Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:10/6/25

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


IEEE Transactions on Privacy. (Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton

IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page

For more information, please see https://www.computer.org/csdl/journals/pr.

Conference and Workshop Call-for-papers

October 2025

CSF 2026 39th IEEE Computer Security Foundations Symposium, Colocated with FLoC 2026, Lisbon Portugal, July 26-29, 2026. (Submission Due 24 July 2025, 9 October 2025, and January 29 2026) [posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer SocietyÕs Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó The meeting became a ÒsymposiumÓ in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSFÕs home. The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2026.ieee-security.org.

November 2025

SP 2026 47th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, MAY 18-21, 2026. (Submission Due 5 June 2025 and 13 November 2025) [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

Symposium Event (Important Changes): The number of papers accepted to IEEE S&P continues to grow substantially each year. Due to conference venue limitations and costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes, length determined based on the number of accepted papers) and (b) a poster presentation immediately following the talk session containing the paper. All accepted papers are required to present both a short talk and a poster.

For more information, please see https://sp2026.ieee-security.org/cfpapers.html.

PETS 2026 26th Privacy Enhancing Technologies Symposium, Calgary, Canada, July 20-25, 2026. (Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 26th PETS is expected to be a hybrid event with a physical gathering (location TBD) and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are strongly encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not strictly required for publication in the proceedings.

PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges or article submission charges.

Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. Authors will receive a decision of accept, revise, or reject. Those receiving revise will be invited to revise their article with the guidance of a revision editor according to a well-defined set of revision criteria and will have up to four months to attempt to complete the required revisions. Authors of rejected papers must skip a full issue prior to resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into consideration during the discussion. New for 2026: The authors will be able to submit a separate, 250-word rebuttal response to each individual review (rather than a single response that addresses all reviews).

For more information, please see https://petsymposium.org/cfp26.php.

December 2025

HOST 2026 19th IEEE International Symposium on Hardware Oriented Security and Trust, Washington DC, USA, May 4-7, 2026. (Submission Due 1 September 2026 and 1 December 2025) [posted here 9/24/25]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance. HOST 2026 invites original contributions in all areas of overlap between hardware and security, including but not limited to the following:
- Hot Topics in Hardware Security, e.g., advanced packaging security, chiplet security, AI for hardware security, and security of AI chips.
- Computer-aided Design (CAD) for Hardware Security Verification, e.g., automatic techniques and metrics for life cycle security management and detecting security vulnerabilities.
- Hardware Security Primitives, e.g., cryptographic modules, PUFs, TRNGs, post-quantum cryptography, odometers.
- Hardware Attack and Defense, e.g., hardware Trojans, fault injection, side-channels, hardware reverse engineering, hardware obfuscation.
- Architecture Security, e.g., architectural side-channels, trusted execution environment, FPGA and reconfigurable fabric security.
- System Security, e.g., machine learning security, SoC/IP security, CPS/IoT security, sensor network security, and cloud security.
- Security and Privacy Threats and Solutions, e.g., privacy-enhancing architecture, blockchain, and cryptocurrency security.

For more information, please see http://www.hostsymposium.org.

January 2026

ICBC 2026 8th IEEE International Conference on Blockchain and Cryptocurrency, Brisbane, Australia, June 1-5, 2026. (Submission Due 7 January 2026) [posted here 8/11/25]
The IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2026), sponsored by the IEEE Communications Society, has established itself as the flagship annual conference in blockchain research, maintaining the highest standards of academic excellence. We invite original, unpublished submissions in all areas of blockchain and cryptocurrency research. In addition to established topics, ICBC 2026 welcomes emerging directions such as Large Language Models and Blockchain, Agentic AI in Blockchain, and Decentralized (physical) Internet Infrastructure.

For more information, please see https://icbc2026.ieee-icbc.org/.

CSF 2026 39th IEEE Computer Security Foundations Symposium, Colocated with FLoC 2026, Lisbon Portugal, July 26-29, 2026. (Submission Due 24 July 2025, 9 October 2025, and January 29 2026) [posted here 9/24/25]
The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security, to examine current theories of security, the formal models that provide a context for those theories, and techniques for verifying security. It was created in 1988 as a workshop of the IEEE Computer SocietyÕs Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled ÒThe Foundations of Computer SecurityÑWe Need Some.Ó The meeting became a ÒsymposiumÓ in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSFÕs home. The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad discussions concerning the role of formal methods in computer security and the nature of foundational research in this area.

For more information, please see https://csf2026.ieee-security.org.

February 2026

PETS 2026 26th Privacy Enhancing Technologies Symposium, Calgary, Canada, July 20-25, 2026. (Submission Due 31 May 2025, 31 August 2025, 30 November 2025, and 28 February 2026) [posted here 7/21/25]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. The 26th PETS is expected to be a hybrid event with a physical gathering (location TBD) and a concurrent virtual event. Papers undergo a journal-style reviewing process, and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). Authors of accepted papers are strongly encouraged to attend and present at the physical event, where their presentations can be recorded for the virtual event and where they can participate directly in in-person research, technical, and social activities. However, in-person attendance is not strictly required for publication in the proceedings.

PoPETs, a scholarly, open-access journal for research papers on privacy, provides high-quality reviewing and publication while also supporting the successful PETS community event. PoPETs is self-published and does not have article processing charges or article submission charges.

Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. Authors will receive a decision of accept, revise, or reject. Those receiving revise will be invited to revise their article with the guidance of a revision editor according to a well-defined set of revision criteria and will have up to four months to attempt to complete the required revisions. Authors of rejected papers must skip a full issue prior to resubmission. As in previous years, the authors will have a chance to rebut/answer reviewer concerns/questions through a short rebuttal phase. Reviewers are asked to take the rebuttals into consideration during the discussion. New for 2026: The authors will be able to submit a separate, 250-word rebuttal response to each individual review (rather than a single response that addresses all reviews).

For more information, please see https://petsymposium.org/cfp26.php.

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
IEEE Transactions on Privacy,   Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum for theoretical, methodological, engineering, and applications aspects of privacy and data protection. Privacy, in this context, is defined as the freedom from unauthorized intrusion in its broadest sense, arising from any activity in information collection, information processing, information dissemination, or invasion. Contributions to solving privacy problems in various application domains such as healthcare are also accepted. Purely theoretical papers with no potential application or purely developmental work without any methodological contribution or generalizability would not be in scope. To submit an article, please use the IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society publication can be found on the Author Guidelines page.  More information can be found at https://www.computer.org/csdl/journals/pr.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.