Call for Papers
Original papers offering novel research contributions on all aspects of Security and Privacy are solicited for submission to ICSP 2025. Areas of interest include, but are not limited to:
- Cryptography
- Secure cryptographic protocols
- Post-quantum cryptography
- Quantum cryptography
- Blockchain and Cryptocurrency
- IoT security and privacy
- Cloud security
- Privacy-preserving technologies
- Biometric Security
- Security and privacy of Big Data
- Cloud and edge computing security
- Access control
- Steganography and steganalysis
- Leakage-resilient cryptography
- Cyber-physical security
- Database security
- Embedded systems security
- Lightweight security
- Authentication and authorization
- Social networks security, privacy and trust
- Wireless security
- Distributed systems security
- Cyber-physical systems security
- Verification of security protocols
- Machine Learning in Cybersecurity
- Artificial Intelligence
Instructions:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a
journal or any other conference/workshop that has proceedings. All submissions should start with a title,
an abstract and keywords, but must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).
Length of the submission should not exceed 16 pages including the bibliography and well-marked appendices, and supplementary material,
and using at least 10 point fonts and reasonable margins.
Submissions must be prepared in CCIS templates
and submitted electronically in PDF format. Details on the
CCIS templates can be found here.
It is strongly recommended that submissions are processed in LaTeX. Authors are advised to check the plagiarism of their manuscripts before submission.
It should not exceed 20%. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Submission of manuscripts does not guarantee acceptance. It will be decided by the Editors, Reviewers and the Organizing Committee.
Please note that at least one author of each accepted paper should register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
CCIS Template: click here.
WHERE TO SUBMIT?
Please submit full length paper on Microsoft CMT using the following link: click here .
HOW TO SUBMIT?
Please follow the following link:
click here *.
*Note that submissions must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).
Proceedings 
Peer reviewed and selected accepted papers of the conference will be published as proceedings with Springer in their prestigious Communications in Computer and Information Science (CCIS) series, which is abstracted/indexed in Scopus, Mathematical Reviews, DBLP, Google Scholar, EI-Compendex, SCImago.
Accepted Papers
- Design and Implementation of a Cybersecurity-Enhanced In Four-Channel EEG Monitoring System Using Eight Electrodes: Suraj S. Jadhav, Chaitanya N. Kadadas, Raviranjan Kumar, Shreenivas G. Margamwar, Shubhashri G. Joshi, Jayaraj U. Kidav
- Review on the Implications of crystals Kyber in LTE networks: Divyaansh Agarwal, Rajakumar Arul, Kalaipriyan Thirugnanasambandam
- Scalable Dual-Stage Design for Robust Security in WSNs: Jhanvi Arora, Surjit Singh, Jolly Puri
- Dynamic and Adaptive Broadcast Encryption for VANETs Supporting Inclusive-Exclusive Properties: Kamalesh Acharya, Amit Kumar Singh, Ekant Kumar Buda, Anwesh Mishra
- Some Properties of Higher Order Mersenne and Gaussian Higher Order Mersenne Polynomials: Rabiranjan Mohanta, Kamalesh Acharya
- Privacy-Preserving Auditable Authentication Scheme for Vehicular Ad-hoc Networks: J Dharani, K Sundarakantham, D Nagendra Kumar, Kunwar Singh
- Fortifying Security: Towards Strong Active Outsider-Resilient CRT-Based Group Key Management: Purushothama B R, Gaurav Pareek
- Simulating Multi-Agent Reasoning for Diverse and Adaptive Career Strategies: A Review: Moh. Toheed, Anshika Singh, Rashmi Rathi Upadhyay, Kanika Singla
- SMART DETECTION OF INDIAN COUNTERFEIT CURRENCY NOTES USING DEEP LEARNING TECHNIQUES: Laavanya Mohan, Visali Janga, Sai Vinay Chode, Vijayaraghavan Veeramani
- Enhancing Privacy in Distributed Systems with Laplace Quantization Mechanism: Kalidindi Pavan Teja Satya Varma, G. Balasaisrujankumarrao, Nagesh Bhattu Srist
- A Lightweight Intrusion Detection Framework for IoT Using Fisher Score Feature Filtering and ML Models: Bhagyasri Bora, Dharitri Brahma, Amitava Nag
- A Quorum-based Privacy-Preserving Distributed Learning Framework for Anomaly Detection: Pranav P S S, Parth Nagar, Ankit Kumar Singh, M S Srinath
- Hybrid DCGAN-ResNet50 model for Fake Face Detection: Venkata Madhu Soumya Bapatla, Shashi Mogalla
- Encrypted training using logistic regression with different polynomial approximations of sigmoid function: Anushka Tushar Seth, Shubhangi Gawali, Amy Corman, Neena Goveas, Asha Rao

