Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:3/30/26

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


IEEE Transactions on Privacy. (Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton

IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page

For more information, please see https://www.computer.org/csdl/journals/pr.

Conference and Workshop Call-for-papers

March 2026

SciSec 2026 8th International Conference on Science of Cyber Security, Beijing, China, May 29 - 31, 2026. (Submission Due 31 March 2026) [posted here 3/9/26]
The 8th International Conference on Science of Cyber Security (SciSec 2026) aims to promote interdisciplinary collaboration in the field of cybersecurity, focusing on cutting-edge topics and key academic issues in the emerging Science of Cyber Security to advance its in-depth exploration and research.

For more information, please see https://scisec.org/.

SSS 2026 28th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Gothenburg, Sweden, October 9-11, 2026. (Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment. The symposium encourages submissions of original contributions on both fundamental research and practical applications concerning topics in the symposium tracks.

For more information, please see https://sss2026-submission.limos.fr/.

April 2026

APF 2026 Annual Privacy Forum 2026, Salzburg, Austria, September 9-10, 2026. (Submission Due 1 April 2026) [posted here 3/2/26]
Ten years after the adoption of the General Data Protection Regulation (GDPR), this EU legal framework together with the technical developments remains the global point of reference for empowering individuals and ensuring a high-level of protection in terms of privacy. However, the challenges of the next decade look very different from the last. Rapid advances in artificial intelligence, data-driven business models and governmental practices, and complex digital services are testing the limits of established privacy norms in Europe and beyond. APF 2026 invites the community to contribute to the understanding of what is at stake, where new threats originate, and how law, technology, and practice can be integrated to address current and imminent challenges. For the APF 2026, we invite papers presenting original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement. An interdisciplinary approach is highly encouraged to contribute to bridging the gap between research, business models and policy.

For more information, please see https://privacyforum.eu/.

DCS-CI 2026 International Conference on Design of Cyber-Secure Critical Infrastructure, Buford, Georgia, USA, September 2 - 3, 2026. (Submission Due 13 April 2026) [posted here 3/2/26]
DCS-CI is a Joint Academic-Industrial Forum bringing together researchers, practitioners, regulators, and industry leaders to explore system-level, secure-by-design approaches that address the unique challenges of protecting water systems, energy grids, transportation networks, and other critical infrastructure sectors. We welcome submissions from diverse disciplinary perspectives, including computer science, control systems engineering, security studies, public policy, and operations management. Interdisciplinary contributions that bridge theoretical innovation with practical application are particularly encouraged. The conference seeks work that is rigorous, relevant, and actionable research that not only advances academic knowledge but also informs the practices of infrastructure operators, system integrators, and regulatory bodies. DCS-CI 26 welcomes original, high-quality contributions across a broad range of topics related to the design and assurance of cyber-secure critical infrastructure.

For more information, please see https://dcs-ci.github.io/.

ICSC 2026 Intelligent Cybersecurity Conference, Abu Dhabi, UAE, September 15 - 18, 2026. (Submission Due 15 April 2026) [posted here 3/9/26]
In todayÕs world, connected systems, social networks, and mobile communications create a massive flow of data, which is prone to cyberattacks. This needs fast and accurate detection of cyber-attacks. Intelligent systems and Data analytics are important components when issues pertaining to effective security solutions become the subject of discussion. This is because there is an impending need for high volume and high velocity data from different sources to detect anomalies as soon as they are discovered. This will help reduce significantly the vulnerability of the systems as well as improve their resilience to cyber Attacks. The capability to process large volumes of information at real time through utilization of tools for data analytics has many advantages vital for analysis of cybersecurity systems. Moreover, the data collected from sophisticated intelligent systems, cloud systems, networks, sensors, computers, intrusion detection systems could be used to identify vital information. This information could be used to detect how vulnerable the systems are to risk factors, and so effective cyber security solutions can be developed. In addition to that, the utilization of data analytics tools in the cybersecurity field gives new insights through considering factors such as zero-day attack detection, real time analysis, resource constrained data processing among others. The Intelligent Cybersecurity Conference (ICSC) addresses the use of advanced intelligent systems in providing cybersecurity solutions in many fields, and the challenges, approaches, and future directions. We invite the submission of original papers on all topics related to Intelligent Systems for Cybersecurity.

For more information, please see https://icsc-conference.org/2026/.

SECRYPT 2026 23rd International Conference on Security and Cryptography, Porto, Portugal, July 16 - 18, 2026. (Submission Due 16 April 2026) [posted here 3/2/26]
SECRYPT is an annual international conference covering research in information and communication security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged.

For more information, please see https://secrypt.scitevents.org/.

ESORICS 2026 31st European Symposium on Research in Computer Security, Rome, Italy, September 21 - 25, 2026. (Submission Due 9 January 2026 and 21 April 2026) [posted here 12/15/25]
ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. ESORICS 2026 at Rome invites you to submit your previously unpublished research work for peer review. We are looking for papers with high-quality, original, and unpublished research contributions. The Symposium will start on September 21, 2026 with an exciting technical program, including vetted papers, invited talks, and collocated workshops.
Previously unpublished research works of high quality are invited for review. Submissions are not required to be anonymous. All submissions must be written in English and uploaded as a single PDF with 16 pages in length (using 10pt font), and 20 pages at most including references and appendices. Papers should be intelligible without appendices as TPC members are not required to read them.

For more information, please see https://sites.google.com/di.uniroma1.it/esorics2026/home.

ACM CCS 2026 33rd ACM Conference on Computer and Communications Security, Hague, The Netherlands, November 15-19, 2026. (Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks submissions presenting novel contributions related to all real-world aspects of computer security and privacy. Theoretical papers must make a convincing case for the relevance of their results to practice. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general computer-security researcher. In particular, authors should bear in mind that anyone on the program committee may be asked to review any paper.

All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized. Papers should avoid revealing authors' identity in the text. When referring to their previous work, authors are required to cite their papers in the third person, without identifying themselves. In the unusual case in which a third-person reference is infeasible, authors can blind the reference itself. Papers not properly anonymized may be rejected without review. Authors may submit up to a maximum of 7 papers at each cycle .

All submitted papers will be evaluated based on their merits, particularly their importance to practical aspects of computer and communications security and privacy, novelty, quality of execution, and presentation. Note that CCS does not accept SoK or survey papers.

Authors are expected to consider the ethical implications and potential societal impact of their work. Papers that raise ethical concerns, such as those involving human subjects, user data, or real-world vulnerability analysis, must include a dedicated "Ethical Considerations" section. This section should discuss the balance of risks vs. benefits and the steps taken to minimize potential harm (e.g., responsible disclosure, data anonymization). Note that institutional (IRB/ERB) approval is neither strictly necessary nor always sufficient to demonstrate ethical conduct; we expect authors to reason about the ethics of their work beyond ensuring institutional compliance. For detailed guidance on community standards, we follow the USENIX Security'26 Ethics Policy. This section does not count toward the page limit and should be placed after the 12-page main content.

This edition of ACM CCS adopts an Open Science policy to strengthen the transparency, reproducibility, and long-term impact of published research. Authors are expected to share the artifacts underlying their results (such as code, datasets, models, scripts, and documentation) whenever legally, ethically, and practically possible. Each submitted paper must include an ``Open Science" appendix. More details can be found on the conference call for papers page.

Providing Artifacts at Submission Time: Artifacts are required for submissions whose contributions fundamentally rely on an implementation, experimental evaluation, system, tool, or dataset. This includes, but is not limited to, papers that: (1) Introduce a new system, library, or tool. (2) Present experimental results derived from an implementation. (3) Propose a new benchmark, dataset, or data collection methodology. If reviewers determine that a central contribution cannot be properly evaluated without accessing artifacts that are neither provided nor convincingly justified in the Open Science appendix (as required by the Open Science Policy), the paper may be rejected. All artifacts will be treated with the same strict confidentiality as the manuscript. Access is restricted to the assigned PC members, who may use artifacts only for the purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for personal or professional purposes constitutes a serious ethical violation and may result in removal from the PC and additional sanctions (such as bans on future service or submissions).

Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on Authorship regarding the use of generative AI tools. More details about the guidelines when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT, Claude, Copilot) can be found on the conference call for papers page.

Special note for Machine Learning papers submitting to CCS: Machine learning has become pervasive across security and privacy research. To ensure papers are directed to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy issue, submit the paper in the track that better aligns with the primary field of the problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security or privacy of ML itself, the Security and Privacy of Machine Learning track is the right fit. This must also be stated in the Track Justification Statement, clarifying the authors' decision not to submit to a domain-specific track (e.g., Web Security, Software Security).

The paper evaluation needs to be linked to the threat model and scenario motivating the paper. Strong submissions produce generalizable contributions such as frameworks for risk assessment, attack patterns that generalize across models, systematic problem characterizations, or principled defenses with clear justification. Papers that present collections of examples or trial-and-error probes, or approaches lacking methodical rigor, will be considered out of scope. Purely theoretical ML works without actionable security insights are out of scope, as are papers focusing on generic ML properties (e.g., robustness to natural noise) that lack clear security implications.

For more information, please see https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.

May 2026

SSS 2026 28th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Gothenburg, Sweden, October 9-11, 2026. (Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment. The symposium encourages submissions of original contributions on both fundamental research and practical applications concerning topics in the symposium tracks.

For more information, please see https://sss2026-submission.limos.fr/.

EDId 2026 3rd International Workshop on Emerging Digital Identities, Co-located with the 21st International Conference on Availability, Reliability and Security (ARES 2026), Linkšping, Sweden, August 24-27, 2026. (Submission Due 18 May 2026) [posted here 3/9/26]
The identity environment has evolved into a complex ecosystem demanding seamless interoperability, stronger security measures, and user-centric experiences in an increasingly interconnected digital world. Addressing these difficulties necessitates collaboration among scholars and practitioners from diverse disciplines, establishing an interdisciplinary approach critical for shaping the future of identity management. EDId navigates various security, privacy, and legal compliance issues, addressing technical issues like security and interoperability and legal and regulatory considerations like data protection and privacy. We aim to explore cutting-edge solutions and approaches to identity management that can help secure digital services against potential security and privacy threats.

For more information, please see https://www.ares-conference.eu/edid.

APWG eCrime 2026 21st Symposium on Electronic Crime Research, Lisbon, Portugal, November 2 - 6, 2026. (Submission Due 30 May 2026) [posted here 3/2/26]
The 2026 APWG Symposium on Electronic Crime Research (eCrime 2026) in Lisbon examines essential factors for managing the impacts of the global cybercrime plexus Ñ to secure IT users, commercial enterprises, governments, national infrastructures, and operational technologies. eCrime 2026 presents general session discussions from all stake-holding industries, research centers, and from counter-cybercrime experts from every discipline and sector, commercial cybercrime response enterprises, law enforcement agencies, NGOs, and multilateral organizations. As well, eCrime 2026 spotlights the accepted peer-reviewed papers of the 2026 edition of eCrime.

For more information, please see https://apwg.org/events/ecrime2026.

June 2026
July 2026

SSS 2026 28th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Gothenburg, Sweden, October 9-11, 2026. (Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment. The symposium encourages submissions of original contributions on both fundamental research and practical applications concerning topics in the symposium tracks.

For more information, please see https://sss2026-submission.limos.fr/.

August 2026

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
IEEE Transactions on Privacy,   Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page.  More information can be found at https://www.computer.org/csdl/journals/pr.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.