Cipher Upcoming Conferences
Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 


Calls for Papers

Last Modified:6/3/19

Upcoming Conferences and Workshops

Note: The submission date has passed.

June 2019

SACMAT 2019 24th ACM Symposium on Access Control Models and Technologies, Toronto, Canada, June 4-6, 2019. [posted here 10/15/18]
The organizing committee of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019) invites contributions in all aspects of access control. The symposium will provide participants the opportunity to present work at different levels of development, from early work on promising ideas to fully developed technical results as well as system demonstrations. Papers offering novel research contributions are solicited for submission. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. In addition to the regular research track, this year SACMAT will again host a special track -- ìBlue Sky/Vision Trackî. Researchers are invited to submit papers describing promising new ideas and challenges of interest to the community as well as access control needs emerging from other fields. We are particularly looking for potentially disruptive and new ideas which can shape the research agenda for the next 10 years. We encourage submissions that present ideas that may have not been completely developed and experimentally evaluated. Submissions to the regular track covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following:
- Access control for edge computing
- Applications
- Applied machine learning for access management
- Attribute-based systems
- Authentication
- Big data
- Biometrics
- Blockchain
- Cloud computing and network access control management
- Cryptographic approaches
- Cyber attacks and network dynamics
- Cyber-physical systems and Internet of Things (IoT)
- Databases and data management
- Data protection on untrusted infrastructure
- Design methodology
- Distributed and mobile systems
- Economic models and game theory
- Enforcement mechanisms
- Hardware enhanced security
- Identity management
- Identification of and protection from data leakage
- Mechanisms, systems, and tools
- Models and extensions
- Obligations
- Privacy-aware access control
- Policy engineering and analysis
- Requirements
- Risk and uncertainty
- Safety analysis
- Theoretical foundations
- Trust management
- Usability

For more information, please see http://www.sacmat.org/.

AIBlock 2019 1st International Workshop on Application Intelligence and Blockchain Security, Held in Conjunction With ACNS 2019, Bogota, Colombia, June 5-7, 2019. [posted here 1/21/19]
This workshop attempts to provide a platform for professionals from academia and industry to discuss challenges and potential solutions in this direction. We seek submissions describing either theoretical or practical solutions in relation to application intelligence security and blockchain security. Topics of interest include, but are not limited to:
- Authentication
- Blockchain Platforms
- Blockchain-based Applications
- Cryptocurrency Analysis
- Data and System Integrity
- Data Protection
- Database Security
- Decentralized Application Development
- Formal Method
- Intrusion Detection
- Smart Contracts
- Trust and Privacy of Applications
- Vulnerability Analysis

For more information, please see http://aiblock2019.compute.dtu.dk/.

CLOUDS&P 2019 1st Workshop on Cloud Security and Privacy, Bogota, Colombia, June 5-7, 2019. [posted here 1/28/19]
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient, and on-demand accesses to a shared pool of configurable computing resources. However, the widespread adoption of cloud is still being hindered by various serious security and privacy concerns. CLOUD S&P aims to provide a platform for researchers and practitioners to present and discuss a wide-range of security and privacy issues and their solutions to ensure better protection in a cloud ecosystem. This workshop invites submissions on new attacks and solutions on various cloud-centric technologies, as well as short surveys and case studies that shed light on the security implications of clouds.

For more information, please see http://cloudsp2019.encs.concordia.ca.

CNS 2019 IEEE Conference on Communications and Network Security, Washington, D.C., USA, June 10-12, 2019. [posted here 11/19/18]
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in communications and network security. Particular topics of interest include, but are not limited to:
- Anonymity and privacy technologies
- Censorship countermeasures and privacy
- Combating cyber-crime (anti-spam, anti-phishing, anti-fraud techniques, etc.)
- Computer and network forensics
- Cyber deterrence strategies
- Game-theoretic security technologies
- Implementation and evaluation of networked security systems
- Information-theoretic security
- Intrusion detection, prevention, and response
- Key management, public key infrastructures, certification, revocation, and authentication
- Malware detection and mitigation
- Security metrics and models
- Physical-layer and cross-layer security technologies
- Security and privacy for big data
- Security and privacy for data and network outsourcing services
- Security and privacy for mobile and wearable devices
- Security and privacy in cellular networks
- Security and privacy in cloud and edge computing
- Internet Security: protocols, standards, measurements
- Security and privacy in crowdsourcing
- Security and privacy in cyber-physical systems
- Security and privacy in emerging wireless technologies and applications (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications, MIMO systems, smart/connected vehicles, UAS, etc.)
- Security and privacy in peer-to-peer and overlay networks
- Security and privacy in WiFi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay tolerant, and social networks.
- Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
- Security for critical infrastructures (smart grids, transportation systems, etc.)
- Security for future Internet architectures and designs
- Security for software-defined and data center networks
- Security in machine learning
- Social, economic, and policy issues of trust, security, and privacy
- Traffic analysis
- Usable security and privacy
- Web, e-commerce, m-commerce, and e-mail security

For more information, please see http://cns2019.ieee-cns.org/.

SSIoT 2019 1st IEEE EuroS&P Workshop on Software Security for Internet of Things, Co-located with IEEE EuroS&P 2019, Stockholm, Sweden, June 16, 2019. [posted here 1/14/19]
The Internet of Things (IoT), connecting large numbers of small embedded devices to the internet, is currently being deployed in critical infrastructures, factories, hospitals, smart buildings, and so on. Compromised or faulty IoT components and systems can cause catastrophic damage to individuals, companies, and society. However, existing software for IoT has not been designed with security as a main objective, but rather to cope with constrained memory, power, processing, and bandwidth resources. Consequently, techniques are needed by which software for IoT can achieve a highest level of security and safety. Such techniques are getting mature for other domains, in particular for mainstream computing systems, but IoT devices feature peculiar characteristics that hinder employing conventional software security techniques. There is a great push to bring advanced software security to IoT. At the same time, a targeted scientific IoT software security forum for discussions, publications and networking is currently lacking. The IEEE Workshop on Software Security for IoT (SSIoT) 2019 is the first international conference focusing primarily on the software security for the Internet of Things (IoT). SSIoT aims to provide a forum for exploring and evaluating ideas on bringing secure software to IoT and a venue to publish novel research ideas on this topic. SSIoT strongly encourages proposals of new, speculative ideas, evaluations of new or known techniques in practical settings, and discussions of emerging threats and important problems. We are especially interested in position papers that are radical, forward-looking, and likely to lead to lively and insightful discussions that will influence future research on IoT security.

For more information, please see http://www.cse.chalmers.se/~russo/ssiot19/.

EuroSP 2019 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 17-19, 2019. [posted here 7/16/18]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Following this story of success, IEEE initiated the European Symposium on Security and Privacy (EuroS&P), which is organized every year in a European city. It is a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy. The emphasis is on building or attacking real systems, even better if actually deployed, rather than presenting purely theoretical results. Papers may present advances in the design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Papers that shed new light on past results by means of sound theory or thorough experimentation are also welcome. Topics of interest include:
- Access control
- Accountability
- Anonymity
- Application security
- Attacks and defenses
- Authentication
- Blockchain
- Censorship and censorship-resistance
- Cloud security
- Cryptography with applied relevance to security and privacy
- Distributed systems security
- Embedded systems security
- Forensics
- Formal methods for security
- Hardware security
- Human aspects of security and privacy
- Intrusion detection
- IoT security and privacy
- Language-based security
- Malware
- Metrics
- Mobile security and privacy
- Network security
- Privacy-preserving systems
- Protocol security
- Secure information flow
- Security and privacy policies
- Security architectures
- Security usability
- System security
- Web security and privacy

For more information, please see https://www.ieee-security.org/TC/EuroSP2019/.

DIMVA 2019 16th International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Gothenburg, Sweden, June 19-20, 2019. [posted here 12/1/18]
The annual DIMVA conference serves as a premier forum for advancing the state of the art in the broader areas of intrusion detection, malware analysis, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas. DIMVA is organized by the special interest group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI). DIMVA solicits submissions of high-quality, original scientific papers presenting novel research on malware analysis, intrusion detection, vulnerability assessment, and related systems security topics.

For more information, please see https://www.dimva2019.org/.

GraMSec 2019 International Workshop on Graphical Models for Security, Co-located with CSF 2019 Hoboken, NJ, USA, June 24, 2019. [posted here 3/4/19]
The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security researchers, as well as security professionals from the industry and government, have proposed various graphical security models, metrics, and measurements. Graphical models are used to capture different security facets and address a range of challenges including security assessment, automated defence, secure services composition, security policy validation, and verification. For example, attack graphs, attack trees, attack-defence trees, and attack countermeasure trees represent possible ways of attacking and defending a system while misuse cases and mal-activity diagrams capture threats and abusive behaviour of users. This year, we encourage excellent submissions related, but not restricted, to the following broad headings:
- Graph representations: mathematical, conceptual, and implemented tools for describing and reasoning about security
- Logical approaches: formal logical tools for representing and reasoning about graphs and their use as modelling tools in security
- Machine learning: modelling and reasoning about the role of big data and machine learning in security operations
- Networks in national security: terrorist networks, counter-terrorism networks; safety in national infrastructure (e.g., utilities and transportation)
- Risk analysis and management: models of risk management in business and organizational architectures
- Social networks: using and reasoning about social graphs, network analysis, network protocols, social mapping, sociometry. Preference will be given to papers likely to stimulate high-quality debate at the Workshop.

For more information, please see http://gramsec.uni.lu.

July 2019

CPSS 2019 5th ACM Cyber-Physical System Security Workshop, Held in conjunction with ACM AsiaCCS 2019, Auckland, New Zealand, July 8, 2019. [posted here 12/10/18]
Cyber-Physical Systems (CPS) of interest to this workshop consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. There exist a multitude of CPS devices and applications deployed to serve critical functions in our lives thus making security an important non-functional attribute of such systems. This workshop will provide a platform for professionals from academia, government, and industry to discuss novel ways to address the ever-present security challenges facing CPS. We seek submissions describing theoretical and practical solutions to security challenges in CPS. Submissions pertinent to the security of embedded systems, IoT, SCADA, smart grid, and other critical infrastructure are welcome.

For more information, please see http://jianying.space/cpss/CPSS2019/.

TrustData 2019 10th International Workshop on Trust, Security and Privacy for Big Data, Atlanta, USA, July 14-17, 2019. [posted here 12/17/18]
The proliferation of new technologies such as Internet of Things and cloud computing calls for innovative ideas to retrieve, filter, and integrate data from a large number of diverse data sources. Big Data is an emerging paradigm applied to datasets whose volume/velocity/variability is beyond the ability of commonly used software tools to manage and process the data within a tolerable period of time. More importantly, Big Data has to be of high value, and should be protected in an efficient way. Since Big Data involves a huge amount of data that is of high-dimensionality and inter-linkage, existing trust, security, and privacy measures for traditional databases and infrastructures cannot satisfy its requirements. Novel technologies for protecting Big Data are attracting researchers and practitioners with more and more attention. The 10th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2019) aims to bring together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data.

For more information, please see http://www.spaccs.org/trustdata2019/.

Blockchain 2019 IEEE International Conference on Blockchain, Atlanta, GA, USA, July 14-17, 2019. (Submission Due 1 April 2019) [posted here 10/15/18]
The emergence and popularity of blockchain techniques will significantly change the way of digital and networking systems’ operation and management. In the meantime, the application of blockchain will exhibit a variety of complicated problems and new requirements, which brings more open issues and challenges for research communities. The goal of this conference is to promote community-wide discussion identifying the advanced applications, technologies and theories for blockchain. We seek submissions of papers that invent novel techniques, investigate new applications, introduce advanced methodologies, propose promising research directions and discuss approaches for unsolved issues.

For more information, please see http://www.blockchain-ieee.org/.

DBSec 2019 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, Charleston, SC, USA, July 15-17, 2019. [posted here 12/17/18]
DBSec is an annual international conference covering research in data and applications security and privacy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security. Topics of interest include, but are not limited to:
- access control
- anonymity
- applied cryptography in data security
- authentication
- big data security
- data and system integrity
- data protection
- database security
- digital rights management
- distributed and decentralised security
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security
- organisational and social aspects of security
- privacy
- secure cloud computing
- secure distributed systems
- secure information integration
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security management and audit
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- Web security
- wireless and mobile security

For more information, please see https://dbsec2019.cse.sc.edu/.

PET 2019 19th Privacy Enhancing Technologies Symposium, Stockholm, Sweden, July 16–20, 2019. [posted here 09/17/18]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). PoPETs, a scholarly, open access journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs is published by De Gruyter Open, the world's second largest publisher of open access academic content, and part of the De Gruyter group, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges. Submitted papers to PETS/PoPETs should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised versions. Papers accepted for an issue in the PoPETS 2019 volume must be presented at the symposium PETS 2019.

For more information, please see https://petsymposium.org/cfp19.php.

August 2019

SciSec 2019 2nd International Conference on Science of Cyber Security, Nanjing, China, August 9-11, 2019. [posted here 3/18/19]
The conference solicits high-quality, original research papers that can justifiably help achieve the ultimate Science of Cyber Security. The conference is organized by the Nanjing University of Posts and Telecommunications. This new forum aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than the building-block perspective.

For more information, please see http://www.sci-cs.net.

USENIX-Security 2019 28th USENIX Security Symposium, Santa Clara, CA, USA, August 14-16, 2019. [posted here 10/15/18]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The USENIX Security Symposium is moving to multiple submission deadlines for USENIX Security í19. This change includes changes to the review process and submission policies. Detailed information is available on the USENIX Security Publication Model Changes web page at www.usenix. org/conference/usenixsecurity19/publication-model-change. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. There will be two quarterly submission deadlines for USENIX Security í19. The fall quarter submissions deadline is Thursday, November 15, 2018, 5:00 pm PST. The winter quarter submissions deadline is Friday, February 15, 2019, 5:00 pm PST. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 12 and 13.

For more information, please see https://www.usenix.org/conference/usenixsecurity19.

IWSEC 2019 14th International Workshop on Security, Tokyo, Japan, August 28-30, 2019. [posted here 3/18/19]
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2019. Topics of interest for IWSEC 2019 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops.

For more information, please see https://www.iwsec.org/2019/.

September 2019

ISC 2019 22nd Information Security Conference, New York, NY, USA, September 16-18, 2019. [posted here 2/11/19]
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications. Papers on all technical aspects of information security and privacy are solicited for submission.

For more information, please see https://isc2019.cs.stonybrook.edu/.

RAID 2019 International Symposium on Research in Attacks, Intrusions and Defenses, Beijing, China, September 23-25, 2019. [posted here 2/18/19]
Since its inception in 1997, the International Symposium on Research in Attacks, Intrusions and Defenses (RAID) has established itself as a venue where leading researchers and practitioners from academia, industry, and the government are given the opportunity to present novel research in a unique venue to an engaged and lively community. This year we are soliciting research papers on topics covering all well-motivated computer security problems. We care about techniques that identify new real-world threats, techniques to prevent them, to detect them, to mitigate them or to assess their prevalence and their consequences. Measurement papers are encouraged, as well as papers offering public access to new tools or datasets, or experience papers that clearly articulate important lessons learned. Specific topics of interest to RAID include, but are not limited to:
- Authentication
- Blockchain Platforms
- Blockchain-based Applications
- Cryptocurrency Analysis
- Data and System Integrity
- Data Protection
- Database Security
- Decentralized Application Development
- Formal Method
- Intrusion Detection
- Smart Contracts
- Trust and Privacy of Applications
- Vulnerability Analysis

For more information, please see http://www.raid-2019.org/callForPapers.html.

CRITIS 2019 14th International Conference on Critical Information Infrastructures Security, Linkoping, Sweden, September 23-25, 2019. [posted here 3/11/19]
CRITIS 2019 aims at bringing together researchers, professionals from academia, critical (information) infrastructure operators, industry, defence sector and governmental organisations working in the field of the security of critical (information) infrastructure systems. Moreover, CRITIS aims to encourage and inspire early stage and open-minded researchers in this demanding multi-disciplinary field of research. Outstanding research performance demonstrated by young researchers may compete for the Young CRITIS Award (YCA). The Projects' Dissemination Session will be an opportunity of dissemination for ongoing European, multinational, and national projects, to share the experiences among scientist and experts working on different projects in the C(I)IP domain.

For more information, please see https://critis2019.on.liu.se/.

ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019. [posted here 1/21/19]
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the 2019 Symposium, to be held in Luxembourg. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Topics of interest include, but are not limited to:
- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- blockchain and finance security
- data and computation integrity
- database security
- data protection
- deep learning for attack and defense
- digital content protection
- digital forensics
- distributed systems security
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- information security governance and management
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- privacy preserving data mining
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy for big data
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in content centric networking
- security and privacy in crowdsourcing
- security and privacy in the IoT
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive / ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security and privacy in cyber-physical systems
- security, privacy and resilience in critical infrastructures
- security verification
- software security
- systems security
- trust models and management
- trustworthy user devices
- usable security and privacy
- web security
- wireless security

For more information, please see https://esorics2019.uni.lu.

SecDev 2019 IEEE Secure Development Conference, McLean, VA, USA, September 25-27, 2019. [posted here 3/11/19]
SecDev is a venue for presenting ideas, research, and experience about how to develop secure systems. It focuses on theory, techniques, and tools to "build security in" to existing and new computing systems. SecDev aims to bridge the gap between constructive security research and practice and to enable real-world impact of security research in the long run. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. We solicit research papers, position papers, systematization of knowledge papers, and "best practice" papers. All submissions should present novel results, provide novel perspectives and insights, or present new evidence about existing insights or techniques. SecDev also seeks hands-on and interactive tutorials on processes, frameworks, languages, and tools for building security in as well as posters and tool demos, and abstracts from practitioners to share their practical experiences and challenges in secure development. Areas of interest include (but are not limited to):
- Security-focused system designs (HW/SW/architecture)
- Tools and methodology for secure code development
- Risk management and testing strategies to improve security
- Security engineering processes, from requirements to maintenance
- Programming languages, development tools, and ecosystems supporting security
- Static program analysis for software security
- Dynamic analysis and runtime approaches for software security
- Automation of programming, deployment, and maintenance tasks for security
- Distributed systems design and implementation for security
- Privacy by design
- Human-centered design for systems security
- Formal verification and other high-assurance methods for security
- Code reviews, red teams, and other human-centered assurance

For more information, please see https://secdev.ieee.org/.

October 2019

SecureComm 2019 1st ACM conference on Advances in Financial Technologies October, Zurich, Switzerland, October 21-23, 2019. [posted here 2/25/19]
The first ACM conference on Advances in Financial Technologies (AFT’19) aims to be a premier venue presenting the latest developments in technologies related to novel financial infrastructure such as cryptocurrencies and their applications, blockchains, and exchanges. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of relevant systems. We solicit previously unpublished papers offering novel research contributions, including Systemization of Knowledge (SoK) papers. Topics of interest include, but are not limited to:
- Blockchains and blockchain technologies
- Consensus protocols
- Permissioned blockchains
- High-performance transaction processing
- Centralized and decentralized exchanges
- Threat models and attacks
- Cryptoassests
- Client and network security
- Security analysis of operational systems
- Custody solutions
- Anonymity and privacy
- Metrics, measurements, and network forensics
- Proof-of-work, -stake, -burn, and alternatives
- Smart contracts and applications
- Smart contract security: formal analysis, correct by design, security frameworks
- Scalability issues and solutions
- User studies
- Technical repercussions of economic, legal, ethical, regulatory, and societal aspects
- Transaction graph analysis
- Financial markets
- Relationship to traditional payment systems
- Fraud detection and financial crime prevention
- Case studies (e.g., of adoption, attacks, forks, scams, etc.)
- Applications of blockchain and cryptocurrencies
- Censorship resistance
- Quantum-resistant cryptography, quantum algorithms and quantum
- cryptography in financial technologies
- Hardware to aid financial technologies

For more information, please see https://aft.acm.org.

SecureComm 2019 15th EAI International Conference on Security and Privacy in Communication Networks, Orlando, FL, USA, October 23-25, 2019. [posted here 2/25/19]
SecureComm seeks high-quality research contributions, which have not been previously published or in parallel submission to another conference or journal. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.

For more information, please see http://securecomm.org.