|
Calls for Papers
Last Modified:5/19/25
Upcoming Conferences and Workshops
Note: The submission date has passed.
May 2025
IFIP TC-11 SEC 2025
40th IFIP TC-11 International Information Security and Privacy Conference,
Maribor, Slovenia, May 21-23, 2025.
[posted here 11/18/24]
The IFIP SEC conference is the flagship event of the International Federation for
Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information
Processing Systems (TC-11, www.ifiptc11.org). We seek submissions from academia, industry, and
government presenting novel research on all theoretical and practical aspects of security
and privacy protection in ICT Systems. Practitioners and industry representatives are encouraged
to submit papers. We welcome contributions within, but not limited to, the following areas:
- Access control and authentication
- Applied cryptography
- Audit and risk analysis
- Big data security and privacy
- Cloud security and privacy
- Critical infrastructure protection
- Cyber-physical systems security
- Data and applications security
- Digital forensics
- Human aspects of security and privacy
- Identity management
- Industry networks security
- Information security education
- Information security management
- Information technology misuse and the law
- IoT security
- Managing information security functions
- Mobile security
- Multilateral security
- Network & distributed systems security
- Pervasive systems security
- Privacy protection and Privacy-by-design
- Privacy-enhancing technologies
- Quantum computations and post-quantum cryptography
- Side-channel attacks
- Surveillance and counter-surveillance
- Trust management
For more information, please see
http://sec2025.um.si/.
WNDSS 2025
International Workshop on Network and Distributed Systems Security,
Co-located with the 40th International Information Security and Privacy
Conference (IFIP SEC 2025),
Maribor, Slovenia, May 23, 2025.
[posted here 1/13/25]
The workshop is organized by IFIP Working Group 11.4 “Network &
Distributed Systems Security”. The aim of the workshop is to provide a
forum for discussion among researchers, practitioners, regulators,
students, and any other interested parties. The scope of the workshop
covers the security of computer networks and of distributed systems.
Beyond technical papers and papers presenting the results of completed
research, also work-in-progress papers, position papers, survey
papers, and papers discussing non-technical aspects are of interest.
The best student paper will receive an award.
For more information, please see
https://ifiptc11.org/wg114-events/wg114-workshop/.
TX4Nets 2025
2nd International Workshop on Trustworthy and eXplainable Artificial Intelligence for Networks,
Co-located with IFIP Networking 2025,
Limassol, Cyprus, May 25-29, 2025.
[posted here 2/10/25]
Artificial Intelligence (AI) has become a transformative force in
communication networks, reshaping their design, management, and optimization. In
several areas, these systems hold the promise of significantly enhancing service
provisioning and network operations. However, the adoption of AI-based systems in
the telecom domain has been relatively slow, with operators expressing skepticism
about their use for automated network management. This hesitation stems from several
key challenges: first, the reliability of these models must be thoroughly understood
before they can be deployed in critical infrastructure. Second, the opaque nature of
ML/AI models—stemming from a lack of transparency—complicates understanding their
behavior and decisions, preventing operators from fully trusting and adopting them.
To address these issues, the 2nd International Workshop on Trustworthy and Explainable
Artificial Intelligence for Networks (TX4NETs) aims to serve as a collaborative platform
to drive advancements in AI systems that are not only powerful but also reliable,
interpretable, and aligned with the expectations of network operators.
The 2nd International Workshop on Trustworthy and Explainable Artificial Intelligence
for Networks seeks to bring together leading researchers, practitioners, and industry
experts to delve into the latest advancements in AI and their applications in communication
networks. The workshop will center on the foundational pillars of trustworthy AI,
including transparency, robustness, reliability, adaptability, security, data privacy,
and computational efficiency, with a focus on their implications for automating and
optimizing network operations. Participants will engage in discussions around innovative
techniques and methodologies that foster trustworthiness to address challenges in
creating AI-driven network systems that inspire confidence.
For more information, please see
https://sites.google.com/view/tx4nets-2025/important-dates-and-cfp.
June 2025
CVC 2025
8th Crypto Valley Conference on Blockchain Technology,
Zug, Switzerland, June 5-6, 2025.
[posted here 3/3/25]
The Crypto Valley Conference on Blockchain Technology is a premier venue for
blockchain and cryptographic research, bringing together leading academics, industry
experts, and policymakers. The 2025 edition will continue its tradition of featuring
cutting-edge research, insightful discussions, and opportunities for collaboration.
We welcome submissions on a wide range of topics, including but not limited to:
- Cryptographic protocols for blockchain and distributed systems
- Privacy-enhancing technologies and zero-knowledge proofs
- Post-quantum cryptography and its impact on blockchain
- Consensus mechanisms and scalability solutions
- Game-theoretic and economic aspects of blockchain systems
- Smart contract security and formal verification
- Governance, regulation, and policy in decentralized ecosystems
- Applications of blockchain in finance, supply chain, and beyond
For more information, please see
https://cryptovalleyconference.com/call-for-papers.
IWSPA 2025
11th ACM International Workshop on Security and Privacy Analytics,
Co-located with ACM CODASPY 2025,
Pittsburgh, Pennsylvania, June 6, 2025.
[posted here 1/13/25]
The goal of this workshop is to bring leaders in security and privacy
fields together from across the globe.
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural
language processing are being applied to challenges in security and privacy fields. However,
experts from these areas have no medium where they can meet and exchange ideas so that strong
collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current
courses and curricula in security do not sufficiently emphasize background in these areas and
students in security and privacy are not emerging with deep knowledge of these topics.
Hence, we propose a workshop that will address the research and development efforts in which
analytical techniques from machine learning, data mining, natural language processing and
statistics are applied to solve security and privacy challenges (“security analytics”).
Submissions of papers related to methodology, design, techniques and new directions for
security and privacy that make significant use of machine learning, data mining, statistics
or natural language processing are welcome. Furthermore, submissions on educational topics
and systems in the field of security analytics are also highly encouraged.
For more information, please see
https://sites.google.com/view/iwspa-2025.
CSF 2025
38th IEEE Computer Security Foundations Symposium,
Santa Cruz, CA, USA, June 16-20, 2025.
[posted here 10/1/24]
The Computer Security Foundations Symposium (CSF) is an annual conference for
researchers in computer security, to examine current theories of security, the formal models that
provide a context for those theories, and techniques for verifying security. It was created in 1988
as a workshop of the IEEE Computer Society’s Technical Committee on Security and Privacy, in response
to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting
became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two
decades, many seminal papers and techniques have been presented first at CSF. For more details on the
history of the symposium, visit CSF’s home.
The program includes papers, panels, and a poster session. Topics of interest include access control,
information flow, covert channels, cryptographic protocols, database security, language-based security,
authorization and trust, verification techniques, integrity and availability models, and broad discussions
concerning the role of formal methods in computer security and the nature of foundational research
in this area.
For more information, please see
https://csf2025.ieee-security.org.
WEIS 2025
24th Annual Workshop on the Economics of Information Security,
Tokyo, Japan, June 23-25, 2025.
[posted here 1/13/25]
The workshop accepts papers covering both theoretical and empirical
studies of the interrelationship between information security (broadly
construed, particularly to include privacy, cybercriminality and
cyber-warfare) and economics (including financial incentives,
behavioural economics, cyberinsurance). Market failures,
market-induced technical failures, and cost analyses of investment in
cybersecurity versus falling victim to cybercrime, have all been
covered in past workshops. We encourage participation by submission of paper and attendance by
economists, computer scientists, legal scholars, business researchers
(from academia and elsewhere), and security and privacy researchers
from academia and industry to submit research on relevant topics.
For more information, please see
http://kmlabcw.iis.u-tokyo.ac.jp/weis/2025/index.html.
WTMC 2025
10th International Workshop on Traffic Measurements for Cybersecurity,
Co-located with the 10th IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2025),
Venice, Italy, June 30, 2025.
[posted here 1/20/25]
Current communication networks are increasingly becoming pervasive, complex,
and ever-evolving due to factors like enormous growth in the number of network users,
continuous appearance of network applications, increasing amount of data transferred, and
diversity of user behavior. Understanding and measuring traffic in such networks is a
challenging yet vital task for network management but recently also for cybersecurity
purposes. Network traffic measurement and monitoring can, for example, enable the analysis
of the spreading of malicious software and its capabilities or can help to understand the
nature of various network threats, including those that exploit user's behavior and other
user's sensitive information. On the other hand, network traffic investigation can also
help to assess the effectiveness of the existing countermeasures or contribute to building
new, better ones. Traffic measurements have been utilized in the area of economics of
cybersecurity e.g., to assess ISP “badness” or to estimate the revenue of cybercriminals.
Recent research has focused on measurements of fake news and the interplay between
misinformation and user engagement in news postings using different online platforms.
Additionally, recent studies have explored measurements of generative AI's role in cybersecurity,
highlighting its dual potential to bypass security measures in cyberattacks and strengthen
defense mechanisms against evolving threats.
The WTMC workshop aims to bring together the research accomplishments provided by researchers
from academia and the industry. The other goal is to show the latest research results in the
field of cybersecurity and understand how traffic measurements can influence it. We encourage
prospective authors to submit related distinguished research papers on the subject of both
theoretical approaches and practical case reviews. This workshop presents some of the most
relevant ongoing research in cybersecurity seen from the traffic measurements perspective.
For more information, please see
https://wtmc.info/index.html.
ACM WiSec 2025
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Arlington, Virginia, USA, June 30 - July 3, 2025.
[posted here 10/14/24]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security
and privacy in wireless and mobile networks and their applications. In addition to the traditional
ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the
increasingly diverse range of mobile or wireless applications such as the Internet of Things,
Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable
security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software
vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion,
jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols,
cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA),
wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment
applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization,
remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices,
wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT,
Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites),
and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications,
sonic, underwater communications, legacy telecommunications, ...
For more information, please see
https://wisec2025.gmu.edu.
IEEE EuroS&P 2025
10th IEEE European Symposium on Security and Privacy,
Venice, Italy, June 30 - July 4, 2025.
[posted here 11/1/24]
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting
developments in computer security and electronic privacy, and for bringing together researchers and practitioners
in the field. Following this story of success, IEEE initiated the European Symposium on Security and Privacy (EuroS&P),
which is organized every year in a European city. The IEEE European Symposium on Security and Privacy (Euro S&P)
is the younger, more adventurous, and tastier sibling conference of the IEEE Symposium on Security and Privacy
("Oakland" or "NorCal S&P") conference. It is a premier forum for computer security and privacy research,
presenting the latest developments and bringing together researchers and practitioners.
We solicit previously unpublished papers offering novel research contributions in security or
privacy, as well as Systematization of Knowledge papers that systematize previous results. EuroS&P
is interested in all aspects of applied computer security and privacy. We especially encourage papers
that are far-reaching and risky, provided those papers show sufficient promise for creating interesting
discussions and usefully questioning widely-held beliefs. Papers without a clear connection to security
or privacy will be considered out of scope and may be rejected without full review.
For more information, please see
https://eurosp2025.ieee-security.org.
July 2025
SACMAT 2025
30th ACM Symposium on Access Control Models and Technologies,
Stony Brook, NY, USA, July 8-10, 2025.
[posted here 2/17/25]
Access control has long been one of the most widely adopted and foundational security
technologies. It has been seamlessly integrated into operating systems like Multics and
Unix—pioneering platforms that contributed to Turing Award-winning innovations—and continues
to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness
have stood the test of time. However, the landscape of computing has dramatically changed since
the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference
in 1994. We now operate in a deeply interconnected, networked world where no single application
or device can act as a fully trusted reference monitor to enforce access control in isolation.
This shift demands new trust models, management strategies, enforcement techniques, and
supporting mechanisms, such as advanced authentication. In response, SACMAT 2025 invites
submissions presenting novel contributions in efficient and effective security mechanisms
for distributed, networked computing environments.
For more information, please see
https://www.sacmat.org/2025/.
PETS 2025
25th Privacy Enhancing Technologies Symposium,
Washington, DC and Online, July 14-19, 2025.
[posted here 7/22/24]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts
from around the world to present and discuss recent advances and new perspectives on research in
privacy technologies. The 25th PETS will be a hybrid event with a physical gathering held in
Washington, DC, USA and a concurrent virtual event. Papers undergo a journal-style reviewing process,
and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs).
Authors of accepted papers are encouraged to attend and present at the physical event, where their
presentations can be recorded for the virtual event and where they can participate directly in
in-person research, technical, and social activities. However, in-person attendance is not required
for publication in the proceedings.
PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality
reviewing and publication while also supporting the successful PETS community event. PoPETs is
self-published and does not have article processing charges or article submission charges.
For more information, please see
https://petsymposium.org/cfp25.php.
DFRWS-USA 2025
25th Annual Digital Forensics Research Conference,
Chicago, Illinois, USA, July 22-25, 2025.
[posted here 11/4/24]
DFRWS conferences feature thought provoking Keynote Speakers, hands-on workshops, cutting edge
research papers, presentations, panel discussions, demonstrations and poster sessions accompanied by a
full schedule of social events including a Welcome Reception, the DFRWS Digital Forensics Rodeo and an
expedition. All presentations take place in-person but virtual registrations will be available for
those who are not able to attend the conference in person but wish to participate in this historic event.
FULL RESEARCH PAPERS undergo double-blinded peer review, and the proceedings are published by
Elsevier as a special issue of the Journal of Forensic Science International: Digital Investigation.
We ask to submit articles according to the submission instructions.
Systematization of Knowledge (SoK) Papers: As this marks the 25th occurrence of the conference, a substantial
body of knowledge has been published through this platform over the years. Therefore, starting from this year,
we solicit Systematization of Knowledge (SoK) papers that systematize, contextualize and evaluate existing
knowledge of digital forensics. A suitable SoK paper needs to provide unique insights, such as a new
viewpoint, a comprehensive taxonomy, and new evidence in supporting or challenging long-held beliefs.
A survey paper without such insights is not appropriate and may be rejected without full review.
A SoK paper submission needs to have the prefix “SoK: ” in the title, and select the checkbox in
the submission form. Accepted SoK papers will be presented at the conference and included
in the proceedings.
For more information, please see
https://dfrws.org/conferences/dfrws-usa-2025/.
August 2025
CSR 2025
IEEE International Conference on Cyber Security and Resilience,
Chania, Crete, Greece, August 4-6, 2025.
[posted here 3/3/25]
The IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
is an annual event sponsored by the IEEE Systems, Man, and Cybernetics (SMC) Society.
The technological and industrial revolution brought by complex cyber-physical systems
(CPS) comes with new threats and cyber-attacks that exploit their inherent complexity
and heterogeneity. These attacks have a significant negative impact on the operation
of various services in critical sectors, like energy, transport, and communications,
which provide the vital functions that our societies depend upon.
The conference focuses on theoretical and practical aspects of the security,
privacy, trust, and resilience of networks, systems, and services as well as
novel ways for dealing with vulnerabilities and mitigation of sophisticated
cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
ARES 2025
20th International Conference on Availability, Reliability and Security,
Ghent, Belgium, August 10-13, 2025.
[posted here 12/23/24]
ARES highlights the various aspects of dependability – with special focus
on the crucial linkage between availability, reliability and security. ARES aims at a full
and detailed discussion of the research issues of dependability as an integrative concept
that covers amongst others availability, safety, confidentiality, integrity, maintainability
and security in the different fields of applications. ARES emphasizes the interplay between
foundations and practical issues of dependability in emerging areas such as e-government,
m-government, location-based applications, ubiquitous computing, autonomous computing,
chances of grid computing etc. ARES is devoted to the critical examination and research
challenges of the various aspects of Dependable Computing and the definition of a future road map.
The ARES 2025 proceedings will be published in Springer Lecture Notes on Computer Science.
For more information, please see
https://2025.ares-conference.eu/.
EDId 2025
2nd International Workshop on Emerging Digital Identities,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 2/10/25]
The identity environment has evolved into a complex ecosystem demanding
seamless interoperability, stronger security measures, and user-centric experiences
in an increasingly interconnected digital world. Addressing these difficulties
necessitates collaboration among scholars and practitioners from diverse disciplines,
establishing an interdisciplinary approach critical for shaping the future of identity
management. EDId navigates various security, privacy, and legal compliance issues,
addressing technical issues like security and interoperability and legal and regulatory
considerations like data protection and privacy.
For more information, please see
https://2025.ares-conference.eu/program/edid/.
ENS 2025
8th International Workshop on Emerging Network Security,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 4/21/25]
With the great success and development of 5G & beyond systems and other
emerging concepts (e.g. 6G) a continued effort toward rich ubiquitous communication
infrastructure, promising wide range of high-quality services is desired. It is envisioned
that communication in emerging networks will offer significantly greater data bandwidth
and almost infinite capability of networking resulting in unfaltering user experiences for,
among others: virtual/augmented reality, massive content streaming, telepresence, user-centric
computing, crowded area services, smart personal networks, Internet of Things (IoT), smart
buildings and smart cities.
The communication in 5G networks and beyond is currently in the center of attention of
industry, academia, and government worldwide. Emerging network concepts drive many new
requirements for different network capabilities. As future networks aim at utilizing
many promising network technologies, such as Software Defined Networking (SDN), Network
Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing or
Cloud Computing and supporting a huge number of connected devices integrating above
mentioned advanced technologies and innovating new techniques will surely bring tremendous
challenges for security, privacy and trust. Therefore, secure network architectures,
mechanisms, and protocols are required as the basis for emerging networks to address
these issues and follow security-by-design approach. Finally, since in current and
future networks even more user data and network traffic will be transmitted, big data
security solutions should be considered in order to address the magnitude of the data
volume and ensure data security and privacy.
From this perspective, the ENS 2025 workshop aims at collecting the most relevant
ongoing research efforts in emerging network security field. It also serves as a
forum for 5G & beyond projects in order to disseminate their security-related results
and boost cooperation, also foster development of the 5G and beyond Security Community
made of 5G security experts and practitioners who pro-actively discuss and share
information to collectively progress and align on the field. Last but not least it
also aims to bridge 5G & Beyond community with other communities (e.g. AI) that are
key to support full attainment of 5G & Beyond but also 6G promises and so for those
technologies to release their full potential
For more information, please see
https://2025.ares-conference.eu/program/ens/.
CUING 2025
9th International Workshop on Cyber Use of Information Hiding,
Co-located with the 20th International Conference on Availability, Reliability
and Security (ARES 2025),
Ghent, Belgium, August 11-14, 2025.
[posted here 4/21/25]
The increasing number of Internet users, availability of storage and network
resources, and proliferation of as-a-Service frameworks, leads to a new-wave of offensive
campaigns targeting the virtual world. With the diffusion of improved defensive methods,
attackers now utilize more and more sophisticated techniques to perform their malicious
activities. In recent years, information hiding has emerged as one of the most sophisticated
and effective mechanisms for launching attacks. Threat actors now regularly use information
hiding to elude countermeasures and prevent reversing the attack chain. More recently,
hiding techniques have been deployed to create covert channels, i.e., parasitic communications
paths nested in network traffic and digital objects, mainly to cloak command & control
communications. Unfortunately, detection and mitigation of threats taking advantage of
information hiding are hard tasks that pose many new challenges for digital forensics
analysts, academics, law enforcement agencies, and security professionals.
The aim of the International Workshop on Cyber Use of Information Hiding (CUIng) is to
bring together researchers, practitioners, law enforcement representatives, and security
professionals in the area of analysis of information hiding techniques when used in
cyberspace. Techniques, mechanisms, and ideas that fall in the scope of the workshop
are not limited to classic digital steganography applications or the creation and
mitigation of covert communications. Therefore, CUIng also welcomes works that pertain
to camouflaging/masking/hiding various types of data, e.g., identities, behaviors of
processes, and communication flows. To present a more complete picture of the novel
research on hiding methods and their utilization by the attackers, submissions dealing
with impersonation or mimicking are encouraged as well, especially to address
information hiding in a complete manner, for instance, to discuss ideas for fighting
misuse of privacy-enhancing technologies.
For more information, please see
https://2025.ares-conference.eu/program/cuing/.
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13-15, 2025.
[posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
PST 2025
22nd Annual International Conference on Privacy, Security & Trust,
Fredericton, Canada, August 26-28, 2025.
[posted here 2/17/25]
The Annual International Conference on Privacy, Security & Trust (PST)
provides a premier forum for sharing advances in cybersecurity research and security
applications. PST2025 will be held in person in Fredericton, Canada, and will offer
three days of keynotes, technical presentations, posters, special sessions, and an
Industrial day with a vendor exhibition.
For more information, please see
http://pstnet.ca.
September 2025
ESORICS 2025
30th European Symposium on Research in Computer Security,
Toulouse, France, September 22-26, 2025.
[posted here 12/30/24]
Computer security is concerned with the protection of information in environments
where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further
the progress of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European nations, the
symposium has solidified its position as one of Europe's most prominent conferences on computer
security. Currently, the symposium delves into research and developmental avenues encompassing
AI, machine learning, technologies that enhance privacy, network safeguards, software and
hardware protection in practical scenarios.
For more information, please see
https://www.esorics2025.org/.
October 2025
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
[posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
MarCaS 2025
3rd LCN Special Track on Maritime Communication and Security,
Held in conjunction with the 50th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2025),
Sydney, Australia, October 14-16, 2025.
[posted here 3/17/25]
The MarCaS Special Track will help bring together research groups
working at the intersection of maritime applications, communications technologies,
and protocols, as well as IT and network security to share and discuss ideas, novel
solutions, challenges, and recent developments. The workshop
solicits high quality and previously unpublished work in the maritime domain
and the research field of the LCN to stimulate novel approaches for a safer
and more resilient shipping. Join us for this exciting and timely Special Track at the
Local Computer Network Conference!!!
For more information, please see
https://garykessler.net/lcn_marcas/.
ICICS 2025
27th International Conference on Information and Communications Security,
Nanjing, China, October 29-31, 2025.
[posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and
practitioners from both academia and industry to discuss and exchange their experiences,
lessons learned, and insights related to information and communications security.
The conference seeks submissions presenting novel contributions related to information
and communication security.
Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.
For more information, please see
https://www.icics2025.org/index.html.
November 2025
CANS 2025
24th International Conference on Cryptology and Network Security,
Osaka, Japan, November 17-20, 2025.
[posted here 4/14/25]
The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical aspects of
cryptology and network security, and its extended domains in modern
computing systems.
For more information, please see
https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html.
December 2025
|