|
Last Modified:3/24/25
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
Elsevier Online
Social Networks and Media Journal (OSNEM), Special issue on
Disinformation, toxicity, harms in Online Social Networks and Media.
(Submission Due 31 March 2025) [posted here 1/20/25]
Guest Editors: Marco Conti (IIT-CNR, Italy), Andrea Passarella (IIT-CNR, Italy),
and Arkaitz Zubiaga (Queen Mary University of London, UK)
Online Social Networks and Media have revolutionized society, and are now a key part
of how most people work, live, socialize, find information and entertain themselves. But whilst they
have generated huge benefits, leading to unprecedented connectivity across the globe, online social
networks have also enabled the spread of hazardous and dangerous behaviours. Chiefly, this is generated
by disinformation campaign and fake news, generation and spread of toxic content, deliberate or
unconscious generation and spreading of harmful content. Generative AI is exponentially exacerbating
the diffusion of toxic content, while, quite interestingly, not being equally used to counteract
harmful behaviours. On the other hand, content moderation techniques are emerging, aiming at providing
practical tools to fight against online harms driven by toxic content.
This special issue seeks high-quality scientific articles which examine, via a data-driven
approach, the emergence of harmful behaviours in OSNEM, as well as tools and methods to
fight against them. We particularly encourage papers which focus on online hate, misinformation,
disinformation, toxic content. Data-driven approaches, supported by existing or new publicly
available datasets, are strongly encouraged.
For more information, please see
https://www.sciencedirect.com/journal/online-social-networks-and-media.
ACM Transactions on the Web,
Special Issue on Advanced Technologies in the Decentralized Web.
(Submission Due 31 March 2025) [posted here 2/3/25]
Guest Editors: Johnnatan Messias (Max Planck Institute for Software Systems, Germany),
Keke Gai (Beijing Institute of Technology, China),
Maha Abdallah (Sorbonne University, France), and
Wei Cai (University of Washington, USA).
The Web's centralized architecture has led to privacy concerns, data
monopolies, and single points of failure, prompting a shift toward decentralization.
Web3 and Web 3.0 are leading this movement, with Web3 using blockchain technology
for peer-to-peer interactions and financial innovations, while Web 3.0 emphasizes data
ownership and interoperability through Personal Online Data stores. This Special Issue
aims to explore the latest advancements and applications in decentralized Web technologies
to enhance security, privacy, and user empowerment, striving for a decentralized,
user-centric digital future. We invite submissions on a wide range of topics, including but
not limited to:
- AI for the decentralized Web
- Interoperability challenges and solutions in decentralized networks
- Novel Web architectures, frameworks, and models for the decentralized Web
- Incentive mechanisms for the decentralized Web
- Security and privacy for the decentralized Web
- Trust management in the decentralized Web
- Novel Web protocols for the decentralized Web
- Decentralized identity design for the decentralized Web
- Transparency and accountability schemes for data circulation in the decentralized Web
- Innovative applications in the decentralized Web
- Decentralized Web user behavior analysis
- Human-computer interaction design for decentralized Web applications
- Comparative studies of Web3 and Web 3.0 technologies
- Regulatory and ethical considerations in the decentralized Web
For more information, please see
https://dl.acm.org/pb-assets/static_journal_pages/tweb/pdf/ACM-TWEB-SI-Advanced-Technologies-Decentralized-Web.pdf.
Journal of Systems Architecture,
Special Issue of Journal of Systems Architecture on Security and Privacy in AIoT-enabled Smart Cities.
(Submission Due 1 April 2025) [posted here 3/17/25]
Guest Editors: Qin Liu (Hunan University, China),
Kouichi Sakurai (Kyushu University, Japan), Richard Hill (University of Huddersfield, UK), and
Wenjia Li (New York Institute of Technology, USA).
In a smart society, numerous artificial intelligence of things (AIoT) communicate
and collaborate to improve our quality of life. Both artificial intelligence (AI)
and Internet of things (IoT) are foundational technologies that have been
interacting with each other to realize a smart life. As massive amounts of
sensitive data are generated, processed, and exchanged through IoT devices
and AI technologies, one of the fundamental problems is how to provide
intelligent services in smart society without compromising security and privacy.
This special issue aims to bring together researchers and practitioners in
IoT, AI, and network security, to share their novel ideas and latest findings
in relation to security and privacy in AIoT-enabled smart society.
For more information, please see
https://www.sciencedirect.com/special-issue/313735/security-and-privacy-in-aiot-enabled-smart-society.
March 2025
ICICS 2025
27th International Conference on Information and Communications Security,
Nanjing, China, October 29-31, 2025.
(Submission Due 9 March 2025 and 23 May 2025) [posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and
practitioners from both academia and industry to discuss and exchange their experiences,
lessons learned, and insights related to information and communications security.
The conference seeks submissions presenting novel contributions related to information
and communication security.
Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.
For more information, please see
https://www.icics2025.org/index.html.
CSR 2025
IEEE International Conference on Cyber Security and Resilience,
Chania, Crete, Greece, August 4-6, 2025.
(Submission Due 10 March 2025) [posted here 3/3/25]
The IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
is an annual event sponsored by the IEEE Systems, Man, and Cybernetics (SMC) Society.
The technological and industrial revolution brought by complex cyber-physical systems
(CPS) comes with new threats and cyber-attacks that exploit their inherent complexity
and heterogeneity. These attacks have a significant negative impact on the operation
of various services in critical sectors, like energy, transport, and communications,
which provide the vital functions that our societies depend upon.
The conference focuses on theoretical and practical aspects of the security,
privacy, trust, and resilience of networks, systems, and services as well as
novel ways for dealing with vulnerabilities and mitigation of sophisticated
cyber-attacks.
For more information, please see
https://www.ieee-csr.org/.
ACM WiSec 2025
18th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Arlington, Virginia, USA, June 30 - July 3, 2025.
(Submission Due 26 November 2024 and 12 March 2025) [posted here 10/14/24]
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security
and privacy in wireless and mobile networks and their applications. In addition to the traditional
ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the
increasingly diverse range of mobile or wireless applications such as the Internet of Things,
Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable
security and privacy, biometrics, and cryptography.
Topics of interest for WiSec include the following, concerning systems in the second list below:
- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution)
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or software
vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource exhaustion,
jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy
Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols,
cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA),
wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment
applications Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, etc.
- Wireless physical layer technologies: transmission, reception, modulation, localization,
remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices,
wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT,
Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites),
and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications,
sonic, underwater communications, legacy telecommunications, ...
For more information, please see
https://wisec2025.gmu.edu.
CVC 2025
8th Crypto Valley Conference on Blockchain Technology,
Zug, Switzerland, June 5-6, 2025.
(Submission Due 13 March 2025) [posted here 3/3/25]
The Crypto Valley Conference on Blockchain Technology is a premier venue for
blockchain and cryptographic research, bringing together leading academics, industry
experts, and policymakers. The 2025 edition will continue its tradition of featuring
cutting-edge research, insightful discussions, and opportunities for collaboration.
We welcome submissions on a wide range of topics, including but not limited to:
- Cryptographic protocols for blockchain and distributed systems
- Privacy-enhancing technologies and zero-knowledge proofs
- Post-quantum cryptography and its impact on blockchain
- Consensus mechanisms and scalability solutions
- Game-theoretic and economic aspects of blockchain systems
- Smart contract security and formal verification
- Governance, regulation, and policy in decentralized ecosystems
- Applications of blockchain in finance, supply chain, and beyond
For more information, please see
https://cryptovalleyconference.com/call-for-papers.
SACMAT 2025
30th ACM Symposium on Access Control Models and Technologies,
Stony Brook, NY, USA, July 8-10, 2025.
(Submission Due 24 March 2025) [posted here 2/17/25]
Access control has long been one of the most widely adopted and foundational security
technologies. It has been seamlessly integrated into operating systems like Multics and
UnixÑpioneering platforms that contributed to Turing Award-winning innovationsÑand continues
to underpin security in modern mobile devices and cloud computing. Its efficiency and effectiveness
have stood the test of time. However, the landscape of computing has dramatically changed since
the inception of the ACM Symposium on Access Control Models and Technologies (SACMAT) conference
in 1994. We now operate in a deeply interconnected, networked world where no single application
or device can act as a fully trusted reference monitor to enforce access control in isolation.
This shift demands new trust models, management strategies, enforcement techniques, and
supporting mechanisms, such as advanced authentication. In response, SACMAT 2025 invites
submissions presenting novel contributions in efficient and effective security mechanisms
for distributed, networked computing environments.
For more information, please see
https://www.sacmat.org/2025/.
TX4Nets 2025
2nd International Workshop on Trustworthy and eXplainable Artificial Intelligence for Networks,
Co-located with IFIP Networking 2025,
Limassol, Cyprus, May 25-29, 2025.
(Submission Due 31 March 2025) [posted here 2/10/25]
Artificial Intelligence (AI) has become a transformative force in
communication networks, reshaping their design, management, and optimization. In
several areas, these systems hold the promise of significantly enhancing service
provisioning and network operations. However, the adoption of AI-based systems in
the telecom domain has been relatively slow, with operators expressing skepticism
about their use for automated network management. This hesitation stems from several
key challenges: first, the reliability of these models must be thoroughly understood
before they can be deployed in critical infrastructure. Second, the opaque nature of
ML/AI modelsÑstemming from a lack of transparencyÑcomplicates understanding their
behavior and decisions, preventing operators from fully trusting and adopting them.
To address these issues, the 2nd International Workshop on Trustworthy and Explainable
Artificial Intelligence for Networks (TX4NETs) aims to serve as a collaborative platform
to drive advancements in AI systems that are not only powerful but also reliable,
interpretable, and aligned with the expectations of network operators.
The 2nd International Workshop on Trustworthy and Explainable Artificial Intelligence
for Networks seeks to bring together leading researchers, practitioners, and industry
experts to delve into the latest advancements in AI and their applications in communication
networks. The workshop will center on the foundational pillars of trustworthy AI,
including transparency, robustness, reliability, adaptability, security, data privacy,
and computational efficiency, with a focus on their implications for automating and
optimizing network operations. Participants will engage in discussions around innovative
techniques and methodologies that foster trustworthiness to address challenges in
creating AI-driven network systems that inspire confidence.
For more information, please see
https://sites.google.com/view/tx4nets-2025/important-dates-and-cfp.
April 2025
PST 2025
22nd Annual International Conference on Privacy, Security & Trust,
Fredericton, Canada, August 26-28, 2025.
(Submission Due 4 April 2025) [posted here 2/17/25]
The Annual International Conference on Privacy, Security & Trust (PST)
provides a premier forum for sharing advances in cybersecurity research and security
applications. PST2025 will be held in person in Fredericton, Canada, and will offer
three days of keynotes, technical presentations, posters, special sessions, and an
Industrial day with a vendor exhibition.
For more information, please see
http://pstnet.ca.
ACM CCS 2025
32nd ACM Conference on Computer and Communications Security,
Taipei, Taiwan, October 13-17, 2025.
(Submission Due 9 January 2025 and 14 April 2025) [posted here 11/18/24]
The 32nd ACM Conference on Computer and Communications Security (CCS) seeks
submissions presenting novel contributions related to all real-world aspects of computer security
and privacy. Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper in a way
that makes the results accessible and compelling to a general computer-security researcher. In particular,
authors should bear in mind that anyone on the program committee may be asked to review any paper.
Authors of each accepted paper must ensure that at least one author registers for the conference,
and that their paper is presented in-person at the conference if at all possible.
Please note that ACM CCS will strictly follow and enforce the policies and rules about
Conflicts of Interest and Peer-Review Integrity.
For more information, please see
https://www.sigsac.org/ccs/CCS2025/call-for-papers/.
MarCaS 2025
3rd LCN Special Track on Maritime Communication and Security,
Held in conjunction with the 50th Annual IEEE Conference on Local Computer Networks (IEEE LCN 2025),
Sydney, Australia, October 14-16, 2025.
(Submission Due 20 April 2025) [posted here 3/17/25]
The MarCaS Special Track will help bring together research groups
working at the intersection of maritime applications, communications technologies,
and protocols, as well as IT and network security to share and discuss ideas, novel
solutions, challenges, and recent developments. The workshop
solicits high quality and previously unpublished work in the maritime domain
and the research field of the LCN to stimulate novel approaches for a safer
and more resilient shipping. Join us for this exciting and timely Special Track at the
Local Computer Network Conference!!!
For more information, please see
https://garykessler.net/lcn_marcas/.
ESORICS 2025
30th European Symposium on Research in Computer Security,
Toulouse, France, September 22-26, 2025.
(Submission Due 10 January 2025 and 22 April 2025) [posted here 12/30/24]
Computer security is concerned with the protection of information in environments
where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further
the progress of research in computer security by fostering a European community that bridges
academia and industry in this realm. Sequentially hosted across various European nations, the
symposium has solidified its position as one of Europe's most prominent conferences on computer
security. Currently, the symposium delves into research and developmental avenues encompassing
AI, machine learning, technologies that enhance privacy, network safeguards, software and
hardware protection in practical scenarios.
For more information, please see
https://www.esorics2025.org/.
May 2025
ICICS 2025
27th International Conference on Information and Communications Security,
Nanjing, China, October 29-31, 2025.
(Submission Due 9 March 2025 and 23 May 2025) [posted here 3/3/25]
The ICICS conference started in 1997 and aims at bringing together researchers and
practitioners from both academia and industry to discuss and exchange their experiences,
lessons learned, and insights related to information and communications security.
The conference seeks submissions presenting novel contributions related to information
and communication security.
Springer sponsors ICICS 2025 with 1000 EUR for a Best Paper Award and a Best Student Paper Award.
For more information, please see
https://www.icics2025.org/index.html.
June 2025
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, MAY 18-21, 2026.
(Submission Due 5 June 2025 and 13 November 2025) [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
July 2025
APWG eCrime 2025
20th APWG Symposium on Electronic Crime Research,
San Diego, CA, USA, November 4-7, 2025.
(Submission Due 15 July 2025) [posted here 3/17/25]
The 2025 Symposium on Electronic Crime Research (eCrime 2025) will examine
essential factors for managing the impacts of the global cybercrime plexus
to secure IT users, commercial enterprises, governments, critical infrastructure,
and operational technologies. eCrime 2025 will be the 20th annual peer-reviewed,
publishing symposium hosted by APWG.
This year, eCrime 2025 inaugurates a dimensional extension of the symposium's
purview to include research on cyber-physical crimes. From 2025 forward, eCrime
will specifically solicit research on cybercrimes involving cyber-physical systems
and operational technologies abused in the furtherance of any crime. This expands
eCrime's scope from purely cyber (digital) crimes to include those that manifest abuse
against physical spaces, such as homes, commercial enterprises, scientific or military
facilities, roadways, public spaces, critical infrastructure and devices (e.g. IoT,
electro-mechanical controllers, sensors, etc.).
With the rise of cyber attacks inflicting physical damage - as exhibited in the
Stuxnet attacks, the cyber incursions against the Ukrainian electrical grid a
decade ago and the Colonial pipeline shutdown - as well as the rapid evolution of
malware designed to manipulate SCADA and ICS process control technologies, it w
as clear eCrime's CFP scope had to be expanded once more to maintain relevance to
the contemporary cyber threatscape.
For more information, please see
https://apwg.org/events/ecrime2025.
July 2025
August 2025
September 2025
October 2025
November 2025
SP 2026
47th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, MAY 18-21, 2026.
(Submission Due 5 June 2025 and 13 November 2025) [posted here 3/24/25]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
Symposium Event (Important Changes): The number of papers accepted to IEEE
S&P continues to grow substantially each year. Due to conference venue limitations and
costs, each accepted paper will have: (a) a short talk presentation (e.g., 5-7 minutes,
length determined based on the number of accepted papers) and (b) a poster presentation
immediately following the talk session containing the paper. All accepted papers
are required to present both a short talk and a poster.
For more information, please see
https://sp2026.ieee-security.org/cfpapers.html.
December 2025
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|