Call For Paper

  • Applied cryptography
  • Automated security analysis
  • Biometric security/privacy
  • Cloud security/privacy
  • Complex systems security
  • Critical infrastructure security
  • Cryptanalysis
  • Cryptographic primitives
  • Cryptographic protocols
  • Data protection
  • Database/system security
  • Digital rights management
  • Distributed security and consensus protocols
  • Email, app and web security
  • Future Internet security
  • Human factors in security
  • Identity management
  • IP protection
  • Internet fraud, cybercrime
  • Internet-of-Things (IoT) security
  • Intrusion detection
  • Key management
  • Malware
  • Mobile/wireless/5G security
  • Network security protocols
  • Post-quantum cryptography
  • Privacy/anonymity, PETs
  • Security/privacy metrics
  • Side-channel analysis and physical attacks
  • Trust management
  • Ubiquitous security/privacy
  • Usable security/privacy