Calls for Papers

IEEE Computer Society's Technical Committee on Security and Privacy


Last Modified:11/14/22

Note: Please send new calls to and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact by email.



Special Issues of Journals and Handbooks

IEEE Internet of Things Journal, Special Issue on Smart Blockchain for IoT Trust, Security and Privacy. (Submission Due 15 November 2022) [posted here 11/7/22]
Guest editors: Xiaokang Zhou (Shiga University, Japan), Zheng Yan (Xidian University, China and Aalto University, Finland), Yan Zhang (University of Oslo, Norway), and Stephen Yau (Arizona State University, USA).

The fast development of the Internet of Things (IoT) involves enormous evolutions of IoT empowered smart systems and applications, using diverse networks, remote sensors and endpoint appliances. However, these IoT smart devices may easily receive massive cyber-attacks, facing threats related to trust, security and privacy (TSP) of the IoT data. The blockchain technology, representing a decentralized, distributed, shared, and immutable database ledger that stores registry of assets, provides a potential solution for the IoT TSP, especially when dealing with large-scale of heterogeneous data that are collected via smart sensors/devices, distributed via communication networks and usually processed in real-time. Over the past few years, smart blockchain technology has emerged as an area of incredible impact, potential, and growth, with both the powers from AI and blockchain, ensuring a secure environment for IoT data communication, computation and storage, for addressing the IoT TSP issues in both academic and industrial fields.

Smart blockchain extends traditional blockchain technologies with cutting-edge artificial intelligence (AI), offering high-level economy, adaptivity and autonomy to a blockchain system. Compared with traditional blockchain techniques, smart blockchain brings extra features to blockchain systems through data mining, pattern recognition, machine learning and deep learning on the top of existing blockchain technologies, which show a great potential to benefit the modern IoT systems. Recently, tremendous efforts have been made to explore smart blockchain technologies for solving IoT TSP issues, related to different application fields including cyber security, smart city, smart grid, wireless sensor networks, mobile communications, crowdsourcing/crowdsensing, cyber-physical-social systems, and so on. However, there are still open research problems and challenges for smart blockchain empowered TSP of IoT:1) What are the key requirements of TSP in smart blockchain solutions toward modern IoT systems? 2) What are the key algorithms in smart blockchain platforms for IoT TSP? And 3) How to realize key applications of smart blockchain with TSP concerns in diversified IoT environments? Topics may include (but are not limited to):
- Smart blockchain theories and algorithms for IoT trust, security and privacy
- Trustworthy IoT data management with smart blockchain
- AI-based data analytics for blockchain intelligence
- Machine/deep learning for blockchain intelligence
- Secure IoT system design based on smart blockchain
- Trust, security and privacy of smart blockchain
- Decentralized and collaborative learning for IoT
- Decentralized computing for IoT trust, security and privacy
- End-edge-cloud computing enabled by smart blockchain in IoT
- Big data analytics based on blockchain in IoT systems
- Performance optimization of blockchains in IoT
- Blockchain related applications for intelligent IoT trust, security and privacy

For more information, please see

Elsevier Computers & Security, Special Issue on Benefits and Outlook of Program Analysis for Systems Security. (Submission Due 1 December 2022) [posted here 7/4/22]
Guest editors: Daniele Cono D’Elia (Sapienza Universitą di Roma, Italy) and Lorenzo Cavallaro (University College London, UK).

This Special Issue accepts research on using program analysis for systems security; it seeks technical and vision papers capitalizing on the cross-pollination among Computer Security, Programming Languages, and Software Engineering research. In the last decade, a rich cross-pollination with the programming languages, software verification and testing, and software engineering communities has brought tangible improvements to the accuracy and performance of many systems security solutions.

Program analysis is central to this phenomenon. CFI, fuzzing, privilege separation, and other security solutions nowadays can be driven by carefully designed code analyses or employ code transformations to expose control and data flows otherwise too costly to retrieve. Conversely, security works may incubate advances in general program analysis methodologies such as symbolic execution, taint analysis, and binary rewriting.

This special issue seeks works that capitalize on this cross-pollination, showing technical and methodological benefits from enacting program analysis techniques in systems security. Topics considered in the scope of this special issue are:
- Control and data-flow integrity
- Fuzzing and sanitization
- General-purpose code analyses and instrumentation techniques
- Program partitioning, privilege separation, and general hardening
- Robust AI-based software analyses

For more information, please see

ACM Distributed Ledger Technologies: Research and Practice, Special Issue on Recent Advances of Blockchain Evolution: Architecture and Performance. (Submission Due 15 December 2022) [posted here 11/14/22]
Guest editors: Xueqin Liang (Xidian University, China), Xiaokang Wang (Hainan University, China), Chonggang Wang (InterDigital Inc., USA), and Witold Pedrycz (University of Alberta, Canada).

Blockchain, as a disruptive technology, has attracted widespread attention from both academia and industry. It is promising to establish a truly decentralized, transparent, and accountable environment, where blockchain and other cutting-edge technologies will play an essential role. Despite the benefits and great potential of blockchain, current blockchain technologies still suffer from many severe problems, e.g., insufficient trust and security, vulnerability to attacks, low efficiency, poor scalability, low throughput, high energy consumption, privacy leakage, and threats caused by dishonest behaviors. Hence, there is an urgent demand for blockchain evolution, including its architecture, consensus mechanism, incentive mechanism, as well as the theories to integrate blockchain with other emerging technologies, such as machine learning and optimization algorithms. The recent advances in artificial intelligence have offered opportunities to detect anomalies and optimize resources. Furthermore, incentive mechanisms boost the participation willingness of system entities and promote intrinsic trust for blockchain, thereby greatly enhancing system security. Obviously, the evolution of blockchain in architecture, intelligence, and incentive will further extend its applications to wider fields.

This special issue aims to bring together recent advances in new architecture, algorithms with intelligence, incentive mechanisms, and so on for innovating blockchain to improve its overall performance. It will also consider peer-reviewed journal versions (at least 30% new content) of top papers from IEEE Blockchain 2022, which is scheduled to take place in Espoo, Finland, 22-25 August 2022. The new content must be in terms of intellectual contributions, technical experiments, and findings. Any manuscript submitted to this special issue not be published or currently submitted for publication elsewhere. Contributions arising from papers given at other conferences are also welcome but should be substantially extended and should cite the conference paper where appropriate. The differences should also be explicitly outlined in the accompanying cover letter. Potential topics include but are not limited to the following:
- New architecture of blockchain with enhanced security and privacy preservation
- AI-enabled smart blockchain
- AI-enabled blockchain consensus mechanisms
- Blockchain scalability issues and solutions
- Blockchain interoperability with privacy preservation
- Security, privacy, and trust of emerging blockchain systems
- Intelligent quality assurance of smart contracts
- Intelligent resource allocation for blockchain
- Incentive mechanisms for blockchain or blockchain-based incentive mechanisms
- AI-enabled incentive mechanisms for blockchain-based applications
- Blockchain-based novel applications and services
- Novel consensus mechanisms for redactable blockchain
- Novel redactable blockchain architecture with accountability and trustfulness
- Attacks to redactable blockchain and its solutions
- Redactable blockchain with universality
- Redactable blockchain applications in IoT, crowdsourcing, and edge computing
- Blockchain and other emerging technologies

For more information, please see

Conference and Workshop Call-for-papers

November 2022

USEC 2023 Usable Security and Privacy Symposium, Held in conjunction with NDSS 2023, San Diego, California, USA, Feb 27 - Mar 3, 2023. (Submission Due 18 November 2022) [posted here 11/7/22]
The Usable Security and Privacy (USEC) Symposium 2023 serves as an international forum for research and discussion in the area of human factors in security and privacy. We invite submissions from academia, government, and industry presenting novel research on all aspects of human-centric security and privacy. We welcome a variety of research methods, including empirical research and design research. Topics include, but are not limited to:
- innovative security or privacy functionality and design
- new applications of existing models or technology
- usability evaluations of new or existing security or privacy features and lessons learned
- security testing of new or existing usability features
- psychological, sociological, and economic aspects of security and privacy
- research and design methodologies for human-centric security and privacy research
- reports of replicating previously published studies and experiments
- reports of failed usable privacy/security studies or experiments, with the focus on the § lessons learned from such experience
- inclusive security and privacy
- ethics in human-centric security and privacy research
- workforce, labels, cyber-physical systems
- usability in smart manufacturing

For more information, please see

FHE 2023 2nd Annual Conference on Fully Homomorphic Encryption, Co-located with Real World Crypto 2023, Tokyo, Japan, March 26, 2023. (Submission Due 19 November 2022) [posted here 9/12/22]
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption. The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies.

For more information, please see

FSE 2023 29th Fast Software Encryption, Beijing, China, March 20-24, 2023. (Submission Due 1 March 2022, 1 June 2022, 1 September 2022, and 23 November 2022) [posted here 8/29/22]
FSE 2023 is the 29th annual conference that is widely recognized as the internationally leading event in the area of symmetric cryptology. Since 2002, FSE is organized by the International Association for Cryptologic Research (IACR), a global organization with more than 1600 members that brings together researchers in cryptology. FSE focuses on fast and secure primitives for symmetric cryptography, that form the workhorse for all applications of cryptography (e.g., AES, SHA-2 and SHA-3). The event covers a broad range of practical and theoretical topics including the design and analysis of block ciphers, stream ciphers, encryption schemes, hash functions, message authentication codes, authenticated encryption schemes, cryptanalysis and evaluation tools, and secure implementations. The FSE conference event offers you the unique opportunity to meet more than 170 experts from across academia and industry.

For more information, please see

PETS 2023 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, Hybrid, July 10-14, 2023 (to be confirmed). (Submission Due 31 May 2022, 31 August 2022, 30 November 2022, 28 February, 2023) [posted here 6/6/22]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not required for publication in the proceedings. We will carefully monitor the COVID-19 situation, and may change the organization of the event as necessary

For more information, please see

December 2022

SP 2023 44th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 22-26, 2022. (Submission Due 1 April 2022, 19 August 2022, and 2 December 2022) [posted here 2/28/22]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ďSoK:Ē in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at

For more information, please see

ASIACCS 2023 18th ACM ASIA Conference on Computer and Communications Security, Melbourne, Australia, July 10-14, 2023. (Submission Due 1 September 2022, and 15 December 2022) [posted here 5/23/22]
We welcome submissions on all technical aspects of security and privacy, including "Systemization of Knowledge” (SoK) papers. However, purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same goes for submissions focused primarily on blockchains or machine learning. Submissions will fall into one of three categories, each reviewed using different criteria: (1) novel attacks/flaws/exploits, (2) new constructs, and (3) SoK-s. The number of accepted submissions will be carefully balanced across all three categories.

For more information, please see

MetaCom 2023 International Conference on Metaverse Computing, Networking and Applications, Kyoto, Japan, June 26-28, 2023. (Submission Due 30 December 2022) [posted here 10/24/22]
MetaCom 2023 provides a forum for academic researchers and industry practitioners to present research progresses, exchange new ideas, and identify future directions in the field of Computing, Networking, and Applications for Metaverse.

Metaverse is one of the key enablers for the future society, which is envisioned to bring a new revolution to digital world. For Metaverse, physical world will be seamlessly integrated with cyber world through digitizing physical objects to create digital twins, which poses numerous challenges on human-machine interfaces, ultra-low latency, extremely high resource demands, low traffic, reliability and trustworthiness. To realize this vision, it becomes indispensable for the convergence of computing, networking and applications for Metaverse in a wide range of domains including industry, finance, medical care, smart cities, entertainment, education, and agriculture. The conference solicits submissions from all research areas related to Metaverse computing, networking, as well as their corresponding systems and applications, including Security, Privacy, and Trust.

For more information, please see

January 2023

VehicleSec 2023 Inaugural Symposium on Vehicle Security and Privacy, Held in conjunction with the Network and Distributed System Security Symposium (NDSS 2023), San Diego, CA, USA, February 27, 2023. (Submission Due 3 January 2023) [posted here 11/14/22]
A vehicle is a machine that transports people and/or cargo in one or more physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks, buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters, spacecraft), and under water (ships, boats, watercraft). Due to their safety-critical nature, the security and privacy of vehicles can pose direct threats to passengers, owners, operators, as well as the environment. Recent improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone delivery, vehicle-to-everything (V2X) communication, intelligent transportation, drone swarm), have only served to exacerbate security and privacy challenges and thus require urgent attention from academia, industry, and policy-makers. To meet this critical need, the VehicleSec symposium aims at bringing together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater), their sub-systems (e.g., in vehicle networks, autonomy, connectivity, human-machine interfaces), supporting infrastructures (e.g., transportation infrastructure, ground control station), and related fundamental technologies (e.g., sensing, control, AI/ML, real-time computing, location service, simulation, digital twin, etc.).

For more information, please see

HOST 2023 16th IEEE International Symposium on Hardware Oriented Security and Trust, San Jose, CA, USA, May 1-4, 2023. (Submission Due 17 October 2022 and 16 January 2023) [posted here 8/29/22]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. HOST 2023 invites original contributions in all areas of overlap between hardware and security. This includes but is not limited to the following:
- Hardware Trojans
- TRNGs and PUFs
- Side-Channel Attacks and Countermeasures
- Hardware Obfuscation
- Architecture-level Security
- System/Board-level hardware security
- Cryptography-PQC
- Fault Injection Attacks and Countermeasures

For more information, please see

February 2023

CSF 2023 36th IEEE Computer Security Foundations Symposium, Dubrovnik, Croatia, July 10-14, 2023. (Submission Due 13 May 2022, 30 September 2022, and 3 February, 2023) [posted here 9/26/22]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF's home.

The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see

USENIX Security 2023 32nd USENIX Security Symposium, Anaheim, CA, USA, August 9-11, 2023. (Submission Due 7 June 2022, 11 October 2022, and 7 February 2023) [posted here 6/6/22]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.

Important: In 2023, we are introducing substantial changes to the review process, aimed to provide a more consistent path towards acceptance and reduce the number of times papers reenter the reviewing process. Detailed information is available at USENIX Security Publication Model Changes. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security.

For more information, please see

PETS 2023 23rd Privacy Enhancing Technologies Symposium, Lausanne, Switzerland, Hybrid, July 10-14, 2023 (to be confirmed). (Submission Due 31 May 2022, 31 August 2022, 30 November 2022, 28 February, 2023) [posted here 6/6/22]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not required for publication in the proceedings. We will carefully monitor the COVID-19 situation, and may change the organization of the event as necessary.

For more information, please see

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievementóthrough design, modeling, and evaluationóof systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at

The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (,703-993-1653).
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at More information is given on the journal web page at
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at More information can be found at
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at, or submit their Word, ps or pdf file to the editor-in-chief (via Email: Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at More information is given on the journal web page at
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at More information is given on the journal web page at
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via  More information can be found at
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at  More information can be found at