
- Mobile and Web security and privacy
- Language-based security
- Network and systems security
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy for the Internet of Things
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Usable security and privacy
This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers
As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings.

Workshops
The Symposium is also soliciting submissions for co-located workshops. Further details on submissions can be found at https://www.ieee-security.org/TC/SP2018/workshops.html.

Ongoing Submissions
To enhance the quality and timeliness of the scientific results presented as part of the Symposium, and to improve the quality of our reviewing process, IEEE S&P now accepts paper submissions 12 times a year, on the first of each month. The detailed process can be found at the conference call-for-papers page.
.
For more information, please see https://www.ieee-security.org/TC/SP2019/cfpapers.html.

NDSS 2019 26th Annual Network and Distributed System Security Symposium, San Diego, California, USA, February 24-27, 2019. (Submission Due 7 August 2018) [posted here 07/02/18]
The Network and Distributed System Security Symposium is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. Technical papers and panel proposals are solicited. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2019. The Proceedings will be made freely accessible from the Internet Society webpages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent. Submissions are solicited in, but not limited to, the following areas:
- Anti-malware techniques: detection, analysis, and prevention
- Cyber-crime defense and forensics (e.g., anti-phishing, anti-blackmailing, anti-fraud techniques)
- Security for future Internet architectures and designs (e.g., Software-Defined Networking)
- Implementation, deployment and management of network security policies
- Integrating security in network protocols (e.g., routing, naming, and management)
- Cyber attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response
- Software/firmware analysis, customization, and transformation for systems security
- Privacy and anonymity in networks and distributed systems
- Security and privacy for blockchains and cryptocurrencies
- Public key infrastructures, key management, certification, and revocation
- Security for cloud/edge computing
- Security and privacy of mobile/smartphone platforms
- Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
- Security for emerging networks (e.g., home networks, IoT, body-area networks, VANETs)
- Security for large-scale, critical infrastructures (e.g., electronic voting, smart grid)
- Security and privacy of systems based on machine learning and AI
- Security of Web-based applications and services (e.g., social networking, crowd-sourcing)
- Special problems and case studies: e.g., tradeoffs between security and efficiency, usability, cost, and ethics
- Usable security and privacy
- Trustworthy Computing software and hardware to secure networks and distributed systems

For more information, please see https://www.ndss-symposium.org/ndss2019/ndss-2019-call-for-papers/.

NordSec 2018 23rd Nordic Conference on Secure IT Systems, Oslo, Norway, November 28-30, 2018. (Submission Due 10 August 2018) [posted here 03/26/18]
NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. In addition to regular research paper submissions, we invite participants to present their ideas in poster sessions during lunches and coffee breaks. NordSec 2018 welcomes contributions within, but not limited to, the following areas:
- Access control and security models
- Applied cryptography
- Blockchains
- Cloud security
- Commercial security policies and enforcement
- Cryptanalysis
- Cryptographic protocols
- Cyber crime, warfare, and forensics
- Economic, legal, and social aspects of security
- Enterprise security
- Hardware and smart card security
- Mobile and embedded security
- Internet of Things and M2M security
- Internet, communication, and network security
- Intrusion detection
- Language-based techniques for security
- New ideas and paradigms in security
- Operating system security
- Privacy and anonymity
- Public-key cryptography
- Security and machine learning
- Security education and training
- Security evaluation and measurement
- Security management and audit
- Security protocols
- Security usability
- Social engineering and phishing
- Software security and malware
- Symmetric cryptography
- Trust and identity management
- Trusted computing
- Vulnerability testing
- Web application security

For more information, please see https://securitylab.no/nordsec18/.

September 2018

SP 2019 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-22, 2019. (Submission Due first day of each month) [posted here 06/12/17]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
- Access control and authorization
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Censorship resistance
- Cloud security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Forensics
- Hardware security
- Intrusion detection and prevention
- Malware and unwanted software
- Mobile and Web security and privacy
- Language-based security
- Network and systems security
- Privacy technologies and mechanisms
- Protocol security
- Secure information flow
- Security and privacy for the Internet of Things
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Usable security and privacy
This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers
As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate. Submissions will be distinguished by the prefix “SoK:” in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings.

Workshops
The Symposium is also soliciting submissions for co-located workshops. Further details on submissions can be found at https://www.ieee-security.org/TC/SP2018/workshops.html.

Ongoing Submissions
To enhance the quality and timeliness of the scientific results presented as part of the Symposium, and to improve the quality of our reviewing process, IEEE S&P now accepts paper submissions 12 times a year, on the first of each month. The detailed process can be found at the conference call-for-papers page.
.
For more information, please see https://www.ieee-security.org/TC/SP2019/cfpapers.html.

CODASPY 2019 9th ACM Conference on Data and Application Security and Privacy, Dallas, TX, USA, March 25-27, 2019. (Submission Due 3 September 2018) [posted here 7/2/18]
CODASPY has had eight successful years and the goal of the conference is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

For more information, please see http://www.codaspy.org.

FPS 2018 11th International Symposium on Foundations & Practice of Security, Montreal, Canada, November 13-15, 2018. (Submission Due 3 September 2018) [posted here 7/30/18]
We invite researchers and practitioners from all countries working in security, privacy, trustworthy data systems and related areas to participate in the event. Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital to the normal functioning of all aspects of our world. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the mathematical, computer science and engineering communities. The aim of FPS is to discuss and exchange theoretical and practical ideas that address security issues in inter-connected systems. It aims to provide scientific presentations as well as to establish links, promote scientific collaboration, joint research programs, and student exchanges between institutions involved in this important and fast moving research field. We also invite papers from researchers and practitioners working in security, privacy, trustworthy data systems and related areas to submit their original papers.

For more information, please see http://fps2018.encs.concordia.ca/call-for-papers/.

IFIP 11.9 DF 2019 15th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 28-30, 2019. (Submission Due 17 September 2018) [posted here 5/28/18]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately sixty participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fifteenth volume in the well-known Research Advances in Digital Forensics book series (Springer, Heidelberg, Germany) during the summer of 2019. Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Embedded device forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org.

October 2018

EuroSP 2019 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 17-19, 2019. (Submission Due 13 November 2018) [posted here 7/9/18]
The IEEE European Symposium on Security and Privacy (EuroS&P) is the European sister conference of the established IEEE S&P symposium. It is a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy. The emphasis is on building or attacking real systems, even better if actually deployed, rather than presenting purely theoretical results. Papers may present advances in the design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Papers that shed new light on past results by means of sound theory or thorough experimentation are also welcome. Topics of interest include:
- Access control
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Blockchain
- Censorship and censorship-resistance
- Cloud security
- Cryptography with applied relevance to security and privacy
- Distributed systems security
- Embedded systems security
- Forensics
- Formal methods for security
- Hardware security
- Human aspects of security and privacy
- Intrusion detection
- IoT security and privacy
- Language-based security
- Malware
- Metrics
- Mobile security and privacy
- Network security
- Privacy-preserving systems
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- Security usability
- System security
- Web security and privacy

For more information, please see https://www.ieee-security.org/TC/EuroSP2019/cfp.php.

November 2018
December 2018

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.