Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Last Modified:6/3/24

Note: Please send new calls to cipher-cfp@ieee-security.org and take a moment to read the submission guidelines. And please see the Cipher Calendar for events sorted in date order. For all other questions, please contact cipher-cfp@ieee-security.org by email.

Contents

 

Special Issues of Journals and Handbooks


ACM Distributed Ledger Technologies: Research and Practice, Special Issue on Blockchain for 6G Trust, Security, and Privacy. (Submission Due 1 September 2024) [posted here 4/22/24]
Guest Editors: Mingjun Wang (Xidian University, China), Tieyan Li (Huawei, Singapore), Chonggang Wang (InterDigital, Inc.), Erol Gelenbe (Polish Academy of Sciences, Poland), and Zheng Yan (Xidian University, China).

This special issue seeks original and innovative contributions on theoretical approaches, design methodologies, novel algorithms, systems, energy consumption estimation and optimization, and new applications of blockchain, that can enhance trust, security, and privacy for 6G Systems. Contributed papers may originate from academia, industry, and government.

For more information, please see https://dl.acm.org/pb-assets/static_journal_pages/dlt/pdf/ACM_DLT_SI_Blockchain_6G_Trust_Security_Privacy-1709931907953.pdf.

Conference and Workshop Call-for-papers

June 2024

SP 2025 46th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 12-15, 2025. (Submission Due 6 June 2024 and 14 November 2024) [posted here 6/3/24]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

For more information, please see https://www.sp2025.ieee-security.org/cfpapers.html.

DPM 2024 18th International Workshop on Data Privacy Management, Co-located with ESORICS 2024, Bydgoszcz, Poland, September 19, 2024. (Submission Due 6 June 2024) [posted here 5/27/24]
DPM is an annual international workshop covering research in data privacy management. Organizations are increasingly concerned about the privacy of information that they manage (as witnessed, for example, by lawsuits filed against organizations for violating the privacy of customer's data). Thus, the management of privacy-sensitive information is very critical and important for every organization.

For more information, please see https://deic.uab.cat/dpm/dpm2024/.

CNS 2024 12th IEEE Conference on Communications and Network Security, Taipei, Taiwan, September 30 - October 3, 2024. (Submission Due 10 June 2024) [posted here 3/11/24]
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cybersecurity researchers, engineers, practitioners, and policy makers to exchange ideas, techniques and tools related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, industry, and government presenting novel research results in communications and network security.

For more information, please see https://cns2024.ieee-cns.org/.

NSS-SocialSec 2024 Joint 18th International Conference on Network and System Security and 10th International Symposium on Security and Privacy in Social Networks and Big Data, Abu Dhabi, UAE, November 20-22, 2024. (Submission Due 10 June 2024) [posted here 5/27/24]
Founded in 2007, the aim of the NSS (International Conference on Network and System Security) series is to provide a leading-edge forum to foster interaction between researchers and developers with the network and system security communities, and to give attendees an opportunity to interact with experts in academia, industry, and governments. SocialSec 2024 is the 10th edition of the International Symposium on Security and Privacy in Social Networks and Big Data series, which started in 2015.
For more information, please see http://nsclab.org/nss-socialsec2024/index.html.

DASC 2024 22nd IEEE International Conference on Dependable, Autonomic and Secure Computing, Boracay Island, Malay, Philippines, November 5-8, 2024. (Submission Due 15 June 2024) [posted here 4/1/24]
As computer and communication systems, and other systems such as Cyber-Physical Systems (CPS), Internet of Things (IoT), and Autonomous Robotic Systems, become increasingly large and complex, their Dependability and Security play critical roles in supporting next-generation science, engineering, and commercial applications. It remains a challenge to design, analyze, evaluate, and improve the dependability and security of a large-scale computing environment. Trusted and autonomic computing/autonomous systems need synergistic research efforts covering many disciplines, from natural sciences to social sciences. It requires scientific and technological advances in a variety of fields, as well as new software, architectures, and communication technology that support the integration of the constituent technologies. IEEE DASC 2024 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange theoretical and implementation results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust, and/or autonomic computing, and autonomous systems.

For more information, please see http://cyber-science.org/2024/dasc/.

CRiSIS 2024 19th International Conference on Risks and Security of Internet and Systems, Aix-en-Provence, France, November 26-28, 2024. (Submission Due 15 June 2024) [posted here 4/15/24]
CRiSIS) in 2024 continues its tradition of addressing critical security challenges in Internet-connected applications, networks, and systems. The indispensability of the Internet for information exchange among diverse user groups and organizations has led to heightened risks around security and privacy. This vulnerability is exacerbated by the sophistication of online attacks, the proliferation of cybercrime, and the readily available tools for attackers, who are increasingly motivated and skilled. CRiSIS 2024 serves as an essential platform for stakeholders in computer and network security from the industrial, academic, and governmental sectors to convene, share insights, and showcase the latest developments in combating Internet-related security threats, vulnerabilities, and the necessary countermeasures to address them.

For more information, please see https://crisis2024.univ-gustave-eiffel.fr.

SYSTOR 2024 17th ACM International System and Storage Conference, Tel Aviv-Yaffo, Israel, September 23-25, 2024. (Submission Due 19 June 2024) [posted here 2/5/24]
The ACM International Systems and Storage Conference (SYSTOR) is an excellent international forum for interaction across the systems research community. The program includes both innovative, peer-reviewed research papers in the broad area of systems, as well as distinguished keynote lecturers, a poster session, and social events. ACM SYSTOR is designed to appeal to academic and industrial researchers and practitioners, welcoming both students and seasoned professionals. SYSTOR has traditionally welcomed academic and industrial papers in systems including storage, cloud and distributed systems, networking, and systems security, broadly construed. While continuing on this tradition, this year, we are broadening the scope to also include research on systems issues in AI and/or sustainability, including those that involve workload optimization, data processing, lifecycle of systems, carbon footprint transparency, and system re-designs. SYSTOR encourages submissions that describe results from experimental system prototypes, as well as experience papers describing practical deployments, and valuable lessons learned from them. Topics of interest include System Security and Trust.

For more information, please see https://www.systor.org/2024/.

HealthSec 2024 Workshop on Cybersecurity in Healthcare, Held in conjunction with the 31st ACM Conference on Computer and Communications Security (CCS 2024), Salt Lake City, Utah USA, October 14, 2024. (Submission Due 23 June 2024) [posted here 5/6/24]
In its most basic form, healthcare is gathering data, interpreting data into information, and transforming information into current human knowledge that can be acted upon, with each of these stages open to unintended errors and/or malicious subversion. These stages do not occur within a vacuum but rather within our existing infrastructures and social system with all their current limitations, systemic bias, and exploitable vulnerabilities. While a similar characterization can be made about security in other applied domains, healthcare is undergoing a dramatic transformation, arguably the next technological revolution, presenting immediate opportunities for improvement along with corresponding challenges in security. ur desire is to bring together diverse researchers from academia, government, and the healthcare industry to report on latest research efforts. As this is the inaugural workshop focusing on cybersecurity in healthcare, we aim to encourage, jumpstart, and grow excellent interdisciplinary contributions at the forefront of research.

For more information, please see https://publish.illinois.edu/healthsec/.

eCrime 2024 19th annual APWG eCrime symposium, Boston, Massachusetts, USA, September 24-26, 2024. (Submission Due 23 June 2024) [posted here 5/6/24]
APWG eCrime 2024 contemplates the dawn of its third decade at the cybercrime frontier by delineating the challenges that await the interveners, investigators, policy makers and stakeholders from private and public sectors attempting to arrest Ñ and reverse Ñ the pandemic spread of cybercrime on our public and private internetworks and the World Wide Web.

For more information, please see https://ecrime2024.hotcrp.com.

July 2024

ICTAI 2024 36th IEEE International Conference on Tools with Artificial Intelligence, Herndon, VA, USA, October 30 - November 1, 2024. (Submission Due 1 July 2024) [posted here 3/25/24]
The IEEE International Conference on Tools with Artificial Intelligence (ICTAI) is a leading IEEE-CS annual scientific meeting for three decades. It provides a major international forum where the creation and exchange of ideas related to artificial intelligence are fostered among academia, industry, and government agencies. The conference facilitates the cross-fertilization of these ideas and promotes their transfer into practical tools, for developing intelligent systems and pursuing artificial intelligence applications. The ICTAI encompasses all technical aspects of specifying, developing and evaluating the theoretical underpinnings and applied mechanisms of the AI-based components of computer tools such as algorithms, architectures and languages. The conference includes the topic of AI in Computer Security, Data Privacy, and Information Assurance.

For more information, please see https://ictai.computer.org/2024/.

NDSS 2025 Network and Distributed System Security Symposium and Workshops, San Diego, CA, USA, February 23-28, 2025. (Submission Due 17 April 2024 and 10 July 2024) [posted here 6/3/24]
The Network and Distributed System Security Symposium (NDSS) is a top venue that fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes everyone interested in practical aspects of network and distributed system security, with a focus on system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of practical security technologies. This call solicits technical papers. Authors are encouraged to write the abstract and introduction of their paper in a way that makes the results accessible and compelling to a general security researcher. All submissions will be reviewed by the Program Committee and accepted submissions will be published by the Internet Society in the Proceedings of NDSS 2025. The Proceedings will be made freely accessible from the Internet Society web pages. Furthermore, permission to freely reproduce all or parts of papers for noncommercial purposes is granted provided that copies bear the Internet Society notice included on the first page of the paper. The authors are thus free to post the camera-ready versions of their papers on their personal pages and within their institutional repositories. Reproduction for commercial purposes is strictly prohibited and requires prior consent.

For more information, please see https://www.ndss-symposium.org/ndss2025/submisions/call-for-papers/.

UIC 2024 21th IEEE International Conference on Ubiquitous Intelligence and Computing, Denarau Island, Fiji, December 2-7, 2024. (Submission Due 15 July 2024) [posted here 3/25/24]
Ubiquitous sensors, devices, networks and information are paving the way towards a smart world in which computational intelligence is distributed throughout the physical environment to provide reliable and relevant services to people. This ubiquitous intelligence will change the computing landscape because it will enable new breeds of applications and systems to be developed and the realm of computing possibilities will be significantly extended. By enhancing everyday objects with intelligence, many tasks and processes could be simplified, more efficient and more enjoyable. Ubiquitous computing is to create such intelligent/smart environments, services and applications. The conference includes the topic of Security, Privacy, and Trust.

For more information, please see https://www.ieee-smart-world.org/2024/uic/.

UbiSec 2024 4th International Conference on Ubiquitous Security, Changsha, China, December 29-31, 2024. (Submission Due 15 July 2024) [posted here 4/1/24]
The UbiSec 2024 Conference is devoted to security, privacy and anonymity in cyberspace, physical world, and social networks. The Conference covers many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for cyberspace, physical world, and social networking systems. As applications of computer and information technology have permeated in every aspect of our daily life, the issues of security, privacy, and anonymity have become increasingly critical. The Conference will provide a forum for world-class researchers to gather and share their research achievements, emerging ideas and trends in the highly challenging research fields.

For more information, please see http://ubisecurity.org/2024/.

August 2024
September 2024

USENIX Security 2025 34th USENIX Security Symposium, Seattle, WA, USA, August 13-15, 2025. (Submission Due 4 September 2024 and 22 January 2025) [posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 2025 edition of USENIX Security will implement a new approach to presenting accepted papers and fostering interactions at the conference. The USENIX Security '25 program co-chairs and the USENIX Security steering committee have prepared a public RFC about the plans for this new model and welcome thoughts from the USENIX Security community by April 22, 2024.

For more information, please see https://www.usenix.org/conference/usenixsecurity25.

FPS 2024 17th International Symposium on Foundations & Practice of Security, Montreal, Canada, December 9-11 2024. (Submission Due 6 September 2024) [posted here 5/27/24]
The aim of the FPS symposium is to discuss and exchange theoretical and practical ideas that address privacy, security, and cyber resilience issues in interconnected systems. Moreover, it aims to provide scientific presentations as well as to promote scientific collaborations, joint research programs, and student exchanges between institutions involved in this fast-moving field. For the 17th edition, special care will be given to innovative behavioral research enhancing privacy and cyber resilience research. We are particularly interested in topics such as insider threat, user-centric security interfaces, security culture, and user compliance.

For more information, please see https://fps-2024.hec.ca/.

October 2024
November 2024

SP 2025 46th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 12-15, 2025. (Submission Due 6 June 2024 and 14 November 2024) [posted here 6/3/24]
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Theoretical papers must make a convincing case for the relevance of their results to practice. Topics of interest include:
- Applied cryptography
- Attacks with novel insights, techniques, or results
- Authentication, access control, and authorization
- Blockchains and distributed ledger security
- Cloud computing security
- Cyber physical systems security
- Distributed systems security
- Economics of security and privacy
- Embedded systems security
- Formal methods and verification
- Hardware security
- Hate, Harassment, and Online Abuse
- Intrusion detection and prevention
- Machine learning and computer security
- Malware and unwanted software
- Network security
- Operating systems security
- Privacy-enhancing technologies, anonymity, and censorship
- Program and binary analysis
- Protocol security
- Security and privacy metrics
- Security and privacy policies
- Security architectures
- Security foundations
- Systems security
- Usable security and privacy
- Web security
- Wireless and mobile security/privacy

This topic list is not meant to be exhaustive; S&P is interested in all aspects of computer security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

Systematization of Knowledge Papers: As in past years, we solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge, as such papers can provide a high value to our community. Suitable papers are those that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate and may be rejected without full review. Submissions will be distinguished by the prefix ÒSoK:Ó in the title and a checkbox on the submission form. They will be reviewed by the full PC and held to the same standards as traditional research papers, but they will be accepted based on their treatment of existing work and value to the community, and not based on any new research results they may contain. Accepted papers will be presented at the symposium and included in the proceedings. You can find an overview of recent SoK papers at https://oaklandsok.github.io/.

For more information, please see https://www.sp2025.ieee-security.org/cfpapers.html.

December 2024
January 2025

USENIX Security 2025 34th USENIX Security Symposium, Seattle, WA, USA, August 13Ð15, 2025. (Submission Due 4 September 2024 and 22 January 2025) [posted here 6/3/24]
The USENIX Security Symposium brings together researchers, practitioners, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The 2025 edition of USENIX Security will implement a new approach to presenting accepted papers and fostering interactions at the conference. The USENIX Security '25 program co-chairs and the USENIX Security steering committee have prepared a public RFC about the plans for this new model and welcome thoughts from the USENIX Security community by April 22, 2024.

For more information, please see https://www.usenix.org/conference/usenixsecurity25.

Archival Journals Regularly Specializing in Security and Privacy

Journal of Privacy Technology (JOPT),   Editor-in-Chief:  Latanya Sweeney
This online-only Journal, started in 2004 and  operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions.  More information can be found at http://www.jopt.org/.

IEEE Security and Privacy Magazine,   Editor-in-Chief: Shari Lawrence Pfleeger
IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of information assurance such as legal and ethical issues, privacy concerns, tools to help secure information, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology.  More information can be found at http://www.computer.org/portal/web/computingnow/securityandprivacy.

ACM Transactions on Information and System Security,   Editor-in-Chief: Gene Tsudik
ACM invites submissions for its Transactions on Information and System Security, inaugurated in November 1998. TISSEC publishes original archival-quality research papers and technical notes in all areas of information and system security including technologies, systems, applications, and policies. Papers should have practical relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers will be accepted only if there is convincing argument for the practical significance of the results. Theory must be justified by convincing examples illustrating its application. More information is given on the journal web page at http://www.acm.org/tissec.

IEEE Transactions on Dependable and Secure Computing,   Editor-in-Chief: Ravi Sandhu
The IEEE Transactions on Dependable and Secure Computing publishes archival research results related to research into foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus will also include measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. More information is given on the journal web page at http://www.computer.org/portal/web/tdsc.

The Springer Series on ADVANCES IN INFORMATION SECURITY
The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer, network security, and cryptography, but related areas, such as fault tolerance and software assurance. The series serves as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact Professor Sushil Jajodia (jajodia@gmu.edu,703-993-1653).
 
Journal of Computer Security,   Editor-in-Chief: John Mitchell and Pierangela Samarati
JCS is an archival research journal for significant advances in computer security. Subject areas include architecture, operating systems, database systems, networks, authentication, distributed systems, formal models, verification, algorithms, mechanisms, and policies. All papers must be submitted online at http://www.iospress.nl/journal/journal-of-computer-security/. More information is given on the journal web page at http://jcs.stanford.edu/.
 
Computers & Security,   Editor-in-Chief: Eugene H. Spafford
Computers & Security aims to satisfy the needs of managers and experts involved in computer security by providing a blend of research developments, innovations, and practical management advice. Original submissions on all computer security topics are invited, particularly those of practical benefit to the practitioner. All papers must be submitted online at http://ees.elsevier.com/cose/. More information can be found at http://www.elsevier.com/locate/issn/01674048.
 
International Journal of Information Security,   Editors-in-Chief: D. Gollmann; J. Lopez; E. Okamoto
The International Journal of Information Security, IJIS, aims to provide prompt publication of important technical work in information security, attracting any person interested in communications, commerce, banking, medicine, or other areas of endeavor affected by information security. Any research submission on theory, applications, and implementations of information security is welcomed. This includes, but is not limited to, system security, network security, content protection, applications and foundations of information security. More information is given on the journal web page at http://www.springer.com/computer/security+and+cryptology/journal/10207.
 
International Journal of Network Security,   Editors-in-Chief: Min-Shiang Hwang
International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C.  More information can be found at http://ijns.femto.com.tw/.
 
International Journal of Security and Networks,   Editors-in-Chief: Yang Xiao
International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
 
International Journal of Critical Infrastructure Protection,   Editors-in-Chief: Sujeet Shenoi
International Journal of Critical Infrastructure Protection's primary aim is to publish high quality scientific and policy papers in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology and policy to craft sophisticated yet practical solutions that will secure information, computer and network assets in the various critical infrastructure sectors. All papers must be submitted online at http://www.elsevier.com/locate/ijcip. More information is given on the journal web page at http://www.elsevier.com/locate/ijcip.
 
IEEE Transactions on Information Forensics and Security,   Editors-in-Chief: C.-C. Jay Kuo
IEEE Transactions on Information Forensics and Security aims to provide a unified locus for archival research on the fundamental contributions and the mathematics behind information forensics, information security, surveillance, and systems applications that incorporate these features. Authors are strongly encouraged to submit their papers electronically to the online manuscript system, Manuscript Central, via sps-ieee.manuscriptcentral.com.  More information can be found at http://www.ieee.org/organizations/society/sp/tifs.html.
 
EURASIP Journal on Information Security,   Editors-in-Chief: Stefan Katzenbeisser
EURASIP Journal on Information Security aims to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. The journal also welcomes proposals for Special Issues. All papers must be submitted online at http://jis.eurasipjournals.com/manuscript.  More information can be found at http://jis.eurasipjournals.com.