|
Last Modified:6/3/24
Note: Please send new calls to
cipher-cfp@ieee-security.org and take a moment to read the
submission guidelines. And please
see the Cipher
Calendar for events sorted in date order. For all other
questions, please contact
cipher-cfp@ieee-security.org by email.
Contents
ACM Distributed Ledger Technologies:
Research and Practice,
Special Issue on Blockchain for 6G Trust, Security, and Privacy.
(Submission Due 1 September 2024) [posted here 4/22/24]
Guest Editors: Mingjun Wang (Xidian University, China),
Tieyan Li (Huawei, Singapore),
Chonggang Wang (InterDigital, Inc.),
Erol Gelenbe (Polish Academy of Sciences, Poland),
and Zheng Yan (Xidian University, China).
This special issue seeks original and innovative contributions on theoretical
approaches, design methodologies, novel algorithms, systems, energy consumption estimation
and optimization, and new applications of blockchain, that can enhance trust, security,
and privacy for 6G Systems. Contributed papers may originate from academia, industry,
and government.
For more information, please see
https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/ACM_DLT_SI_Blockchain_6G_Trust_Security_Privacy-1709931907953.pdf.
June 2024
SP 2025
46th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 12-15, 2025.
(Submission Due 6 June 2024 and 14 November 2024) [posted here 6/3/24]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
For more information, please see
https://www.sp2025.ieee-security.org/cfpapers.html.
DPM 2024
18th International Workshop on Data Privacy Management,
Co-located with ESORICS 2024,
Bydgoszcz, Poland, September 19, 2024.
(Submission Due 6 June 2024) [posted here 5/27/24]
DPM is an annual international workshop covering research in data
privacy management. Organizations are increasingly concerned
about the privacy of information that they manage (as witnessed,
for example, by lawsuits filed against organizations for
violating the privacy of customer's data). Thus, the management
of privacy-sensitive information is very critical and important
for every organization.
For more information, please see
https://deic.uab.cat/dpm/dpm2024/.
CNS 2024
12th IEEE Conference on Communications and Network Security,
Taipei, Taiwan, September 30 - October 3, 2024.
(Submission Due 10 June 2024) [posted here 3/11/24]
The IEEE Conference on Communications and Network Security (CNS) is
a premier forum for cybersecurity researchers, engineers, practitioners, and
policy makers to exchange ideas, techniques and tools related to all practical
and theoretical aspects of communications and network security. The conference
seeks submissions from academia, industry, and government presenting novel
research results in communications and network security.
For more information, please see
https://cns2024.ieee-cns.org/.
NSS-SocialSec 2024
Joint 18th International Conference on Network and System Security and
10th International Symposium on Security and Privacy in Social Networks and Big Data,
Abu Dhabi, UAE, November 20-22, 2024.
(Submission Due 10 June 2024) [posted here 5/27/24]
Founded in 2007, the aim of the NSS (International Conference on Network and
System Security) series is to provide a leading-edge forum to foster interaction between
researchers and developers with the network and system security communities, and to give
attendees an opportunity to interact with experts in academia, industry, and governments.
SocialSec 2024 is the 10th edition of the International Symposium on Security and
Privacy in Social Networks and Big Data series, which started in 2015.
For more information, please see
http://nsclab.org/nss-socialsec2024/index.html.
DASC 2024
22nd IEEE International Conference on Dependable, Autonomic and Secure Computing,
Boracay Island, Malay, Philippines, November 5-8, 2024.
(Submission Due 15 June 2024) [posted here 4/1/24]
As computer and communication systems, and other systems such as Cyber-Physical
Systems (CPS), Internet of Things (IoT), and Autonomous Robotic Systems, become increasingly
large and complex, their Dependability and Security play critical roles in supporting
next-generation science, engineering, and commercial applications. It remains a challenge
to design, analyze, evaluate, and improve the dependability and security of a large-scale
computing environment. Trusted and autonomic computing/autonomous systems need synergistic
research efforts covering many disciplines, from natural sciences to social sciences. It
requires scientific and technological advances in a variety of fields, as well as new
software, architectures, and communication technology that support the integration of
the constituent technologies. IEEE DASC 2024 aims to bring together computer scientists,
industrial engineers, and researchers to discuss and exchange theoretical and
implementation results, novel designs, work-in-progress, experience, case studies, and
trend-setting ideas in the areas of dependability, security, trust, and/or autonomic
computing, and autonomous systems.
For more information, please see
http://cyber-science.org/2024/dasc/.
CRiSIS 2024
19th International Conference on Risks and Security of Internet and Systems,
Aix-en-Provence, France, November 26-28, 2024.
(Submission Due 15 June 2024) [posted here 4/15/24]
CRiSIS) in 2024 continues its tradition of addressing critical security
challenges in Internet-connected applications, networks, and systems. The indispensability
of the Internet for information exchange among diverse user groups and organizations has
led to heightened risks around security and privacy. This vulnerability is exacerbated
by the sophistication of online attacks, the proliferation of cybercrime, and the
readily available tools for attackers, who are increasingly motivated and skilled.
CRiSIS 2024 serves as an essential platform for stakeholders in computer and
network security from the industrial, academic, and governmental sectors to convene,
share insights, and showcase the latest developments in combating Internet-related
security threats, vulnerabilities, and the necessary countermeasures to address them.
For more information, please see
https://crisis2024.univ-gustave-eiffel.fr.
SYSTOR 2024
17th ACM International System and Storage Conference,
Tel Aviv-Yaffo, Israel, September 23-25, 2024.
(Submission Due 19 June 2024) [posted here 2/5/24]
The ACM International Systems and Storage Conference (SYSTOR) is
an excellent international forum for interaction across the systems research
community. The program includes both innovative, peer-reviewed research
papers in the broad area of systems, as well as distinguished keynote
lecturers, a poster session, and social events. ACM SYSTOR is designed
to appeal to academic and industrial researchers and practitioners,
welcoming both students and seasoned professionals. SYSTOR has
traditionally welcomed academic and industrial papers in systems
including storage, cloud and distributed systems, networking, and systems
security, broadly construed. While continuing on this tradition,
this year, we are broadening the scope to also include research
on systems issues in AI and/or sustainability, including those that
involve workload optimization, data processing, lifecycle of systems,
carbon footprint transparency, and system re-designs. SYSTOR encourages
submissions that describe results from experimental system prototypes,
as well as experience papers describing practical deployments, and
valuable lessons learned from them. Topics of interest
include System Security and Trust.
For more information, please see
https://www.systor.org/2024/.
HealthSec 2024
Workshop on Cybersecurity in Healthcare,
Held in conjunction with the 31st ACM Conference on Computer and Communications Security (CCS 2024),
Salt Lake City, Utah USA, October 14, 2024.
(Submission Due 23 June 2024) [posted here 5/6/24]
In its most basic form, healthcare is gathering data, interpreting data
into information, and transforming information into current human knowledge that can
be acted upon, with each of these stages open to unintended errors and/or malicious
subversion. These stages do not occur within a vacuum but rather within our
existing infrastructures and social system with all their current limitations,
systemic bias, and exploitable vulnerabilities. While a similar characterization
can be made about security in other applied domains, healthcare is undergoing a
dramatic transformation, arguably the next technological revolution, presenting
immediate opportunities for improvement along with corresponding challenges in security.
ur desire is to bring together diverse researchers from academia, government,
and the healthcare industry to report on latest research efforts. As this is
the inaugural workshop focusing on cybersecurity in healthcare, we aim to
encourage, jumpstart, and grow excellent interdisciplinary contributions at the
forefront of research.
For more information, please see
https://publish.illinois.edu/healthsec/.
eCrime 2024
19th annual APWG eCrime symposium,
Boston, Massachusetts, USA, September 24-26, 2024.
(Submission Due 23 June 2024) [posted here 5/6/24]
APWG eCrime 2024 contemplates the dawn of its third decade at
the cybercrime frontier by delineating the challenges that await the interveners,
investigators, policy makers and stakeholders from private and public sectors
attempting to arrest Ñ and reverse Ñ the pandemic spread of cybercrime on our
public and private internetworks and the World Wide Web.
For more information, please see
https://ecrime2024.hotcrp.com.
July 2024
ICTAI 2024
36th IEEE International Conference on Tools with Artificial Intelligence,
Herndon, VA, USA, October 30 - November 1, 2024.
(Submission Due 1 July 2024) [posted here 3/25/24]
The IEEE International Conference on Tools with Artificial Intelligence (ICTAI)
is a leading IEEE-CS annual scientific meeting for three decades. It provides a major
international forum where the creation and exchange of ideas related to artificial
intelligence are fostered among academia, industry, and government agencies. The
conference facilitates the cross-fertilization of these ideas and promotes their transfer
into practical tools, for developing intelligent systems and pursuing artificial
intelligence applications. The ICTAI encompasses all technical aspects of specifying,
developing and evaluating the theoretical underpinnings and applied mechanisms of
the AI-based components of computer tools such as algorithms, architectures and
languages. The conference includes the topic of AI in Computer Security, Data Privacy,
and Information Assurance.
For more information, please see
https://ictai.computer.org/2024/.
NDSS 2025
Network and Distributed System Security Symposium and Workshops,
San Diego, CA, USA, February 23-28, 2025.
(Submission Due 17 April 2024 and 10 July 2024) [posted here 6/3/24]
The Network and Distributed System Security Symposium (NDSS) is a top
venue that fosters information exchange among researchers and practitioners of
network and distributed system security. The target audience includes everyone
interested in practical aspects of network and distributed system security, with
a focus on system design and implementation. A major goal is to encourage and
enable the Internet community to apply, deploy, and advance the state of practical
security technologies. This call solicits technical papers. Authors are encouraged to
write the abstract and introduction of their paper in a way that makes the results
accessible and compelling to a general security researcher. All submissions will be
reviewed by the Program Committee and accepted submissions will be published by
the Internet Society in the Proceedings of NDSS 2025. The Proceedings will be made
freely accessible from the Internet Society web pages. Furthermore, permission to
freely reproduce all or parts of papers for noncommercial purposes is granted
provided that copies bear the Internet Society notice included on the first
page of the paper. The authors are thus free to post the camera-ready versions
of their papers on their personal pages and within their institutional repositories.
Reproduction for commercial purposes is strictly prohibited and requires prior consent.
For more information, please see
https://www.ndss-symposium.org/ndss2025/submisions/call-for-papers/.
UIC 2024
21th IEEE International Conference on Ubiquitous Intelligence and Computing,
Denarau Island, Fiji, December 2-7, 2024.
(Submission Due 15 July 2024) [posted here 3/25/24]
Ubiquitous sensors, devices, networks and information are paving the way towards
a smart world in which computational intelligence is distributed throughout the physical
environment to provide reliable and relevant services to people. This ubiquitous intelligence
will change the computing landscape because it will enable new breeds of applications and
systems to be developed and the realm of computing possibilities will be significantly extended.
By enhancing everyday objects with intelligence, many tasks and processes could be simplified,
more efficient and more enjoyable. Ubiquitous computing is to create such intelligent/smart
environments, services and applications. The conference includes the topic of Security,
Privacy, and Trust.
For more information, please see
https://www.ieee-smart-world.org/2024/uic/.
UbiSec 2024
4th International Conference on Ubiquitous Security,
Changsha, China, December 29-31, 2024.
(Submission Due 15 July 2024) [posted here 4/1/24]
The UbiSec 2024 Conference is devoted to security, privacy and anonymity in
cyberspace, physical world, and social networks. The Conference covers many dimensions
including security algorithms and architectures, privacy-aware policies, regulations
and techniques, anonymous computation and communication, encompassing fundamental
theoretical approaches, practical experimental projects, and commercial application
systems for cyberspace, physical world, and social networking systems. As applications
of computer and information technology have permeated in every aspect of our daily
life, the issues of security, privacy, and anonymity have become increasingly
critical. The Conference will provide a forum for world-class researchers to
gather and share their research achievements, emerging ideas and trends in the
highly challenging research fields.
For more information, please see
http://ubisecurity.org/2024/.
August 2024
September 2024
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13-15, 2025.
(Submission Due 4 September 2024 and 22 January 2025) [posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
FPS 2024
17th International Symposium on Foundations & Practice of Security,
Montreal, Canada, December 9-11 2024.
(Submission Due 6 September 2024) [posted here 5/27/24]
The aim of the FPS symposium is to discuss and exchange theoretical
and practical ideas that address privacy, security, and cyber resilience issues
in interconnected systems. Moreover, it aims to provide scientific presentations
as well as to promote scientific collaborations, joint research programs, and
student exchanges between institutions involved in this fast-moving field. For
the 17th edition, special care will be given to innovative behavioral research
enhancing privacy and cyber resilience research. We are particularly interested
in topics such as insider threat, user-centric security interfaces, security
culture, and user compliance.
For more information, please see
https://fps-2024.hec.ca/.
October 2024
November 2024
SP 2025
46th IEEE Symposium on Security and Privacy,
San Francisco, CA, USA, May 12-15, 2025.
(Submission Due 6 June 2024 and 14 November 2024) [posted here 6/3/24]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the
premier forum for computer security research, presenting the latest developments
and bringing together researchers and practitioners. We solicit previously
unpublished papers offering novel research contributions in any aspect of security
or privacy. Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of secure systems.
Theoretical papers must make a convincing case for the relevance of their
results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy
This topic list is not meant to be exhaustive; S&P is interested in all
aspects of computer security and privacy. Papers without a clear application to
security or privacy, however, will be considered out of scope and may be
rejected without full review.
Systematization of Knowledge Papers: As in past years, we solicit
systematization of knowledge (SoK) papers that evaluate, systematize, and
contextualize existing knowledge, as such papers can provide a high value
to our community. Suitable papers are those that provide an important new
viewpoint on an established, major research area, support or challenge long-held
beliefs in such an area with compelling evidence, or present a convincing,
comprehensive new taxonomy of such an area. Survey papers without such insights
are not appropriate and may be rejected without full review. Submissions will be
distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission
form. They will be reviewed by the full PC and held to the same standards as
traditional research papers, but they will be accepted based on their
treatment of existing work and value to the community, and not based on any new research
results they may contain. Accepted papers will be presented at the symposium
and included in the proceedings. You can find an overview of recent SoK
papers at
https://oaklandsok.github.io/.
For more information, please see
https://www.sp2025.ieee-security.org/cfpapers.html.
December 2024
January 2025
USENIX Security 2025
34th USENIX Security Symposium,
Seattle, WA, USA, August 13Ð15, 2025.
(Submission Due 4 September 2024 and 22 January 2025) [posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners,
system programmers, and others interested in the latest advances in the security and
privacy of computer systems and networks. The 2025 edition of USENIX Security will
implement a new approach to presenting accepted papers and fostering interactions
at the conference. The USENIX Security '25 program co-chairs and the USENIX Security
steering committee have prepared a public RFC about the plans for this new model
and welcome thoughts from the USENIX Security community by April 22, 2024.
For more information, please see
https://www.usenix.org/conference/usenixsecurity25.
Journal of Privacy Technology (JOPT),
Editor-in-Chief: Latanya Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original
current research in privacy technology. It encourages the submission
of any material dealing primarily with the technological aspects of
privacy or with the privacy aspects of technology, which may include
analysis of the interaction between policy and technology or the
technological implications of legal decisions. More information can
be found at http://www.jopt.org/.
IEEE Security and Privacy Magazine, Editor-in-Chief:
Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research
articles, case studies, tutorials, and regular departments covering
diverse aspects of information assurance such as legal and ethical
issues, privacy concerns, tools to help secure information, analysis
of vulnerabilities and attacks, trends and new developments,
pedagogical and curricular issues in educating the next generation
of security professionals, secure operating systems and
applications, security issues in wireless networks, design and test
strategies for secure and survivable systems, and cryptology. More
information can be found at
http://www.computer.org/portal/web/computingnow/securityandprivacy.
ACM Transactions on Information and System Security,
Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and
System Security, inaugurated in November 1998. TISSEC publishes
original archival-quality research papers and technical notes in all
areas of information and system security including technologies,
systems, applications, and policies. Papers should have practical
relevance to the construction, evaluation, application, or operation
of secure systems. Theoretical papers will be accepted only if there
is convincing argument for the practical significance of the
results. Theory must be justified by convincing examples
illustrating its application. More information is given on the
journal web page at
http://www.acm.org/tissec.
IEEE Transactions on Dependable and Secure Computing,
Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes
archival research results related to research into foundations,
methodologies, and mechanisms that support the achievement—through
design, modeling, and evaluation—of systems and networks that are
dependable and secure to the desired degree without compromising
performance. The focus will also include measurement, modeling, and
simulation techniques, and foundations for jointly evaluating,
verifying, and designing for performance, security, and dependability
constraints. More information is given on the
journal web page at
http://www.computer.org/portal/web/tdsc.
The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all aspects
of computer, network security, and cryptography, but related areas, such
as fault tolerance and software assurance. The series serves as a central
source of reference for information security research and developments.
The series aims to publish thorough and cohesive overviews on specific topics
in Information Security, as well as works that are larger in scope than survey
articles and that will contain more detailed background information. The series
also provides a single point of coverage of advanced and timely topics and a
forum for topics that may not have reached a level of maturity to warrant a
comprehensive textbook. Prospective Authors or Editors: If you have an idea
for a book that would fit in this series, we would welcome the opportunity to
review your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements, please
contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
Journal of Computer Security,
Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in
computer security. Subject areas include architecture, operating systems,
database systems, networks, authentication, distributed systems,
formal models, verification, algorithms, mechanisms, and policies.
All papers must be submitted online
at
http://www.iospress.nl/journal/journal-of-computer-security/.
More information is given on the journal web page at
http://jcs.stanford.edu/.
Computers & Security,
Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers
and experts involved in computer security by providing a blend of
research developments, innovations, and practical management advice.
Original submissions on all computer security topics are invited,
particularly those of practical benefit to the practitioner.
All papers must be submitted online
at
http://ees.elsevier.com/cose/.
More information can be found at
http://www.elsevier.com/locate/issn/01674048.
International Journal of Information Security,
Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to
provide prompt publication of important technical work in
information security, attracting any person interested in
communications, commerce, banking, medicine, or other areas of
endeavor affected by information security. Any research submission
on theory, applications, and implementations of information security
is welcomed. This includes, but is not limited to, system security,
network security, content protection, applications and foundations
of information security. More information is given on the journal
web page at
http://www.springer.com/computer/security+and+cryptology/journal/10207.
International Journal of Network Security,
Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international
official journal of Science Publications, publishing original articles,
reviews and short communications of a high scientific and technology
in network security. Subjects covered include: access control,
computer security, cryptography, communications security, data security,
database security, electronic commerce security, information security,
multimedia security, and network security. Authors are strongly encouraged
to submit their papers electronically by using online manuscript submission
at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file
to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems,
National Chung Hsing University, Taiwan, R.O.C. More
information can be found at
http://ijns.femto.com.tw/.
International Journal of Security and Networks,
Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal
for significant advances in network security. Subject areas include attack models,
security mechanisms, security services, authentication, authorization, access control,
multicast security, data confidentiality, data integrity, non-repudiation, forensics,
privacy protection, secure protocols, formal analyses, intrusion detection,
key management, trust establishment, revocation of malicious parties, security policies,
fraudulent usage, dependability and reliability, prevention of traffic analysis,
network security performance evaluation, tradeoff analysis between performance and
security, security standards, etc. All papers must be submitted online
at
http://www.inderscience.com/ijsn/. More information is given on
the journal web page at
http://www.inderscience.com/ijsn/.
International Journal of Critical Infrastructure Protection,
Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's
primary aim is to publish high quality scientific and policy papers in all
areas of critical infrastructure protection. Of particular interest are
articles that weave science, technology and policy to craft
sophisticated yet practical solutions that will secure information,
computer and network assets in the various critical infrastructure
sectors. All papers must be submitted online
at
http://www.elsevier.com/locate/ijcip. More information is given on
the journal web page at
http://www.elsevier.com/locate/ijcip.
IEEE Transactions on Information Forensics and Security,
Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to
provide a unified locus for archival research on the fundamental contributions
and the mathematics behind information forensics, information security,
surveillance, and systems applications that incorporate these features.
Authors are strongly encouraged
to submit their papers electronically to the online manuscript system,
Manuscript Central, via
sps-ieee.manuscriptcentral.com. More
information can be found at
http://www.ieee.org/organizations/society/sp/tifs.html.
EURASIP Journal on Information Security,
Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers
and practitioners dealing with the general field of information security, with a particular
emphasis on the use of signal processing tools in adversarial environments. As
such, it addresses all works whereby security is achieved through a combination
of techniques from cryptography, computer security, machine learning and multimedia
signal processing. Application domains lie, for example, in secure storage, retrieval
and tracking of multimedia data, secure outsourcing of computations, forgery
detection of multimedia data, or secure use of biometrics. The journal also
welcomes survey papers that give the reader a gentle introduction to one of
the topics covered as well as papers that report large-scale experimental
evaluations of existing techniques. Pure cryptographic papers are outside
the scope of the journal. The journal also welcomes proposals for
Special Issues.
All papers must be submitted online
at
http://jis.eurasipjournals.com/manuscript. More
information can be found at
http://jis.eurasipjournals.com.
|