| |
Last Modified:12/8/25
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
IEEE Transactions on Privacy.
(Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page.
For more information, please see
https://www.computer.org/csdl/journals/pr.
Electronics Journal,
Special Issue on Data Privacy Protection in Blockchain Systems,
(Submission Due 15 March 2026) [posted here 9/29/25]
Guest Editors: Zijian Bao (The Hong Kong Polytechnic University, Hong Kong),
Yunhao Ling (The Hong Kong Polytechnic University, Hong Kong), and
Zhuangzhuang Zhang (City University of Hong Kong, Hong Kong).
Data privacy protection has become a fundamental concern in the era of blockchain
technologies, especially with the rapid development of Web3, stablecoins, decentralized finance (DeFi),
and other blockchain-based applications. As blockchain systems continue to expand their influence
across various sectorsÑincluding finance, healthcare, supply chains, and the digital economyÑensuring
robust privacy protection for users and transactions is of paramount importance.
This Special Issue aims to address the emerging challenges and opportunities related to data
privacy in blockchain environments. We are particularly interested in research that explores
innovative privacy-preserving mechanisms, theoretical foundations, practical implementations,
and real-world applications within blockchain and distributed ledger technologies. Topics of
interest include privacy-preserving protocols and cryptographic techniques, data privacy solutions
for Web3 applications and decentralized identity, and privacy challenges and solutions for
stablecoins and digital assets, as well as privacy in decentralized finance and smart contract
platforms. We are also keen to receive submissions on regulatory and compliance aspects,
cross-chain privacy and interoperability, privacy risk assessment and mitigation, and case
studies or practical deployments of privacy protection in blockchain.
We also welcome submissions beyond these topics, as long as they are relevant to data
privacy protection in blockchain systems. Our aim is to encourage a broad and diverse range
of contributions in this rapidly evolving field.
For more information, please see
https://www.mdpi.com/journal/electronics/special_issues/14QMWO4O7C.
December 2025
HOST 2026
19th IEEE International Symposium on Hardware Oriented Security and Trust,
Washington DC, USA, May 4-7, 2026.
(Submission Due 1 September 2025 and 8 December 2025) [posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier
symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008,
HOST has served as the globally recognized event for researchers and practitioners to advance knowledge
and technologies related to hardware security and assurance. HOST 2026 invites original contributions
in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security,
AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic
techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs,
post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection,
side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution
environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT
security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture,
blockchain, and cryptocurrency security.
For more information, please see
https://host.conferences.computer.org/2026/.
ACM ASIACCS 2026
21st ACM ASIA Conference on Computer and Communications Security,
Bangalore, India, June 1-5, 2026.
(Submission Due 25 August 2025 and 12 December 2025) [posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to
all real-world aspects of security and privacy. We seek articles presenting accessible and
compelling results to general computer security researchers. Purely theoretical (e.g.,
cryptography-focused, with no security/application connections) submissions are not
encouraged. The same applies for submissions focusing primarily on blockchains or
machine learning. As in previous years, we will also be accepting ÒSystemisation of KnowledgeÓ
(SoK) papers. SoK submissions need to add the prefix ÒSoKÓ in the title and a checkbox on the
submission form. They will be accepted based on the value to the community. Survey papers
without insights evaluating, systematizing and contextualizing current knowledge will be rejected.
For more information, please see
https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.
January 2026
ICBC 2026
8th IEEE International Conference on Blockchain and Cryptocurrency,
Brisbane, Australia, June 1-5, 2026.
(Submission Due 7 January 2026) [posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026),
sponsored by the IEEE Communications Society, has established itself as the flagship annual
conference in blockchain research, maintaining the highest standards of academic excellence.
We invite original, unpublished submissions in all areas of blockchain and cryptocurrency
research. In addition to established topics, ICBC 2026 welcomes emerging directions such as
Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical)
Internet Infrastructure.
For more information, please see
https://icbc2026.ieee-icbc.org/.
ACM CCS 2026
33rd ACM Conference on Computer and Communications Security,
Hague, The Netherlands, November 15-19, 2026.
(Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer
security and privacy. Theoretical papers must make a convincing case for the relevance of
their results to practice. Authors are encouraged to write the abstract and introduction
of their paper in a way that makes the results accessible and compelling to a general
computer-security researcher. In particular, authors should bear in mind that anyone on
the program committee may be asked to review any paper.
All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding
deadline. Submitted papers must not substantially overlap with papers that have been
published or accepted for publication, or that are simultaneously in submission to a
journal, conference, or workshop with published proceedings. All submissions should be
properly anonymized. Papers should avoid revealing authors' identity in the text. When
referring to their previous work, authors are required to cite their papers in the third
person, without identifying themselves. In the unusual case in which a third-person
reference is infeasible, authors can blind the reference itself. Papers not
properly anonymized may be rejected without review. Authors may submit up to a maximum
of 7 papers at each cycle .
All submitted papers will be evaluated based on their merits, particularly their
importance to practical aspects of computer and communications security and privacy,
novelty, quality of execution, and presentation. Note that CCS does not accept
SoK or survey papers.
Authors are expected to consider the ethical implications and potential societal
impact of their work. Papers that raise ethical concerns, such as those involving
human subjects, user data, or real-world vulnerability analysis, must include a
dedicated "Ethical Considerations" section. This section should discuss the
balance of risks vs. benefits and the steps taken to minimize potential harm (e.g.,
responsible disclosure, data anonymization). Note that institutional (IRB/ERB)
approval is neither strictly necessary nor always sufficient to demonstrate ethical
conduct; we expect authors to reason about the ethics of their work beyond ensuring
institutional compliance. For detailed guidance on community standards, we follow
the USENIX Security'26 Ethics Policy. This section does not count toward the page
limit and should be placed after the 12-page main content.
This edition of ACM CCS adopts an Open Science policy to strengthen the transparency,
reproducibility, and long-term impact of published research. Authors are expected to
share the artifacts underlying their results (such as code, datasets, models,
scripts, and documentation) whenever legally, ethically, and practically possible.
Each submitted paper must include an ``Open Science" appendix. More details can be
found on the conference call for papers page.
Providing Artifacts at Submission Time: Artifacts are required for submissions
whose contributions fundamentally rely on an implementation, experimental evaluation,
system, tool, or dataset. This includes, but is not limited to, papers that:
(1) Introduce a new system, library, or tool.
(2) Present experimental results derived from an implementation.
(3) Propose a new benchmark, dataset, or data collection methodology.
If reviewers determine that a central contribution cannot be properly evaluated without
accessing artifacts that are neither provided nor convincingly justified in the Open
Science appendix (as required by the Open Science Policy), the paper may be rejected.
All artifacts will be treated with the same strict confidentiality as the manuscript.
Access is restricted to the assigned PC members, who may use artifacts only for the
purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for
personal or professional purposes constitutes a serious ethical violation and may
result in removal from the PC and additional sanctions (such as bans on future
service or submissions).
Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on
Authorship regarding the use of generative AI tools. More details about the guidelines
when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT,
Claude, Copilot) can be found on the conference call for papers page.
Special note for Machine Learning papers submitting to CCS: Machine learning
has become pervasive across security and privacy research. To ensure papers are directed
to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we
provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy
issue, submit the paper in the track that better aligns with the primary field of the
problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security
or privacy of ML itself, the Security and Privacy of Machine Learning track is the right
fit. This must also be stated in the Track Justification Statement, clarifying the authors'
decision not to submit to a domain-specific track (e.g., Web Security, Software
Security).
The paper evaluation needs to be linked to the threat model and scenario motivating the
paper. Strong submissions produce generalizable contributions such as frameworks for
risk assessment, attack patterns that generalize across models, systematic problem
characterizations, or principled defenses with clear justification. Papers that present
collections of examples or trial-and-error probes, or approaches lacking methodical rigor,
will be considered out of scope.
Purely theoretical ML works without actionable security insights are out of scope, as are
papers focusing on generic ML properties (e.g., robustness to natural noise) that lack
clear security implications.
For more information, please see
https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.
CSF 2026
39th IEEE Computer Security Foundations Symposium,
Colocated with FLoC 2026,
Lisbon Portugal, July 26-29, 2026.
(Submission Due 24 July 2025, 9 October 2025, and 29 January 2026) [posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference
for researchers in computer security, to examine current theories of security,
the formal models that provide a context for those theories, and techniques for
verifying security. It was created in 1988 as a workshop of the IEEE Computer
SocietyÕs Technical Committee on Security and Privacy, in response to a 1986
essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó
The meeting became a ÒsymposiumÓ in 2007, along with a policy for open, increased
attendance. Over the past two decades, many seminal papers and techniques have been
presented first at CSF. For more details on the history of the symposium, visit CSFÕs home.
The program includes papers, panels, and a poster session. Topics of interest
include access control, information flow, covert channels, cryptographic protocols,
database security, language-based security, authorization and trust, verification
techniques, integrity and availability models, and broad discussions concerning the
role of formal methods in computer security and the nature of foundational
research in this area.
For more information, please see
https://csf2026.ieee-security.org.
USENIX Security 2026
35th USENIX Security Symposium,
Baltimore, MD, USA, August 12-14, 2026.
(Submission Due 19 August 2025 and 29 January 2026) [posted here 10/13/25]
The USENIX Security Symposium brings together researchers, practitioners, system programmers,
and others interested in the latest advances in the security and privacy of computer systems and
networks. Summary of main changes from previous editions:
- USENIX Security '26 will no longer feature major revisions; papers will at most undergo a
two-week shepherding process.
- Authors may submit at most seven papers per cycle to the conference.
- Mandatory registration for all papers one week before the submission deadline,
including all authors, title, tentative abstract, and topics for the paper. The list of
authors cannot be changed after registration.
- Every author on a submission must use their HotCRP account to individually confirm
compliance with the submission terms.
- Artifacts must be made available during the reviewing process. If they cannot be made
available during review or after publication, the Open Science appendix must explain the reasoning.
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy.
This topic list on the call for papers page is not meant to be exhaustive; USENIX Security is interested
in all aspects of computing systems security and privacy. Papers without a clear application to
security or privacy of computing systems, however, will be considered out of scope and may be
rejected without full review at the discretion of the chairs.
For more information, please see
https://www.usenix.org/conference/usenixsecurity26/call-for-papers.
AMASS 2026
Workshop on Advances in Malware Analysis and Software Security,
Held in conjunction with ACM ASIACCS, Bangalore, India, June 2, 2026.
(Submission Due 31 January 2026) [posted here 12/8/25]
The AMASS 2026 Workshop addresses one of todayÕs most critical cybersecurity
challenges: the exponential rise of sophisticated malware and software-based threats. While
malware research often appears within broader cybersecurity venues, a clear gap remains in
focused discussions at the intersection of malware analysis, software engineering, and
intelligent defence systems. The workshop aims to bridge that gap by establishing a
dedicated forum for sharing advancements
in malware detection, vulnerability discovery, and software hardening through AI-driven
and data-centric approaches. Despite the rapid growth of cyber threats and research activity
worldwide, there is currently no comparable cybersecurity venue dedicated to these topics.
The AMASS workshop aims to:
- Create a dedicated platform for sharing research results, datasets, and tools in
malware and software security.
- Encourage collaboration between academia and industry, particularly in the context of threat
intelligence and malware response.
- Bridge static and dynamic analysis communities and foster reproducibility in malware research.
- Support the next generation of researchers through discussions, demos, and early-stage
research presentations.
For more information, please see
https://sites.google.com/view/amass2026/home.
February 2026
PETS 2026
26th Privacy Enhancing Technologies Symposium,
Calgary, Canada, July 20-25, 2026.
(Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 26th PETS is expected to be a
hybrid event with a physical gathering (location TBD) and a concurrent virtual event.
Papers undergo a journal-style reviewing process, and accepted papers are published
in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of
accepted papers are strongly encouraged to attend and present at the physical event,
where their presentations can be recorded for the virtual event and where they can
participate directly in in-person research, technical, and social activities.
However, in-person attendance is not strictly required for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges or
article submission charges.
Authors can submit papers to PoPETs four times a year, every three months, and are
notified of the decisions about two months after submission. Authors will receive a
decision of accept, revise, or reject. Those receiving revise will be invited to
revise their article with the guidance of a revision editor according to a well-defined
set of revision criteria and will have up to four months to attempt to complete the
required revisions. Authors of rejected papers must skip a full issue prior to
resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer
concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into
consideration during the discussion. New for 2026: The authors will be able to submit a
separate, 250-word rebuttal response to each individual review (rather than a single
response that addresses all reviews).
For more information, please see
https://petsymposium.org/cfp26.php.
March 2026
ACM WiSec 2026
19th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Saarbrucken, Germany, June 30 - July 3, 2026.
(Submission Due 18 November 2025 and 3 March 2026) [posted here 12/8/25]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of
security and privacy in wireless and mobile networks and their applications. In addition to
the traditional ACM WiSec topics of physical, link, and network layer security, we welcome
papers focusing on the increasingly diverse range of mobile or wireless applications such as
the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile
software platforms, usable security and privacy, biometrics, and cryptography.
Important update on ACMs new open access publishing model for 2026 ACM Conferences:
Starting January 1, 2026, ACM will fully transition to Open Access. All ACM publications, including
those from ACM-sponsored conferences, will be 100% Open Access. Authors will have two primary options
for publishing Open Access articles with ACM: the ACM Open institutional model or by paying Article
Processing Charges (APCs). With over 2,600 institutions already part of ACM Open, the majority
of ACM-sponsored conference papers will not require APCs from authors or conferences (currently,
around 76%). Authors from institutions not participating in ACM Open will need to pay an
APC to publish their papers, unless they qualify for a financial waiver. To find out whether
an APC applies to your article, please consult the list of participating institutions in ACM
Open and review
the https://www.acm.org/publications/policies/policy-on-discretionary-open-access-apc-waivers.
For more information, please see
https://wisec26.events.cispa.de.
April 2026
ACM CCS 2026
33rd ACM Conference on Computer and Communications Security,
Hague, The Netherlands, November 15-19, 2026.
(Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer
security and privacy. Theoretical papers must make a convincing case for the relevance of
their results to practice. Authors are encouraged to write the abstract and introduction
of their paper in a way that makes the results accessible and compelling to a general
computer-security researcher. In particular, authors should bear in mind that anyone on
the program committee may be asked to review any paper.
All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding
deadline. Submitted papers must not substantially overlap with papers that have been
published or accepted for publication, or that are simultaneously in submission to a
journal, conference, or workshop with published proceedings. All submissions should be
properly anonymized. Papers should avoid revealing authors' identity in the text. When
referring to their previous work, authors are required to cite their papers in the third
person, without identifying themselves. In the unusual case in which a third-person
reference is infeasible, authors can blind the reference itself. Papers not
properly anonymized may be rejected without review. Authors may submit up to a maximum
of 7 papers at each cycle .
All submitted papers will be evaluated based on their merits, particularly their
importance to practical aspects of computer and communications security and privacy,
novelty, quality of execution, and presentation. Note that CCS does not accept
SoK or survey papers.
Authors are expected to consider the ethical implications and potential societal
impact of their work. Papers that raise ethical concerns, such as those involving
human subjects, user data, or real-world vulnerability analysis, must include a
dedicated "Ethical Considerations" section. This section should discuss the
balance of risks vs. benefits and the steps taken to minimize potential harm (e.g.,
responsible disclosure, data anonymization). Note that institutional (IRB/ERB)
approval is neither strictly necessary nor always sufficient to demonstrate ethical
conduct; we expect authors to reason about the ethics of their work beyond ensuring
institutional compliance. For detailed guidance on community standards, we follow
the USENIX Security'26 Ethics Policy. This section does not count toward the page
limit and should be placed after the 12-page main content.
This edition of ACM CCS adopts an Open Science policy to strengthen the transparency,
reproducibility, and long-term impact of published research. Authors are expected to
share the artifacts underlying their results (such as code, datasets, models,
scripts, and documentation) whenever legally, ethically, and practically possible.
Each submitted paper must include an ``Open Science" appendix. More details can be
found on the conference call for papers page.
Providing Artifacts at Submission Time: Artifacts are required for submissions
whose contributions fundamentally rely on an implementation, experimental evaluation,
system, tool, or dataset. This includes, but is not limited to, papers that:
(1) Introduce a new system, library, or tool.
(2) Present experimental results derived from an implementation.
(3) Propose a new benchmark, dataset, or data collection methodology.
If reviewers determine that a central contribution cannot be properly evaluated without
accessing artifacts that are neither provided nor convincingly justified in the Open
Science appendix (as required by the Open Science Policy), the paper may be rejected.
All artifacts will be treated with the same strict confidentiality as the manuscript.
Access is restricted to the assigned PC members, who may use artifacts only for the
purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for
personal or professional purposes constitutes a serious ethical violation and may
result in removal from the PC and additional sanctions (such as bans on future
service or submissions).
Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on
Authorship regarding the use of generative AI tools. More details about the guidelines
when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT,
Claude, Copilot) can be found on the conference call for papers page.
Special note for Machine Learning papers submitting to CCS: Machine learning
has become pervasive across security and privacy research. To ensure papers are directed
to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we
provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy
issue, submit the paper in the track that better aligns with the primary field of the
problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security
or privacy of ML itself, the Security and Privacy of Machine Learning track is the right
fit. This must also be stated in the Track Justification Statement, clarifying the authors'
decision not to submit to a domain-specific track (e.g., Web Security, Software
Security).
The paper evaluation needs to be linked to the threat model and scenario motivating the
paper. Strong submissions produce generalizable contributions such as frameworks for
risk assessment, attack patterns that generalize across models, systematic problem
characterizations, or principled defenses with clear justification. Papers that present
collections of examples or trial-and-error probes, or approaches lacking methodical rigor,
will be considered out of scope.
Purely theoretical ML works without actionable security insights are out of scope, as are
papers focusing on generic ML properties (e.g., robustness to natural noise) that lack
clear security implications.
For more information, please see
https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
IEEE Transactions on Privacy,
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page. More
information can be found at
https://www.computer.org/csdl/journals/pr.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|