Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:9/23/24

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2023

CBT 2024 8th International Workshop on Cryptocurrencies and Blockchain Technology, Held in conjunction with ESORICS 2024, Bydgoszcz, Poland, September 19, 2024. [posted here 6/10/24]
Since the appearance of Bitcoin in 2009, a plethora of new cryptocurrencies and other blockchain based systems have been deployed with different success. While some of them are slightly different copies of Bitcoin, other ones propose interesting improvements or new usages of the underlying blockchain technology. However, the novelty of such technologies is often tied with rapid developments and proof-of-concept software, and rigorous scientific analyses of the proposed systems are often skipped. This workshop aims to provide a forum for researchers in this area to carefully analyze current systems and propose new ones in order to create a scientific background for a solid development of new cryptocurrencies and blockchain technology systems.

For more information, please see http://cbtworkshop.org/.

DPM 2024 18th International Workshop on Data Privacy Management, Co-located with ESORICS 2024, Bydgoszcz, Poland, September 19, 2024. [posted here 5/27/24]
DPM is an annual international workshop covering research in data privacy management. Organizations are increasingly concerned about the privacy of information that they manage (as witnessed, for example, by lawsuits filed against organizations for violating the privacy of customer's data). Thus, the management of privacy-sensitive information is very critical and important for every organization.

For more information, please see https://deic.uab.cat/dpm/dpm2024/.

ESORICS 2024 9th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024. [posted here 1/8/24]
Computer security emphasizes safeguarding information in settings susceptible to breaches or malevolent activities. The aim of ESORICS is to further the progress of research in computer security by fostering a European community that bridges academia and industry in this realm. Sequentially hosted across various European nations, the symposium has solidified its position as one of Europe's most prominent conferences on computer security. Currently, the symposium delves into research and developmental avenues encompassing AI, machine learning, technologies that enhance privacy, network safeguards, software and hardware protection in practical scenarios.

For more information, please see https://esorics2024.org.

SCN 2024 14th International Conference on Security and Cryptography for Networks, Amalfi, Italy. September 11-13, 2024. [posted here 1/22/24]
The Fourteenth International Conference on Security and Cryptography for Networks (SCN 2024) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.

For more information, please see https://scn.unisa.it/scn24/index.php/call-for-papers/.

CSR 2024 IEEE International Conference on Cyber Security and Resilience, London, UK, Hybrid Conference, September 2-4, 2024. [posted here 2/5/24]
The technological and industrial revolution brought by complex cyber-physical systems (CPS) comes with new threats and cyber-attacks that exploit their inherent complexity and heterogeneity. These attacks have a significant negative impact on the operation of various services in critical sectors, like energy, transport, and communications, which provide the vital functions that our societies depend upon. The conference focuses on theoretical and practical aspects of the security, privacy, trust, and resilience of networks, systems, and services as well as novel ways for dealing with their vulnerabilities and mitigating sophisticated cyber-attacks.

For more information, please see https://www.ieee-csr.org/.

ICICS 2024 26th International Conference on Information and Communications Security, Mytilene, Greece, August 26-28, 2024. [posted here 1/8/24]
Authors are invited to submit original papers not previously published nor submitted in parallel for publication to any other conference, workshop or journal. All submitted papers must be anonymous, with no author names, affiliations, acknowledgements, or obvious references, for double blind reviews. The page limits for the camera-ready papers are 20 pages, including the bibliography and well-marked appendices. Selected accepted papers will be invited to submit extended versions to a special issue of the International Journal of Information Security.

For more information, please see http://icics2024.aegean.gr/submissions/.

SciSec 2024 6th International Conference on Science of Cyber Security, Copenhagen, Denmark, August 14-16, 2024. [posted here 2/26/24]
SciSec2024 aims at bringing together scholars, scientists, and industrialists from all over the world on a common platform to present their original, unpublished high-quality research papers and share their valuable research insights in the fields of, but not limited to Cyber Security, AI, Quantum Technologies, Blockchain, IoT, Cloud Computing, and emerging fields.

For more information, please see https://scisec.org/index.html.

USENIX Security 2024 33rd USENIX Security Symposium, Philadelphia, PA, USA, August 14-16, 2024. [posted here 1/28/23]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The Call for Papers will be available soon.

For more information, please see https://www.usenix.org/conference/usenixsecurity24.

CSET 2024 17th Cyber Security Experimentation and Test Workshop, Philadelphia, PA, USA, August 13, 2024. [posted here 3/18/24]
For 16 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for presenting research on and discussing “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability—in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and/or demonstrably grow community resources.

For more information, please see https://cset24.isi.edu/index.html.

SOUPS 2024 20th Symposium on Usable Privacy and Security, Philadelphia, PA, USA, August 11-13, 2024. [posted here 1/8/24]
The 2024 Symposium on Usable Privacy and Security (SOUPS) will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. We invite authors to submit previously unpublished papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Papers will be judged on their scientific quality, overall quality, and contribution to the field.

For more information, please see https://www.usenix.org/conference/soups2024.

EDid 2024 1st International Workshop on Emerging Digital Identities, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/11/24]
The identity environment has evolved into a complex ecosystem demanding seamless interoperability, stronger security measures, and user-centric experiences in an increasingly interconnected digital world. Addressing these difficulties necessitates collaboration among scholars and practitioners from diverse disciplines, establishing an interdisciplinary approach critical for shaping the future of identity management. EDId navigates a wide variety of security, privacy, and legal compliance issues, addressing technical issues like security and interoperability as well as legal and regulatory considerations like data protection and privacy.

For more information, please see https://www.ares-conference.eu/edid.

BASS 2024 4th International Workshop on Behavioral Authentication for System Security, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/18/24]
BASS aims at attracting innovative contributions from both industry and academia related to all aspects of human, system, or software behavioral analysis for IT security. The workshop solicits submissions on both theoretical aspects and practical applications of behavior analysis, behavior-based identification and authentication, profiling, and privacy and security aspects related to recording and exploitation of behavioral features.

For more information, please see https://www.ares-conference.eu/workshops/bass/.

ENS 2024 7th International Workshop on Emerging Network Security, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/25/24]
The ENS 2024 workshop aims at collecting the most relevant ongoing research efforts in emerging network security field. It also serves as a forum for 5G & beyond projects in order to disseminate their security-related results and boost cooperation, also foster development of the 5G and beyond Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field. Last but not least it also aims to bridge 5G & Beyond community with other communities (e.g. AI) that are key to support full attainment of 5G & Beyond but also 6G promises and so for those technologies to release their full potential.

For more information, please see https://www.ares-conference.eu/ens/.

CUING 2024 8th International Workshop on Cyber Use of Information Hiding, Held in conjunction with the 19th International Conference on Availability, Reliability and Security (ARES 2024), Vienna, Austria, July 30 - August 2, 2024. [posted here 3/25/24]
The increasing number of Internet users, availability of storage and network resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive campaigns targeting the virtual world. With the diffusion of improved defensive methods, attackers now utilize more and more sophisticated techniques to perform their malicious activities. In recent years, information hiding has emerged as one of the most sophisticated and effective mechanisms for launching attacks. Threat actors now regularly use information hiding to elude countermeasures and prevent reversing the attack chain. More recently, hiding techniques have been deployed to create covert channels, i.e., parasitic communications paths nested in network traffic and digital objects, mainly to cloak command & control communications. Unfortunately, detection and mitigation of threats taking advantage of information hiding are hard tasks that pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to bring together researchers, practitioners, law enforcement representatives, and security professionals in the area of analysis of information hiding techniques when used in cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop are not limited to classic digital steganography applications or the creation and mitigation of covert communications. Therefore, CUIng also welcomes works that pertain to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of processes, and communication flows. To present a more complete picture of the novel research on hiding methods and their utilization by the attackers, submissions dealing with impersonation or mimicking are encouraged as well, especially to address information hiding in a complete manner, for instance, to discuss ideas for fighting misuse of privacy-enhancing technologies.

This year the CUING workshop is co-organized together with DISSIMILAR (Detection of fake newS on SocIal MedIa pLAtfoRms) project.

For more information, please see https://www.ares-conference.eu/cuing.

ARES 2024 19th International Conference on Availability, Reliability and Security, Vienna, Austria, July 30 - August 2, 2024. [posted here 2/26/24]
The 19th International Conference on Availability, Reliability and Security (“ARES – The International Dependability Conference”) will bring together researchers and practitioners in the area of dependability. ARES highlights the various aspects of dependability – with special focus on the crucial linkage between availability, reliability and security. It aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. It emphasizes the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. SRES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.

For more information, please see http://www.ares-conference.eu/.

PETS 2024 24th Privacy Enhancing Technologies Symposium (PETS 2024) Bristol, UK and Online, July 15-20, 2024. [posted here 6/5/23]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 24th PETS will be a hybrid event with a physical gathering held in Bristol, UK and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not required for publication in the proceedings. We will carefully monitor the COVID-19 situation, and may change the organization of the event as necessary. PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges (APCs) or article submission charges.

For more information, please see https://petsymposium.org/cfp24.php.

DFRWS 2024 24th Annual Digital Forensic Research Conference, Baton Rouge, LA, USA, July 9-12, 2024. [posted here 4/9/23]
DFRWS is a premier conference for digital forensic research. It attracts participants from many sectors, including law enforcement (such as local state police and federal agencies), industry (including vendors and practitioners), and academia. The Forensic Science International: Digital Investigation Journal, Elsevier, will publish the DFRWS proceedings as open access in a supplement issue.

For more information, please see https://dfrws.org/conferences/dfrws-usa-2024/.

CSF 2024 37th IEEE Computer Security Foundations Symposium, Enschede, Netherlands, July 8-12, 2024. [posted here 6/5/23]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer Society's Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF's home.

The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2024.ieee-security.org.

FCS 2024 Workshop on Foundations of Computer Security, Co-located with CSF 2024, Enschede, Netherlands, July 8, 2024. [posted here 5/6/24]
FCS is a friendly, in-person 1-day workshop that brings together researchers interested in laying the foundations of secure systems. FCS welcomes papers on all topics related to the formal underpinnings of security and privacy, and their applications. The workshop has no formal proceedings: you are welcome to advertise work that appeared in other venues or submit your work-in-progress. We are seeking submissions for full-length talks and short talks. Submissions may conform to any 2-column format accepted by IEEE, ACM, or USENIX conferences. FCS uses a light form of double-blind reviewing similar to CSF.

For more information, please see https://fcs-workshop.github.io/fcs2024/.

WTMC 2024 9th International Workshop on Traffic Measurements for Cybersecurity, Co-located with the 9th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2024), Vienna, Austria, July 8, 2024. [posted here 3/25/24]
The WTMC workshop aims to bring together the research accomplishments provided by researchers from academia and the industry. The other goal is to show the latest research results in the field of cybersecurity and understand how traffic measurements can influence it. We encourage prospective authors to submit related distinguished research papers on the subject of both theoretical approaches and practical case reviews. This workshop presents some of the most relevant ongoing research in cybersecurity seen from the traffic measurements perspective. The workshop will be accessible to both non-experts interested in learning about this area and experts interested in hearing about new research and approaches.

For more information, please see https://wtmc.info/.

ASIACCS 2024 19th ACM ASIA Conference on Computer and Communications Security, Singapore, July 1-5, 2024. [posted here 4/9/23]
The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024) seeks paper submissions presenting novel contributions related to all real-world aspects of security and privacy. We seek articles presenting accessible and compelling results to general computer security researchers. Purely theoretical (e.g., cryptography-focused, with no security/application connections) submissions are not encouraged. The same goes for submissions focusing primarily on blockchains or machine learning.

Like in previous years, we will also be accepting “Systemisation of Knowledge” (SoK) papers. SoK submissions need to add the prefix “SoK” in the title and a checkbox on the submission form. They will be accepted based on the value to the community. Survey papers without insights evaluating, systematizing and contextualizing current knowledge will be rejected.

For more information, please see https://asiaccs2024.sutd.edu.sg/cfp/.

SaT-CPS 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Held in conjunction with the 14th ACM Conference on Data and Application Security and Privacy (CODASPY 2024), Porto, Portugal, June 21, 2024. [posted here 2/19/24]
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS) aims to represent a forum for researchers and practitioners from industry and academia interested in various areas of CPS security. SaT-CPS seeks novel submissions describing practical and theoretical solutions for cyber security challenges in CPS. Submissions can be from different application domains in CPS.

For more information, please see https://sites.google.com/view/sat-cps-2024/.

CODASPY 2024 14th ACM Conference on Data and Application Security and Privacy, Porto, Portugal, June 19-21, 2024. [posted here 6/5/23]
The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Data leak detection and prevention
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

For more information, please see http://www.codaspy.org/2024/.

SAGAI 2024 Workshop on Security Architectures for GenAI Systems, Held in conjunction with IEEE SP 2024 Conference, San Francisco, California, USA, May 23, 2024. [posted here 12/25/23]
Generative AI (GenAI) is quickly advancing and fast becoming a widely deployed technology. GenAI-based systems rely on machine-learning (ML) models trained on large amounts of data using deep-learning techniques. As the power and flexibility of the models advance, the architectural complexity of GenAI-based systems is advancing too. Current architectures may combine multiple models, using sequences of model queries to complete a task, with external (non-ML) components leveraged to enhance the model’s operation via database queries or API calls. These architectures may be vulnerable to a variety of attacks that use adversarial inputs to create malicious outputs. This workshop invites new contributions to the broader understanding of security for GenAI systems and applications. Contributions may address security threats and defenses for individual models, or for systems and architectures that may employ one or more generative ML models as subcomponents. The workshop welcomes discussion of new GenAI security concerns, as well as new approaches to architecting GenAI-based systems for safety, security, and privacy.

For more information, please see https://sites.google.com/view/sagai2024/home.

SafeThings 2024 8th IEEE/ACM Workshop on the Internet of Safe Things, Held in conjunction with IEEE SP 2024 Conference, San Francisco, California, USA, May 23, 2024. [posted here 12/11/23]
The 8th Workshop on the Internet of Safe Things seeks to bring together researchers to create solutions for the development of safe cyber-physical systems. As safety is inherently linked with the security and privacy of a system, we also seek contributions in these areas that address safety concerns. We seek to develop a community that systematically dissects the vulnerabilities and risks exposed by these emerging CPSs, and creates tools, algorithms, frameworks, and systems that help in the development of safe systems.

We seek contributions across domains - autonomous vehicles, smart homes, medical devices, smart grid, intelligent transportation; and across disciplines - systems, control, human-computer interaction, security, reliability, machine learning, and verification. The scope of our workshop includes safety topics as they relate to an individual’s health (physical, mental), society (air pollution, toxicity, disaster events), or the environment (species preservation, global warming, oil spills). The workshop considers safety from a human perspective and, thus, does not include topics such as thread safety or memory safety in its scope.

For more information, please see https://safe-things-2024.github.io.

SP 2024 45th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-23, 2024. [posted here 6/7/23]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ìSoK:î in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

For more information, please see https://sp2024.ieee-security.org/cfpapers.html.

NSF-WSCS 2024 The NSF Workshop on Sustainable Computing for Sustainability, Alexandria, VA, USA, April 16-17, 2024. [posted here 10/16/23]
The workshop will follow a hybrid format with both remote and in-person participation. Remote participation will be through a zoom webinar that will be open to all within the limits of the zoom webinar platform. Instructions for joining the webinar will be posted on the Workshop's website a few weeks before it is scheduled to take place.

Because of logistical constraints, in-person attendance will be limited to approximately 100 participants, with eligible travel costs supported through a grant from NSF. The primary purpose of this call for submissions is, therefore, to help us identify a diverse and complementary set of attendees so as to ensure a productive workshop. A report documenting the findings and recommendations of the workshop will be made publicly available following the successful completion of the workshop.

Towards performing such as selection, we are asking interested individuals to submit a short (two pages or less excluding references, single-column, single-space, 11pt fonts) statement of interest before February 15, 2024, AoE. You can submit multiple statements of interest.

For more information, please see https://edas.info/web/nsf-wscs24/index.html.

SPW 2024 29th International Workshop on Security Protocols, Brno, Czechia, April 10-12, 2024. [posted here 10/16/23]
The theme of the 2024 workshop is "Ghost in the Protocol — Security Protocols and AI". We invite proposals for papers containing exciting, original ideas that will elicit lively, thought-provoking in-person discussions. SPW papers should lead to conceptual advances, not be archival papers about work that has already been completed and polished. The workshop is by invitation only; to receive an invitation, please submit a position paper by 8 January 2024 for our consideration. Security protocols have always been seized with the question of whether a participant is a human or not. Given recent developments around the generation of text, images, code, audio and video, however, we must now consider the interplay of AI and the protocols themselves. Can machine-generated protocols, with machine-checked proofs, do a better job than human designers? Instead of humans producing machine-readable protocol descriptions, can machines produce human-comprehensible descriptions? As always, please consider this theme as inspirational rather than restrictive. As long-time attendees already know, it is perfectly acceptable to offer a position paper only loosely related to the theme, or on another security topic, provided the paper is deemed likely to stimulate an interesting discussion. New authors are encouraged to browse through past volumes of post-proceedings (search for Security Protocols Workshop in the Springer LNCS series) to get a flavor for the variety and diversity of topics that have been accepted in past years, as well as the lively discussion that has accompanied them.

For more information, please see https://www.cl.cam.ac.uk/events/spw/2024/.

FHE 2024 3rd Annual FHE.org Conference on Fully Homomorphic Encryption, Held in conjunction with the Real World Crypto 2024, Toronto, Canada, March 24, 2024. [posted here 10/18/23]
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The FHE.org conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption. The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies. Topics of interest include, but are not limited to:
- Fully homomorphic encryption and its applications
- Efficient and secure implementations of cryptographic algorithms Software for fully homomorphic encryption
- Hardware architectures for fully homomorphic encryption
- Compilers for fully homomorphic encryption
- Physical attacks and countermeasures
- Secure applications using fully homomorphic encryption
- Security of encrypted computing and applications
- Cryptographic protocols using fully homomorphic encryption for privacy-preserving systems
- Formal modeling and formal proofs for encrypted computing
- Validation and certification of fully homomorphic encryption

For more information, please see https://asiaccs2024.sutd.edu.sg/cfp/.

FC 2024 28th International Conference on Financial Cryptography and Data Security, Willemstad, Curacao, March 4-8, 2024. [posted here 8/21/23]
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and interdisciplinary works are particularly encouraged.

The goal of the conference is to bring security and cryptography researchers and practitioners together with economists, bankers, implementers and policy-makers. Intimate and colourful by tradition, the FC program features invited talks, academic presentations, technical demonstrations and panel discussions. In addition, several workshops will be held in conjunction with the FC conference.

For more information, please see https://fc24.ifca.ai/cfp.html.

NDSS 2024 Network and Distributed System Security Symposium, San Diego, California, uSA, February 26 - March 1, 2024. [posted here 6/5/23]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The NDSS 2024 workshops and symposia will take place in San Diego, CA, from 26 February to 1 March 2024. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies.

This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2024. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included in the first page of the paper. The authors are therefore free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2024/.

VehicleSec 2024 2nd ISOC Symposium on Vehicle Security and Privacy, Co-located with NDSS 2024, San Diego, CA, USA, February 26, 2024. [posted here 4/9/23]
A vehicle is a machine that transports people and/or cargo in one or more physical domains, such as on the ground (e.g., cars, bicycles, motorcycles, trucks, buses, scooters, trains), in the air (e.g., drones, airplanes, helicopters), underwater (e.g., ships, boats, watercraft), and in space (e.g., spacecraft). Due to their safety- and mission-critical nature, the security and privacy of vehicles can pose direct threats to passengers, owners, operators, as well as the environment. Recent improvements in vehicle autonomy and connectivity (e.g., autonomous driving, drone delivery, vehicle-to-everything (V2X) communication, intelligent transportation, drone swarm) have only served to exacerbate security and privacy challenges and thus require urgent attention from academia, industry, and policy-makers. To meet this critical need, the ISOC (Internet Society) VehicleSec symposium aims at bringing together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, underwater, space), their sub-systems (e.g., in-vehicle networks, autonomy, connectivity, human-machine interfaces), supporting infrastructures (e.g., transportation infrastructure, charging station, ground control station), and related fundamental technologies (e.g., sensing, control, AI/ML/DNN/LLM, real-time computing, edge computing, location service, simulation, digital twin, multi-agent protocol/system design, and human-machine interaction).

For more information, please see https://www.ndss-symposium.org/ndss2024/submissions/cfp-vehiclesec/.

IFIP 11.9 DF 2023 20th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 4-5, 2024. [posted here 8/7/23]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Twentieth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately 60 participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume – the twentieth volume in the well-known Research Advances in Digital Forensics book series (Springer, Cham, Switzerland) during the summer of 2024.

Technical papers are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Enterprise and cloud forensics
- Mobile and embedded device forensics
- Image and video forensics
- Internet of Things forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org.