|
Last Modified:7/28/25
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
IEEE Transactions on Privacy.
(Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page.
For more information, please see
https://www.computer.org/csdl/journals/pr.
ACM Distributed Ledger Technologies: Research and Practice,
Special Issue on Distributed Ledger Technologies for Trustworthy Internet of Vehicles.
(Submission Due 31 August 2025) [posted here 4/7/25]
Guest Editors: Haitham Mahmoud (Birmingham City University, UK),
Junaid Arshad (Birmingham City University, UK),
Mohammed Alsadi (Verizon, USA), and
Ahmed Khan (Verizon, USA).
The incorporation of smart road technology into the Internet of Vehicles (IoV)
presents an opportunity for revolutionizing the transportation industry, offering
improved traffic flow, safety, economic prospects, reduced
environmental impact, and secure data transmission. However, as vehicle connectivity escalates and smart
infrastructure becomes more integrated, data security and privacy concerns have grown. Due to the possibility of
unauthorized access to sensitive information or system manipulation by malicious actors within the IoV
ecosystem, the need to implement robust security measures to protect data and maintain privacy is particularly
critical. Vehicles can connect directly (V2V) or through infrastructure (V2I) in the IoV through using a variety of
communication mechanisms. To improve safety and navigation, this cooperative environment enables vehicles to
share vital information like traffic updates and road conditions. The reputation/trust mechanisms of the vehicles
are essential in ensuring the reliability and trustworthiness of the information shared. This robust security
framework mitigates the risk of attacks like malicious data injection or hacking of autonomous vehicles,
safeguarding not only data integrity but, critically, human lives and safety within the transportation industry.
Centralized systems are insufficient for the decentralised nature of the IoV and may pose security and privacy risks
by requiring trust in third-party systems. Maintaining privacy, safeguarding the network, and optimizing the use
of resources present difficulties for such decentralized networks. These issues can be resolved by decentralised
technologies such as Distributed Ledger Technologies (DLTs), which offer efficient, transparent, and safe ways to
build and preserve trust by sending trustworthy information. Incorporating trust from trusted vehicles within a
reputation system poses challenges in maintaining privacy, securing network interactions, ensuring
decentralization, and resource-efficient computations, while necessitating real-time trust score aggregation that
considers device limitations to uphold both vehicle security and privacy.
This special issue centres on the state-of-the-art (latest) developments in privacy, reputation, and trust
management within the IoV utilising DLTs, blockchain and smart contracts, highlighting aspects like trust
measurement, peer recommendations, and misbehaviour detection, along with addressing privacy concerns and
associated threats in the IoV. We encourage submissions that emphasise trust, reputation, privacy, and their
associated threats within the IoV decentralized system (i.e., DLTs, Blockchains, etc.).
For more information, please see
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/ACM-CFP-DLT-Trustworthy-IoV-1712343333363.pdf.
Journal of Systems Architecture,
Special Issue on Security and Privacy in AIoT-enabled Smart Cities.
(Submission Due 31 August 2025) [posted here 3/17/25]
Guest Editors: Qin Liu (Hunan University, China),
Kouichi Sakurai (Kyushu University, Japan),
Richard Hill (University of Huddersfield, UK), and
Wenjia Li (New York Institute of Technology, USA).
In a smart city, numerous artificial intelligence of things (AIoT) communicate and collaborate to
improve our quality of life. Both artificial intelligence (AI) and Internet of things (IoT) are foundational
technologies that have been interacting with each other to realize a smart life. As massive amounts of sensitive
data are generated, processed, and exchanged through IoT devices and AI technologies, one of the fundamental
problems is how to provide intelligent services in smart cities without compromising security and privacy.
This special issue aims to bring together researchers and practitioners in IoT, AI, and network security,
to share their novel ideas and latest findings in relation to security and privacy in AIoT-enabled smart cities.
For more information, please see
https://www.sciencedirect.com/special-issue/313735/security-and-privacy-in-aiot-enabled-smart-society.
July 2025
APWG eCrime 2025
20th APWG Symposium on Electronic Crime Research,
San Diego, CA, USA, November 4-7, 2025.
(Submission Due 29 July 2025) [posted here 3/17/25]
The 2025 Symposium on Electronic Crime Research (eCrime 2025) will examine
essential factors for managing the impacts of the global cybercrime plexus
to secure IT users, commercial enterprises, governments, critical infrastructure,
and operational technologies. eCrime 2025 will be the 20th annual peer-reviewed,
publishing symposium hosted by APWG.
This year, eCrime 2025 inaugurates a dimensional extension of the symposium's
purview to include research on cyber-physical crimes. From 2025 forward, eCrime
will specifically solicit research on cybercrimes involving cyber-physical systems
and operational technologies abused in the furtherance of any crime. This expands
eCrime's scope from purely cyber (digital) crimes to include those that manifest abuse
against physical spaces, such as homes, commercial enterprises, scientific or military
facilities, roadways, public spaces, critical infrastructure and devices (e.g. IoT,
electro-mechanical controllers, sensors, etc.).
With the rise of cyber attacks inflicting physical damage - as exhibited in the
Stuxnet attacks, the cyber incursions against the Ukrainian electrical grid a
decade ago and the Colonial pipeline shutdown - as well as the rapid evolution of
malware designed to manipulate SCADA and ICS process control technologies, it w
as clear eCrime's CFP scope had to be expanded once more to maintain relevance to
the contemporary cyber threatscape.
For more information, please see
https://apwg.org/events/ecrime2025.
August 2025
HealthSec 2025
Workshop on Cybersecurity in Healthcare,
Co-located with the Annual Computer Security Applications Conference (ACSAC41),
Honolulu, HI, USA, December 9, 2025.
(Submission Due 1 August 2025) [posted here 6/2/25]
In its most basic form, healthcare is gathering data, interpreting data into
information, and transforming information into current human knowledge that can
be acted upon, with each of these stages open to unintended errors and/or malicious
subversion. These stages do not occur within a vacuum but rather within our existing
infrastructures and social system with all their current limitations, systemic bias,
and exploitable vulnerabilities. While a similar characterization can be made about
security in other applied domains, healthcare is undergoing a dramatic transformation,
arguably the next technological revolution, presenting immediate opportunities for
improvement along with corresponding challenges in security.
Our desire is to bring together diverse researchers from academia, government, and
the healthcare industry to report on the latest research efforts. As this is the
second workshop following a first workshop that exceeded all expectations, we want
to continue momentum toward encouraging, jumpstarting, and growing excellent
interdisciplinary contributions at the forefront of cybersecurity in healthcare
research. Papers with demonstrated results will be given priority.
For more information, please see
https://publish.illinois.edu/healthsec2025/.
NDSS 2026
Network and Distributed System Security,
San Diego, CA, USA, February 23-27, 2026.
(Submission Due 23 April 2025 and 6 August 2025) [posted here 4/14/25]
The Network and Distributed System Security (NDSS) Symposium is a top venue that fosters
information exchange among researchers and practitioners of network and distributed system security. The NDSS
Symposium 2026 and co-located workshops will take place in San Diego, CA, from 23 to 27 February 2026. The
target audience includes everyone interested in practical aspects of network and distributed system security,
with a focus on system design and implementation. A major goal is to encourage and enable the Internet community
to apply, deploy, and advance the state of practical security technologies.
This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their
paper in a way that makes the results accessible and compelling to a general security researcher. All
submissions will be reviewed by the Program Committee and accepted submissions will be published by the
Internet Society in the Proceedings of NDSS Symposium 2026. The Proceedings will be made freely accessible
from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for
noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first
page of the paper. The authors are thus free to post the camera-ready versions of their papers on their
personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly
prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2026/submissions/call-for-papers/.
TPS 2025
7th IEEE International Conference on Trust, Privacy and Security in Intelligent
Systems, and Applications,
Pittsburgh, PA, USA, November 11-14, 2025.
(Submission Due 8 August 2025) [posted here 7/21/25]
Recent advances in computing and information technologies such as
IoT, mobile Edge/Cloud computing, cyber-physical-social systems, Artificial
Intelligence/Machine Learning/ Deep Learning, etc., have paved way for creating next
generation smart and intelligent systems and applications that can have transformative
impact in our society while accelerating rapid scientific discoveries and innovations.
Such newer technologies and paradigms are getting increasingly embedded in the
computing platforms and networked information systems/infrastructures that form the
digital foundation for our personal, organizational and social processes and activities.
It is increasingly becoming critical that the trust, privacy and security issues in
such digital environments are holistically addressed to ensure the safety and
well-being of individuals as well as our society. IEEE International Conference on
Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS-ISA)
is an international multidisciplinary forum for presentation of state-of-the-art
innovations, and discussion among academic, industrial researchers, and
practitioners on issues related to trust, privacy and security in emerging
smart and intelligent systems and applications.
For more information, please see
https://www.sis.pitt.edu/lersais/conference/tps/2025/.
ICISS 2025
21st International Conference on Information Systems Security,
Indore, India, December 16-20, 2025.
(Submission Due 10 August 2025) [posted here 4/14/25]
ICISS is a premier international conference on information security and privacy. The ICISS
conference provides a dynamic platform for researchers, academicians, and industry professionals worldwide
to discuss and explore advancements in cybersecurity, cryptography, system security, and hardware security.
Since its inception in 2005, the conference has fostered impactful research collaborations, addressing emerging
security challenges in computing and information systems. With keynote talks by leading experts, technical
paper presentations, hands-on workshops, and panel discussions, ICISS 2025 aims to facilitate knowledge
exchange and shape the future of digital security.
For more information, please see
https://iciss.isrdc.in.
XRSecurity 2025
Workshop on Security, Privacy, and Trust in Extended Reality Systems,
Held in conjunction with ACM MobiHoc 2025,
Houston, TX, USA, October 27-30, 2025.
(Submission Due 10 August 2025) [posted here 6/9/25]
Extended Reality (XR) is a comprehensive term that includes Augmented
Reality (AR), Mixed Reality (MR), and Virtual Reality (VR). XR bridges physical and
digital worlds, creating interactive, immersive experiences that merge with the real
world. It offers numerous applications across education, training, manufacturing,
collaborative 3D design, art, and multiplayer gaming.
Despite these benefits, XR systems introduce unique security, privacy, and trust
challenges due to the intimate connection between users, their XR devices, and their
immediate environments. The potential attacks can involve information flooding to
induce latency and physical discomfort, injecting misleading virtual content to distract
or deceive users, subverting personal area networks to create confusion, spoofing alarms,
assessing user status through eye tracking, and accessing onboard cameras to gather
environmental information without the user's awareness. Additionally, XR apps can access
sensitive real-time inputs like eye gaze, head movement, hand gestures, and even biosignals,
and users' immediate environment. These signals, while critical for immersive experiences,
open up novel attack surfaces such as keystroke inference, emotional profiling, and
behavioral tracking. This workshop will explore the security, privacy, and trust
challenges in XR systems, along with potential solutions.
For more information, please see
https://xrsecurity.github.io/2025/.
USENIX Security 2026
35th USENIX Security Symposium,
Baltimore, MD, USA, August 12-14, 2026.
(Submission Due 26 August 2025 and 5 February 2026) [posted here 5/19/25]
The USENIX Security Symposium brings together researchers, practitioners, system programmers,
and others interested in the latest advances in the security and privacy of computer systems and networks.
The Call for Papers and a self-nomination form to serve on the program committee will be available soon.
For more information, please see
https://www.usenix.org/conference/usenixsecurity26.
TPHAC 2025
IEEE Workshop on Trustworthy and Privacy-Preserving Human-AI Collaboration,
Co-located with IEEE International Conference on CIC/TPS/CogMI,
Pittsburgh, PA, USA, November 11-14, 2025.
(Submission Due 31 August 2025) [posted here 7/21/25]
This workshop explores the evolving relationship between humans and AI
systems, with a focus on fostering trustworthy and privacy-preserving collaboration.
As AI capabilities grow and its presence in daily life expands, it is essential that
these systems align with human values to remain responsible, effective, and secure.
Although human-AI collaboration offers significant potential for enhanced decision-making
and societal benefit, it also raises critical challenges, such as privacy risks, trust
and safety concerns, and cybersecurity threats across diverse domains.
Our goal is to foster interdisciplinary dialogue and shape a roadmap for effective
and trustworthy human-AI collaboration. We invite contributions that bridge the gap
between machine intelligence and human understanding, particularly in shared
decision-making scenarios. The workshop promotes the development of adaptive, hybrid, and
emerging AI systems that respond to dynamic contexts while respecting human agency
and enhancing human capabilities. We welcome insights from user studies and the design
of collaborative frameworks that strengthen trust, transparency, privacy, and security.
We also encourage discussions addressing key questions such as: What methods and
metrics are needed to evaluate human-AI teams effectively? What factors influence
trust, performance, and responsible AI deployment?
For more information, please see
https://sites.google.com/pitt.edu/tphac/home.
PETS 2026
26th Privacy Enhancing Technologies Symposium,
Location TBD, July, 2026.
(Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 26th PETS is expected to be a
hybrid event with a physical gathering (location TBD) and a concurrent virtual event.
Papers undergo a journal-style reviewing process, and accepted papers are published
in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of
accepted papers are strongly encouraged to attend and present at the physical event,
where their presentations can be recorded for the virtual event and where they can
participate directly in in-person research, technical, and social activities.
However, in-person attendance is not strictly required for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges or
article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are
notified of the decisions about two months after submission. Authors will receive a
decision of accept, revise, or reject. Those receiving revise will be invited to
revise their article with the guidance of a revision editor according to a well-defined
set of revision criteria and will have up to four months to attempt to complete the
required revisions. Authors of rejected papers must skip a full issue prior to
resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer
concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into
consideration during the discussion. New for 2026: The authors will be able to submit a
separate, 250-word rebuttal response to each individual review (rather than a single
response that addresses all reviews).
For more information, please see
https://petsymposium.org/cfp26.php.
September 2025
SaTML 2026
4th IEEE Conference on Secure and Trustworthy Machine Learning,
Munich, Germany, March 23-25, 2026.
(Submission Due 24 September 2025) [posted here 7/7/25]
IEEE SaTML expands upon the theoretical and practical understandings of
vulnerabilities inherent to machine learning (ML), explores the robustness of learning
algorithms and systems, and aids in developing a unified, coherent scientific community
aiming to establish trustworthy machine learning. Topics of interest include
(but are not limited to):
- Novel attacks on machine learning
- Novel defenses for machine learning
- Secure and safe machine learning in practice
- Verification of algorithms and systems
- Privacy in machine learning
- Forensic analysis of machine learning
- Fairness and interpretability
- Trustworthy data curation
For more information, please see
https://satml.org/.
IFIP 119 DF 2026
22nd Annual IFIP WG 11.9 International Conference on Digital Forensics,
New Delhi, India, January 5-6, 2026.
(Submission Due 30 September 2025) [posted here 6/9/25]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active
international community of scientists, engineers and practitioners dedicated to advancing
the state of the art of research and practice in digital forensics. The Twenty-Second
Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for
presenting original, unpublished research results and innovative ideas related to the
extraction, analysis and preservation of all forms of electronic evidence. Papers and
panel proposals are solicited. All submissions will be refereed by a program committee
comprising members of the Working Group. Papers and panel submissions will be selected
based on their technical merit and relevance to IFIP WG 11.9. The conference will be
limited to approximately 60 participants to facilitate interactions between researchers
and intense discussions of critical research issues. Keynote presentations, revised
papers and details of panel discussions will be published as an edited volume Ð the
twenty-second volume in the well-known Research Advances in Digital Forensics book
series (Springer, Cham, Switzerland) during the summer of 2026.
For more information, please see
http://www.ifip119.org/.
October 2025
November 2025
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, MAY 18-21, 2026.
(Submission Due 5 June 2025 and 13 November 2025) [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
PETS 2026
26th Privacy Enhancing Technologies Symposium,
Location TBD, July, 2026.
(Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 26th PETS is expected to be a
hybrid event with a physical gathering (location TBD) and a concurrent virtual event.
Papers undergo a journal-style reviewing process, and accepted papers are published
in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of
accepted papers are strongly encouraged to attend and present at the physical event,
where their presentations can be recorded for the virtual event and where they can
participate directly in in-person research, technical, and social activities.
However, in-person attendance is not strictly required for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges or
article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are
notified of the decisions about two months after submission. Authors will receive a
decision of accept, revise, or reject. Those receiving revise will be invited to
revise their article with the guidance of a revision editor according to a well-defined
set of revision criteria and will have up to four months to attempt to complete the
required revisions. Authors of rejected papers must skip a full issue prior to
resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer
concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into
consideration during the discussion. New for 2026: The authors will be able to submit a
separate, 250-word rebuttal response to each individual review (rather than a single
response that addresses all reviews).
For more information, please see
https://petsymposium.org/cfp26.php.
December 2025
January 2026
February 2026
PETS 2026
26th Privacy Enhancing Technologies Symposium,
Location TBD, July, 2026.
(Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 26th PETS is expected to be a
hybrid event with a physical gathering (location TBD) and a concurrent virtual event.
Papers undergo a journal-style reviewing process, and accepted papers are published
in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of
accepted papers are strongly encouraged to attend and present at the physical event,
where their presentations can be recorded for the virtual event and where they can
participate directly in in-person research, technical, and social activities.
However, in-person attendance is not strictly required for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges or
article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are
notified of the decisions about two months after submission. Authors will receive a
decision of accept, revise, or reject. Those receiving revise will be invited to
revise their article with the guidance of a revision editor according to a well-defined
set of revision criteria and will have up to four months to attempt to complete the
required revisions. Authors of rejected papers must skip a full issue prior to
resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer
concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into
consideration during the discussion. New for 2026: The authors will be able to submit a
separate, 250-word rebuttal response to each individual review (rather than a single
response that addresses all reviews).
For more information, please see
https://petsymposium.org/cfp26.php.
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
IEEE Transactions on Privacy,
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page. More
information can be found at
https://www.computer.org/csdl/journals/pr.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|