| |
Last Modified:3/30/26
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
IEEE Transactions on Privacy.
(Submission Due: On-going) [posted here 7/21/25]
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page.
For more information, please see
https://www.computer.org/csdl/journals/pr.
March 2026
SciSec 2026
8th International Conference on Science of Cyber Security,
Beijing, China, May 29 - 31, 2026.
(Submission Due 31 March 2026) [posted here 3/9/26]
The 8th International Conference on Science of Cyber Security (SciSec 2026) aims to
promote interdisciplinary collaboration in the field of cybersecurity, focusing on cutting-edge
topics and key academic issues in the emerging Science of Cyber Security to advance its
in-depth exploration and research.
For more information, please see
https://scisec.org/.
SSS 2026
28th International Symposium on Stabilization, Safety, and Security of
Distributed Systems, Gothenburg, Sweden, October 9-11, 2026.
(Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the
design and development of distributed systems with a focus on systems that are able to
provide guarantees on their structure, performance, and/or security in the face of an
adverse operational environment. The symposium encourages submissions of original
contributions on both fundamental research and practical applications concerning
topics in the symposium tracks.
For more information, please see
https://sss2026-submission.limos.fr/.
April 2026
APF 2026
Annual Privacy Forum 2026, Salzburg, Austria, September 9-10, 2026.
(Submission Due 1 April 2026) [posted here 3/2/26]
Ten years after the adoption of the General Data Protection Regulation (GDPR),
this EU legal framework together with the technical developments remains the global
point of reference for empowering individuals and ensuring a high-level of
protection in terms of privacy. However, the challenges of the next decade look
very different from the last. Rapid advances in artificial intelligence, data-driven
business models and governmental practices, and complex digital services are testing
the limits of established privacy norms in Europe and beyond. APF 2026 invites the
community to contribute to the understanding of what is at stake, where new
threats originate, and how law, technology, and practice can be integrated to
address current and imminent challenges.
For the APF 2026, we invite papers presenting original work on the themes of data protection
and privacy and their repercussions on technology, business, government, law, society,
policy and law enforcement. An interdisciplinary approach is highly encouraged to
contribute to bridging the gap between research, business models and policy.
For more information, please see
https://privacyforum.eu/.
DCS-CI 2026
International Conference on Design of Cyber-Secure Critical Infrastructure,
Buford, Georgia, USA, September 2 - 3, 2026.
(Submission Due 13 April 2026) [posted here 3/2/26]
DCS-CI is a Joint Academic-Industrial Forum bringing together researchers,
practitioners, regulators, and industry leaders to explore system-level, secure-by-design
approaches that address the unique challenges of protecting water systems, energy grids,
transportation networks, and other critical infrastructure sectors. We welcome
submissions from diverse disciplinary perspectives, including computer science, control
systems engineering, security studies, public policy, and operations management.
Interdisciplinary contributions that bridge theoretical innovation with practical
application are particularly encouraged. The conference seeks work that is rigorous,
relevant, and actionable research that not only advances academic knowledge but
also informs the practices of infrastructure operators, system integrators, and
regulatory bodies. DCS-CI 26 welcomes original, high-quality contributions across
a broad range of topics related to the design and assurance of cyber-secure critical infrastructure.
For more information, please see
https://dcs-ci.github.io/.
ICSC 2026
Intelligent Cybersecurity Conference,
Abu Dhabi, UAE, September 15 - 18, 2026.
(Submission Due 15 April 2026) [posted here 3/9/26]
In todayÕs world, connected systems, social networks, and mobile communications
create a massive flow of data, which is prone to cyberattacks. This needs fast and
accurate detection of cyber-attacks. Intelligent systems and Data analytics are important
components when issues pertaining to effective security solutions become the subject of
discussion. This is because there is an impending need for high volume and high velocity
data from different sources to detect anomalies as soon as they are discovered. This
will help reduce significantly the vulnerability of the systems as well as improve
their resilience to cyber Attacks. The capability to process large volumes of
information at real time through utilization of tools for data analytics has many
advantages vital for analysis of cybersecurity systems. Moreover, the data collected
from sophisticated intelligent systems, cloud systems, networks, sensors, computers,
intrusion detection systems could be used to identify vital information. This information
could be used to detect how vulnerable the systems are to risk factors, and so effective
cyber security solutions can be developed. In addition to that, the utilization of data
analytics tools in the cybersecurity field gives new insights through considering factors
such as zero-day attack detection, real time analysis, resource constrained data
processing among others. The Intelligent Cybersecurity Conference (ICSC) addresses
the use of advanced intelligent systems in providing cybersecurity solutions in
many fields, and the challenges, approaches, and future directions. We invite
the submission of original papers on all topics related to Intelligent Systems
for Cybersecurity.
For more information, please see
https://icsc-conference.org/2026/.
SECRYPT 2026
23rd International Conference on Security and Cryptography,
Porto, Portugal, July 16 - 18, 2026.
(Submission Due 16 April 2026) [posted here 3/2/26]
SECRYPT is an annual international conference covering research in
information and communication security. The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical and practical
aspects of data protection, privacy, security, and cryptography.
Papers describing the application of security technology, the
implementation of systems, and lessons learned are also encouraged.
For more information, please see
https://secrypt.scitevents.org/.
ESORICS 2026
31st European Symposium on Research in Computer Security,
Rome, Italy, September 21 - 25, 2026.
(Submission Due 9 January 2026 and 21 April 2026) [posted here 12/15/25]
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.
ESORICS 2026 at Rome invites you to submit your previously unpublished
research work for peer review. We are looking for papers with
high-quality, original, and unpublished research contributions. The
Symposium will start on September 21, 2026 with an exciting technical
program, including vetted papers, invited talks, and collocated
workshops.
Previously unpublished research works of high quality are invited for
review. Submissions are not required to be anonymous.
All submissions must be written in English and uploaded as a single
PDF with 16 pages in length (using 10pt font), and 20 pages at most
including references and appendices. Papers should be intelligible
without appendices as TPC members are not required to read them.
For more information, please see
https://sites.google.com/di.uniroma1.it/esorics2026/home.
ACM CCS 2026
33rd ACM Conference on Computer and Communications Security,
Hague, The Netherlands, November 15-19, 2026.
(Submission Due 7 January 2026 and 22 April 2026) [posted here 9/24/25]
The 33rd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer
security and privacy. Theoretical papers must make a convincing case for the relevance of
their results to practice. Authors are encouraged to write the abstract and introduction
of their paper in a way that makes the results accessible and compelling to a general
computer-security researcher. In particular, authors should bear in mind that anyone on
the program committee may be asked to review any paper.
All submissions must be received by 11:59 PM AoE (UTC-12) on the day of the corresponding
deadline. Submitted papers must not substantially overlap with papers that have been
published or accepted for publication, or that are simultaneously in submission to a
journal, conference, or workshop with published proceedings. All submissions should be
properly anonymized. Papers should avoid revealing authors' identity in the text. When
referring to their previous work, authors are required to cite their papers in the third
person, without identifying themselves. In the unusual case in which a third-person
reference is infeasible, authors can blind the reference itself. Papers not
properly anonymized may be rejected without review. Authors may submit up to a maximum
of 7 papers at each cycle .
All submitted papers will be evaluated based on their merits, particularly their
importance to practical aspects of computer and communications security and privacy,
novelty, quality of execution, and presentation. Note that CCS does not accept
SoK or survey papers.
Authors are expected to consider the ethical implications and potential societal
impact of their work. Papers that raise ethical concerns, such as those involving
human subjects, user data, or real-world vulnerability analysis, must include a
dedicated "Ethical Considerations" section. This section should discuss the
balance of risks vs. benefits and the steps taken to minimize potential harm (e.g.,
responsible disclosure, data anonymization). Note that institutional (IRB/ERB)
approval is neither strictly necessary nor always sufficient to demonstrate ethical
conduct; we expect authors to reason about the ethics of their work beyond ensuring
institutional compliance. For detailed guidance on community standards, we follow
the USENIX Security'26 Ethics Policy. This section does not count toward the page
limit and should be placed after the 12-page main content.
This edition of ACM CCS adopts an Open Science policy to strengthen the transparency,
reproducibility, and long-term impact of published research. Authors are expected to
share the artifacts underlying their results (such as code, datasets, models,
scripts, and documentation) whenever legally, ethically, and practically possible.
Each submitted paper must include an ``Open Science" appendix. More details can be
found on the conference call for papers page.
Providing Artifacts at Submission Time: Artifacts are required for submissions
whose contributions fundamentally rely on an implementation, experimental evaluation,
system, tool, or dataset. This includes, but is not limited to, papers that:
(1) Introduce a new system, library, or tool.
(2) Present experimental results derived from an implementation.
(3) Propose a new benchmark, dataset, or data collection methodology.
If reviewers determine that a central contribution cannot be properly evaluated without
accessing artifacts that are neither provided nor convincingly justified in the Open
Science appendix (as required by the Open Science Policy), the paper may be rejected.
All artifacts will be treated with the same strict confidentiality as the manuscript.
Access is restricted to the assigned PC members, who may use artifacts only for the
purpose of evaluating the paper. Any unauthorized use, sharing, or downloading for
personal or professional purposes constitutes a serious ethical violation and may
result in removal from the PC and additional sanctions (such as bans on future
service or submissions).
Policy on the Use of Generative AI and LLMs: ACM CCS follows the ACM Policy on
Authorship regarding the use of generative AI tools. More details about the guidelines
when using Large Language Models (LLMs) and other generative AI tools (e.g., ChatGPT,
Claude, Copilot) can be found on the conference call for papers page.
Special note for Machine Learning papers submitting to CCS: Machine learning
has become pervasive across security and privacy research. To ensure papers are directed
to the most appropriate tracks and to clarify what constitutes a good fit for CCS, we
provide the following guidelines:
- ML for Security and Privacy Problems: If ML is used to solve a security or privacy
issue, submit the paper in the track that better aligns with the primary field of the
problem being addressed, not "Security and Privacy of MLÓ.
- Security and Privacy of Machine Learning: If your work directly addresses the security
or privacy of ML itself, the Security and Privacy of Machine Learning track is the right
fit. This must also be stated in the Track Justification Statement, clarifying the authors'
decision not to submit to a domain-specific track (e.g., Web Security, Software
Security).
The paper evaluation needs to be linked to the threat model and scenario motivating the
paper. Strong submissions produce generalizable contributions such as frameworks for
risk assessment, attack patterns that generalize across models, systematic problem
characterizations, or principled defenses with clear justification. Papers that present
collections of examples or trial-and-error probes, or approaches lacking methodical rigor,
will be considered out of scope.
Purely theoretical ML works without actionable security insights are out of scope, as are
papers focusing on generic ML properties (e.g., robustness to natural noise) that lack
clear security implications.
For more information, please see
https://www.sigsac.org/ccs/CCS2026/call-for/call-for-papers.html.
May 2026
SSS 2026
28th International Symposium on Stabilization, Safety, and Security of
Distributed Systems, Gothenburg, Sweden, October 9-11, 2026.
(Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the
design and development of distributed systems with a focus on systems that are able to
provide guarantees on their structure, performance, and/or security in the face of an
adverse operational environment. The symposium encourages submissions of original
contributions on both fundamental research and practical applications concerning
topics in the symposium tracks.
For more information, please see
https://sss2026-submission.limos.fr/.
EDId 2026
3rd International Workshop on Emerging Digital Identities,
Co-located with the 21st International Conference on Availability, Reliability and
Security (ARES 2026), Linkšping, Sweden, August 24-27, 2026.
(Submission Due 18 May 2026) [posted here 3/9/26]
The identity environment has evolved into a complex ecosystem demanding
seamless interoperability, stronger security measures, and user-centric experiences in
an increasingly interconnected digital world. Addressing these difficulties necessitates
collaboration among scholars and practitioners from diverse disciplines, establishing an
interdisciplinary approach critical for shaping the future of identity management.
EDId navigates various security, privacy, and legal compliance issues, addressing
technical issues like security and interoperability and legal and regulatory
considerations like data protection and privacy. We aim to explore cutting-edge solutions
and approaches to identity management that can help secure digital services against
potential security and privacy threats.
For more information, please see
https://www.ares-conference.eu/edid.
APWG eCrime 2026
21st Symposium on Electronic Crime Research,
Lisbon, Portugal, November 2 - 6, 2026.
(Submission Due 30 May 2026) [posted here 3/2/26]
The 2026 APWG Symposium on Electronic Crime Research (eCrime 2026) in Lisbon
examines essential factors for managing the impacts of the global cybercrime plexus Ñ to
secure IT users, commercial enterprises, governments, national infrastructures, and
operational technologies. eCrime 2026 presents general session discussions from all
stake-holding industries, research centers, and from counter-cybercrime experts
from every discipline and sector, commercial cybercrime response enterprises,
law enforcement agencies, NGOs, and multilateral organizations. As well, eCrime 2026
spotlights the accepted peer-reviewed papers of the 2026 edition of eCrime.
For more information, please see
https://apwg.org/events/ecrime2026.
June 2026
July 2026
SSS 2026
28th International Symposium on Stabilization, Safety, and Security of
Distributed Systems, Gothenburg, Sweden, October 9-11, 2026.
(Submission Due 31 March 2026, 15 May 2026, and 15 July 2026) [posted here 3/9/26]
SSS is an international forum for researchers and practitioners in the
design and development of distributed systems with a focus on systems that are able to
provide guarantees on their structure, performance, and/or security in the face of an
adverse operational environment. The symposium encourages submissions of original
contributions on both fundamental research and practical applications concerning
topics in the symposium tracks.
For more information, please see
https://sss2026-submission.limos.fr/.
August 2026
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
IEEE Transactions on Privacy,
Editor-in-Chief: Christopher W. Clifton
IEEE Transactions on Privacy (TP) provides a multidisciplinary forum
for theoretical, methodological, engineering, and applications aspects of privacy and
data protection. Privacy, in this context, is defined as the freedom from unauthorized
intrusion in its broadest sense, arising from any activity in information collection,
information processing, information dissemination, or invasion. Contributions to solving
privacy problems in various application domains such as healthcare are also accepted.
Purely theoretical papers with no potential application or purely developmental
work without any methodological contribution or generalizability would not be in scope.
To submit an article, please use the
IEEE Author Portal. Detailed information on submitting your paper to an IEEE Computer Society
publication can be found on the
Author Guidelines page. More
information can be found at
https://www.computer.org/csdl/journals/pr.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|