|
Last Modified:1/22/24
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
IEEE Communications Magazine - Cybersecurity (In Incubation).
(Submission Due anytime during the year) [posted here 10/2/23]
IEEE Communications Magazine is starting a new Cybersecurity Series.
As society has become increasingly dependent on communications and networks, being
an integral part of most digital systems, cybersecurity has become utmost important. While
there have been many improvements, for instance within standardization and adaptation of secure
network protocols, there are still many challenges to be solved within the heterogeneous and
wide range of current communication systems. In addition, new technology and an evolving threat
landscape pose additional challenges.
This Series covers recent advances in cybersecurity, bringing together industrial and academic
research and developments. The Series emphasizes novel but practical solutions and insights
of interest to industry, academia and governments. Topics of interest include cybersecurity
aspects of networks and communications including, but not limited to, the following:
- Critical infrastructure security
- Mobile and wireless communications security
- Network protocol security
- Cyber attack prevention, detection, and response
- Resiliency and availability in communications
- Security in industrial and cyber physical systems networks/communications
- Network security monitoring and traffic analysis
- Network and communications privacy
- Machine learning and AI for cybersecurity
- Measurements of cyber security in networks and communications
- Cyber threats
For more information, please see
https://www.comsoc.org/publications/magazines/ieee-communications-magazine/cfp/cybersecurity-incubation.
EURASIP Journal on Information Security,
Special Issue on Trends in Digital Identity: Security, Privacy, and Trust.
(Submission Due 31 January 2024) [posted here 10/23/23]
We encourage submissions on a range of topics, including but not limited to:
- Access Control in IoT and Distributed Systems
- Behavioral and Risk-based Authentication Mechanisms
- Compliance with Regulations such as eIDAS (2), PSD2, NIS2
- Cryptography for Digital Identity (e.g., hiding commitments, selective disclosure
signatures, zero knowledge proofs, accumulators, and secure elements)
- Decentralized Identity and Self Sovereign Identity
- Digital Wallets and Verifiable Credentials (e.g., selective disclosure and revocation)
- Identity for Web 3.0 and Metaverse
- Identity Governance and Administration
- Identity of Things and Cloud Security
- Mobile and Strong Authentication
- Passwordless Authentication (including passkeys)
- Privacy-Enhancing Technologies for Identity Management
- Remote Identification, Onboarding and Know Your Customer (KYC) Procedures
- Securing Identities for the Financial and Governmental Services
- Session Management for Seamless and Continuous Authentication
- Trust Frameworks for Identity Management Solutions
- Video-based identity proofing (e.g. automated face comparison, impersonation attacks, document analysis)
- Zero Trust Architectures
For more information, please see
https://www.springeropen.com/collections/tdispt.
ACM Transactions on Embedded Computing Systems,
Special Issue on Open Hardware for Embedded System Security and Cryptography.
(Submission Due 15 February 2024) [posted here 12/4/23]
Guest Editors: Michael Tempelmeier (Giesecke+Devrient Mobile Security Germany GmbH, Germany),
Fabrizio De Santis (Siemens AG, Germany),
Stefan Mangard (Graz University of Technology, Austria), and
Shivam Bhasin (Nanyang Technological University, Singapore).
Secure embedded open hardware aims at proving industry-level embedded
hardware building blocks that adhere to high-quality standards regarding code,
documentation, design, testing, verification in order to enable final fabrication
and security certification. Challenges include developing secure open hardware
building blocks that adhere to high-quality standards, developing design
techniques that do not require any assumptions on hardware not known by the
attacker to achieve the required security level, establishing automated and
efficient security testing and verification methodologies, and ensuring the
availability of tools and processes that facilitate secure integration of hardware
building blocks into larger and more complex secure embedded systems.
For more information, please see
https://dl.acm.org/pb-assets/static_journal_pages/tecs/pdf/ACM-TECS-SI_OHW-CFP.pdf.
January 2024
SafeThings 2024
8th IEEE/ACM Workshop on the Internet of Safe Things,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
(Submission Due 22 January 2024) [posted here 12/11/23]
The 8th Workshop on the Internet of Safe Things seeks to bring together
researchers to create solutions for the development of safe cyber-physical systems.
As safety is inherently linked with the security and privacy of a system, we also
seek contributions in these areas that address safety concerns. We seek to develop
a community that systematically dissects the vulnerabilities and risks exposed by
these emerging CPSs, and creates tools, algorithms, frameworks, and systems that
help in the development of safe systems.
We seek contributions across domains - autonomous vehicles, smart homes, medical
devices, smart grid, intelligent transportation; and across disciplines - systems,
control, human-computer interaction, security, reliability, machine learning,
and verification.
The scope of our workshop includes safety topics as they relate to an individualÕs
health (physical, mental), society (air pollution, toxicity, disaster events),
or the environment (species preservation, global warming, oil spills).
The workshop considers safety from a human perspective and, thus, does not include
topics such as thread safety or memory safety in its scope.
For more information, please see
https://safe-things-2024.github.io.
February 2024
ICICS 2024
26th International Conference on Information and Communications Security,
Mytilene, Greece, August 26-28, 2024.
(Submission Due 2 February 2024 and 19 April 2024) [posted here 1/8/24]
Authors are invited to submit original papers not previously published
nor submitted in parallel for publication to any other conference, workshop or
journal. All submitted papers must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references, for double blind reviews. The page limits
for the camera-ready papers are 20 pages, including the bibliography and
well-marked appendices. Selected accepted papers will be invited to submit
extended versions to a special issue of the International Journal of
Information Security
For more information, please see
http://icics2024.aegean.gr/submissions/.
CSF 2024
37th IEEE Computer Security Foundations Symposium,
Enschede, Netherlands, July 8-12, 2024.
(Submission Due 15 May 2023, 30 September 2023, and 3 February 2024) [posted here 6/5/23]
The Computer Security Foundations Symposium (CSF) is an annual
conference for researchers in computer security, to examine current theories
of security, the formal models that provide a context for those theories, and
techniques for verifying security. It was created in 1988 as a workshop of
the IEEE Computer Society's Technical Committee on Security and Privacy, in
response to a 1986 essay by Don Good entitled ÒThe Foundations of Computer
SecurityÑWe Need Some.Ó The meeting became a ÒsymposiumÓ in 2007, along with
a policy for open, increased attendance. Over the past two decades, many
seminal papers and techniques have been presented first at CSF. For more
details on the history of the symposium, visit CSF's home.
The program includes papers, panels, and a poster session. Topics of interest
include access control, information flow, covert channels, cryptographic
protocols, database security, language-based security, authorization and
trust, verification techniques, integrity and availability models, and
broad discussions concerning the role of formal methods in computer security
and the nature of foundational research in this area.
For more information, please see
https://csf2024.ieee-security.org.
DFRWS 2024
24th Annual Digital Forensic Research Conference,
Baton Rouge, LA, USA, July 9-12, 2024.
(Submission Due 5 February 2024) [posted here 4/9/23]
DFRWS is a premier conference for digital forensic research. It attracts
participants from many sectors, including law enforcement (such as local state police
and federal agencies), industry (including vendors and practitioners), and academia.
The Forensic Science International: Digital Investigation Journal, Elsevier, will
publish the DFRWS proceedings as open access in a supplement issue.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2024/.
SAGAI 2024
Workshop on Security Architectures for GenAI Systems,
Held in conjunction with IEEE SP 2024 Conference,
San Francisco, California, USA, May 23, 2024.
(Submission Due 5 February 2024) [posted here 12/25/23]
Generative AI (GenAI) is quickly advancing and fast becoming a
widely deployed technology. GenAI-based systems rely on machine-learning (ML)
models trained on large amounts of data using deep-learning techniques. As the
power and flexibility of the models advance, the architectural complexity of
GenAI-based systems is advancing too. Current architectures may combine
multiple models, using sequences of model queries to complete a task, with
external (non-ML) components leveraged to enhance the modelÕs operation via
database queries or API calls. These architectures may be vulnerable to a
variety of attacks that use adversarial inputs to create malicious outputs.
This workshop invites new contributions to the broader understanding of
security for GenAI systems and applications. Contributions may address
security threats and defenses for individual models, or for systems and
architectures that may employ one or more generative ML models as subcomponents.
The workshop welcomes discussion of new GenAI security concerns, as well as
new approaches to architecting GenAI-based systems for safety, security,
and privacy.
For more information, please see
https://sites.google.com/view/sagai2024/home.
USENIX Security 2024
33rd USENIX Security Symposium,
Philadelphia, PA, USA, August 14-16, 2024.
(Submission Due 6 June 2023, 17 October 2023, and 8 February 2024) [posted here 1/28/23]
The USENIX Security Symposium brings together researchers, practitioners,
system administrators, system programmers, and others interested in the
latest advances in the security and privacy of computer systems and networks.
The Call for Papers will be available soon.
For more information, please see
https://www.usenix.org/conference/usenixsecurity24.
SOUPS 2024
20th Symposium on Usable Privacy and Security,
Philadelphia, PA, USA, August 11-13, 2024.
(Submission Due 8 February 2024) [posted here 1/8/24]
The 2024 Symposium on Usable Privacy and Security (SOUPS) will bring together
an interdisciplinary group of researchers and practitioners in human computer interaction,
security, and privacy. We invite authors to submit previously unpublished papers
describing research or experience in all areas of usable privacy and security.
We welcome a variety of research methods, including both qualitative and quantitative
approaches. Papers will be judged on their scientific quality, overall quality, and
contribution to the field.
For more information, please see
https://www.usenix.org/conference/soups2024.
PETS 2024
24th Privacy Enhancing Technologies Symposium (PETS 2024)
Bristol, UK and Online, July 15-20, 2024.
(Submission Due 31 May 2023, 31 August 2023, 30 November 2023, and 29 February 2024) [posted here 6/5/23]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together
experts from around the world to present and discuss recent advances and new
perspectives on research in privacy technologies. The 24th PETS will be a hybrid event
with a physical gathering held in Bristol, UK and a concurrent virtual event. Papers
undergo a journal-style reviewing process, and accepted papers are published in the
journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted
papers are encouraged to attend and present at the physical event, where their presentations
can be recorded for the virtual event and where they can participate directly in in-person
research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings. We will carefully monitor the COVID-19 situation, and
may change the organization of the event as necessary.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides
high-quality reviewing and publication while also supporting the successful PETS
community event. PoPETs is self-published and does not have article processing charges
(APCs) or article submission charges.
For more information, please see
https://petsymposium.org/cfp24.php.
March 2024
April 2024
ICICS 2024
26th International Conference on Information and Communications Security,
Mytilene, Greece, August 26-28, 2024.
(Submission Due 2 February 2024 and 19 April 2024) [posted here 1/8/24]
Authors are invited to submit original papers not previously published
nor submitted in parallel for publication to any other conference, workshop or
journal. All submitted papers must be anonymous, with no author names, affiliations,
acknowledgements, or obvious references, for double blind reviews. The page limits
for the camera-ready papers are 20 pages, including the bibliography and
well-marked appendices. Selected accepted papers will be invited to submit
extended versions to a special issue of the International Journal of
Information Security.
For more information, please see
http://icics2024.aegean.gr/submissions/.
ESORICS 2024
9th European Symposium on Research in Computer Security,
Bydgoszcz, Poland, September 16-20, 2024.
(Submission Due 8 January 2024 and 19 April 2024) [posted here 1/8/24]
Computer security emphasizes safeguarding information in settings susceptible
to breaches or malevolent activities. The aim of ESORICS is to further the progress
of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European
nations, the symposium has solidified its position as one of Europe's most
prominent conferences on computer security. Currently, the symposium delves into
research and developmental avenues encompassing AI, machine learning,
technologies that enhance privacy, network safeguards, software and hardware
protection in practical scenarios.
For more information, please see
https://esorics2024.org.
SCN 2024
14th International Conference on Security and Cryptography for Networks,
Amalfi, Italy. September 11-13, 2024.
(Submission Due 24 April 2024) [posted here 1/22/24]
The Fourteenth International Conference on Security and Cryptography for
Networks (SCN 2024) aims to bring together researchers in the field of cryptography
and information security, practitioners, developers, and users to foster cooperation,
exchange techniques, tools, experiences and ideas. The conference seeks submissions
from academia, government, and industry presenting novel research on all practical
and theoretical aspects of cryptography and information security. The primary focus
is on original, high quality, unpublished research of theoretical and practical
impact, including concepts, techniques, applications and practical experiences.
Submitted papers must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or a
conference/workshop with proceedings.
For more information, please see
https://scn.unisa.it/scn24/index.php/call-for-papers/.
May 2024
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|