Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:12/8/25

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


IEEE Transactions on Privacy. (Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton

IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page

For more information, please see https://www.computer.org/csdl/journals/pr.

Electronics Journal, Special Issue on Data Privacy Protection in Blockchain Systems, (Submission Due 15 March 2026) [posted here 9/29/25]
Guest Editors: Zijian Bao (The Hong Kong Polytechnic University, Hong Kong), Yunhao Ling (The Hong Kong Polytechnic University, Hong Kong), and Zhuangzhuang Zhang (City University of Hong Kong, Hong Kong).

Data privacy protection has become a fundamental concern in the era of blockchain technologies, especially with the rapid development of Web3, stablecoins, decentralized finance (DeFi), and other blockchain-based applications. As blockchain systems continue to expand their influence across various sectorsÑincluding finance, healthcare, supply chains, and the digital economyÑensuring robust privacy protection for users and transactions is of paramount importance. This Special Issue aims to address the emerging challenges and opportunities related to data privacy in blockchain environments. We are particularly interested in research that explores innovative privacy-preserving mechanisms, theoretical foundations, practical implementations, and real-world applications within blockchain and distributed ledger technologies. Topics of interest include privacy-preserving protocols and cryptographic techniques, data privacy solutions for Web3 applications and decentralized identity, and privacy challenges and solutions for stablecoins and digital assets, as well as privacy in decentralized finance and smart contract platforms. We are also keen to receive submissions on regulatory and compliance aspects, cross-chain privacy and interoperability, privacy risk assessment and mitigation, and case studies or practical deployments of privacy protection in blockchain. We also welcome submissions beyond these topics, as long as they are relevant to data privacy protection in blockchain systems. Our aim is to encourage a broad and diverse range of contributions in this rapidly evolving field.

For more information, please see https://www.mdpi.com/journal/electronics/special_issues/14QMWO4O7C.

Conference and Workshop Call-for-papers

December 2025

HOST 2026 19th IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, May 4-7, 2026. (Submission Due 1 September 2025 and 8 December 2025) [posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. HOST 2026 invites original contributions in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.

For more information, please see https://host.conferences.computer.org/2026/.

ACM ASIACCS 2026 21st ACM ASIA Conference on Computer and Communications Security, Bangalore, India, June 1-5, 2026. (Submission Due 25 August 2025 and 12 December 2025) [posted here 10/20/25]
ACM ASIACCS seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same applies for submissions focusing primarily on blockchains or machine learning. As in previous years, we will also be accepting ÒSystemisation of KnowledgeÓ (SoK) papers. SoK submissions need to add the prefix ÒSoKÓ in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2026.cse.iitkgp.ac.in/call-for-papers/.

January 2026

ICBC 2026 8th IEEE International Conference on Blockchain and Cryptocurrency, Brisbane, Australia, June 1-5, 2026. (Submission Due 7 January 2026) [posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026), sponsored by the IEEE Communications Society, has established itself as the flagship annual conference in blockchain research, maintaining the highest standards of academic excellence. We invite original, unpublished submissions in all areas of blockchain and cryptocurrency research. In addition to established topics, ICBC 2026 welcomes emerging directions such as Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical) Internet Infrastructure.

For more information, please see https://icbc2026.ieee-icbc.org/.

ACM CCS 2026 33rd ACM Conference on Computer and Communications Security, Hague, The Netherlands, November 15-19, 2026. (Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized. Papers should avoid revealing authors' identity in the text. When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself. Papers not properly anonymized may be rejected without review. Authors may submit up to a maximum of 7 papers at each cycle .

All submitted papers will be evaluated based on their merits, particularly their importance to practical aspects of computer and communications security and privacy, novelty, quality of execution, and presentation. Note that CCS does not accept SoK or survey papers.

Authors are expected to consider the ethical implications and potential societal impact of their work. Papers that raise ethical concerns, such as those involving human subjects, user data, or real-world vulnerability analysis, must include a dedicated "Ethical Considerations" section. This section should discuss the balance of risks vs. benefits and the steps taken to minimize potential harm (e.g., responsible disclosure, data anonymization). Note that institutional (IRB/ERB) approval is neither strictly necessary nor always sufficient to demonstrate ethical conduct; we expect authors to reason about the ethics of their work beyond ensuring institutional compliance. For detailed guidance on community standards, we follow the USENIX Security'26 Ethics Policy. This section does not count toward the page limit and should be placed after the 12-page main content.

This edition of ACM CCS adopts an Open Science policy to strengthen the transparency, reproducibility, and long-term impact of published research. Authors are expected to share the artifacts underlying their results (such as code, datasets, models, scripts, and documentation) whenever legally, ethically, and practically possible. Each submitted paper must include an ``Open Science" appendix. More details can be found on the conference call for papers page.

Providing Artifacts at Submission Time: Artifacts are required for submissions whose contributions fundamentally rely on an implementation, experimental evaluation, system, tool, or dataset. This includes, but is not limited to, papers that: (1) Introduce a new system, library, or tool. (2) Present experimental results derived from an implementation. (3) Propose a new benchmark, dataset, or data collection methodology. If reviewers determine that a central contribution cannot be properly evaluated without accessing artifacts that are neither provided nor convincingly justified in the Open Science appendix (as required by the Open Science Policy), the paper may be rejected. All artifacts will be treated with the same strict confidentiality as the manuscript. Access is restricted to the assigned PC members, who may use artifacts only for the purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for personal or professional purposes constitutes a serious ethical violation and may result in removal from the PC and additional sanctions (such as bans on future service or submissions).

Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on Authorship regarding the use of generative AI tools. More details about the guidelines when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT, Claude, Copilot) can be found on the conference call for papers page.

Special note for Machine Learning papers submitting to CCS: Machine learning has become pervasive across security and privacy research. To ensure papers are directed to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy issue, submit the paper in the track that better aligns with the primary field of the problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security or privacy of ML itself, the Security and Privacy of Machine Learning track is the right fit. This must also be stated in the Track Justification Statement, clarifying the authors' decision not to submit to a domain-specific track (e.g., Web Security, Software Security).

The paper evaluation needs to be linked to the threat model and scenario motivating the paper. Strong submissions produce generalizable contributions such as frameworks for risk assessment, attack patterns that generalize across models, systematic problem characterizations, or principled defenses with clear justification. Papers that present collections of examples or trial-and-error probes, or approaches lacking methodical rigor, will be considered out of scope. Purely theoretical ML works without actionable security insights are out of scope, as are papers focusing on generic ML properties (e.g., robustness to natural noise) that lack clear security implications.

For more information, please see https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.

CSF 2026 39th IEEE Computer Security Foundations Symposium, Colocated with FLoC 2026, Lisbon Portugal, July 26-29, 2026. (Submission Due 24 July 2025, 9 October 2025, and 29 January 2026) [posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer SocietyÕs Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó The meeting became a ÒsymposiumÓ in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSFÕs home. The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2026.ieee-security.org.

USENIX Security 2026 35th USENIX Security Symposium, Baltimore, MD, USA, August 12-14, 2026. (Submission Due 19 August 2025 and 29 January 2026) [posted here 10/13/25]
The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. Summary of main changes from previous editions:
- USENIX Security '26 will no longer feature major revisions; papers will at most undergo a two-week shepherding process.
- Authors may submit at most seven papers per cycle to the conference.
- Mandatory registration for all papers one week before the submission deadline, including all authors, title, tentative abstract, and topics for the paper. The list of authors cannot be changed after registration.
- Every author on a submission must use their HotCRP account to individually confirm compliance with the submission terms.
- Artifacts must be made available during the reviewing process. If they cannot be made available during review or after publication, the Open Science appendix must explain the reasoning.

Refereed paper submissions are solicited in all areas relating to systems research in security and privacy. This topic list on the call for papers page is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review at the discretion of the chairs.

For more information, please see https://www.usenix.org/conference/usenixsecurity26/call-for-papers.

AMASS 2026 Workshop on Advances in Malware Analysis and Software Security, Held in conjunction with ACM ASIACCS, Bangalore, India, June 2, 2026. (Submission Due 31 January 2026) [posted here 12/8/25]
The AMASS 2026 Workshop addresses one of todayÕs most critical cybersecurity challenges: the exponential rise of sophisticated malware and software-based threats. While malware research often appears within broader cybersecurity venues, a clear gap remains in focused discussions at the intersection of malware analysis, software engineering, and intelligent defence systems. The workshop aims to bridge that gap by establishing a dedicated forum for sharing advancements in malware detection, vulnerability discovery, and software hardening through AI-driven and data-centric approaches. Despite the rapid growth of cyber threats and research activity worldwide, there is currently no comparable cybersecurity venue dedicated to these topics. The AMASS workshop aims to:
- Create a dedicated platform for sharing research results, datasets, and tools in malware and software security.
- Encourage collaboration between academia and industry, particularly in the context of threat intelligence and malware response.
- Bridge static and dynamic analysis communities and foster reproducibility in malware research.
- Support the next generation of researchers through discussions, demos, and early-stage research presentations.

For more information, please see https://sites.google.com/view/amass2026/home.

February 2026

PETS 2026 26th Privacy Enhancing Technologies Symposium, Calgary, Canada, July 20-25, 2026. (Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 26th PETS is expected to be a hybrid event with a physical gathering (location TBD) and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are strongly encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not strictly required for publication in the proceedings.

PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges or article submission charges.

Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. Authors will receive a decision of accept, revise, or reject. Those receiving revise will be invited to revise their article with the guidance of a revision editor according to a well-defined set of revision criteria and will have up to four months to attempt to complete the required revisions. Authors of rejected papers must skip a full issue prior to resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into consideration during the discussion. New for 2026: The authors will be able to submit a separate, 250-word rebuttal response to each individual review (rather than a single response that addresses all reviews).

For more information, please see https://petsymposium.org/cfp26.php.

March 2026

ACM WiSec 2026 19th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Saarbrucken, Germany, June 30 - July 3, 2026. (Submission Due 18 November 2025 and 3 March 2026) [posted here 12/8/25]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as the Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

Important update on ACMs new open access publishing model for 2026 ACM Conferences: Starting January 1, 2026, ACM will fully transition to Open Access. All ACM publications, including those from ACM-sponsored conferences, will be 100% Open Access. Authors will have two primary options for publishing Open Access articles with ACM: the ACM Open institutional model or by paying Article Processing Charges (APCs). With over 2,600 institutions already part of ACM Open, the majority of ACM-sponsored conference papers will not require APCs from authors or conferences (currently, around 76%). Authors from institutions not participating in ACM Open will need to pay an APC to publish their papers, unless they qualify for a financial waiver. To find out whether an APC applies to your article, please consult the list of participating institutions in ACM Open and review the https://www.acm.org/publications/policies/policy-on-discretionary-open-access-apc-waivers.

For more information, please see https://wisec26.events.cispa.de.

April 2026

ACM CCS 2026 33rd ACM Conference on Computer and Communications Security, Hague, The Netherlands, November 15-19, 2026. (Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized. Papers should avoid revealing authors' identity in the text. When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself. Papers not properly anonymized may be rejected without review. Authors may submit up to a maximum of 7 papers at each cycle .

All submitted papers will be evaluated based on their merits, particularly their importance to practical aspects of computer and communications security and privacy, novelty, quality of execution, and presentation. Note that CCS does not accept SoK or survey papers.

Authors are expected to consider the ethical implications and potential societal impact of their work. Papers that raise ethical concerns, such as those involving human subjects, user data, or real-world vulnerability analysis, must include a dedicated "Ethical Considerations" section. This section should discuss the balance of risks vs. benefits and the steps taken to minimize potential harm (e.g., responsible disclosure, data anonymization). Note that institutional (IRB/ERB) approval is neither strictly necessary nor always sufficient to demonstrate ethical conduct; we expect authors to reason about the ethics of their work beyond ensuring institutional compliance. For detailed guidance on community standards, we follow the USENIX Security'26 Ethics Policy. This section does not count toward the page limit and should be placed after the 12-page main content.

This edition of ACM CCS adopts an Open Science policy to strengthen the transparency, reproducibility, and long-term impact of published research. Authors are expected to share the artifacts underlying their results (such as code, datasets, models, scripts, and documentation) whenever legally, ethically, and practically possible. Each submitted paper must include an ``Open Science" appendix. More details can be found on the conference call for papers page.

Providing Artifacts at Submission Time: Artifacts are required for submissions whose contributions fundamentally rely on an implementation, experimental evaluation, system, tool, or dataset. This includes, but is not limited to, papers that: (1) Introduce a new system, library, or tool. (2) Present experimental results derived from an implementation. (3) Propose a new benchmark, dataset, or data collection methodology. If reviewers determine that a central contribution cannot be properly evaluated without accessing artifacts that are neither provided nor convincingly justified in the Open Science appendix (as required by the Open Science Policy), the paper may be rejected. All artifacts will be treated with the same strict confidentiality as the manuscript. Access is restricted to the assigned PC members, who may use artifacts only for the purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for personal or professional purposes constitutes a serious ethical violation and may result in removal from the PC and additional sanctions (such as bans on future service or submissions).

Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on Authorship regarding the use of generative AI tools. More details about the guidelines when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT, Claude, Copilot) can be found on the conference call for papers page.

Special note for Machine Learning papers submitting to CCS: Machine learning has become pervasive across security and privacy research. To ensure papers are directed to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy issue, submit the paper in the track that better aligns with the primary field of the problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security or privacy of ML itself, the Security and Privacy of Machine Learning track is the right fit. This must also be stated in the Track Justification Statement, clarifying the authors' decision not to submit to a domain-specific track (e.g., Web Security, Software Security).

The paper evaluation needs to be linked to the threat model and scenario motivating the paper. Strong submissions produce generalizable contributions such as frameworks for risk assessment, attack patterns that generalize across models, systematic problem characterizations, or principled defenses with clear justification. Papers that present collections of examples or trial-and-error probes, or approaches lacking methodical rigor, will be considered out of scope. Purely theoretical ML works without actionable security insights are out of scope, as are papers focusing on generic ML properties (e.g., robustness to natural noise) that lack clear security implications.

For more information, please see https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
IEEE Transactions on Privacy,   Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page.  More information can be found at https://www.computer.org/csdl/journals/pr.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.