Call for Papers
Original papers offering novel research contributions on all aspects of Security and Privacy are solicited for submission to ICSP 2025. Areas of interest include, but are not limited to:
- Cryptography
- Secure cryptographic protocols
- Post-quantum cryptography
- Quantum cryptography
- Blockchain and Cryptocurrency
- IoT security and privacy
- Cloud security
- Privacy-preserving technologies
- Biometric Security
- Security and privacy of Big Data
- Cloud and edge computing security
- Access control
- Steganography and steganalysis
- Leakage-resilient cryptography
- Cyber-physical security
- Database security
- Embedded systems security
- Lightweight security
- Authentication and authorization
- Social networks security, privacy and trust
- Wireless security
- Distributed systems security
- Cyber-physical systems security
- Verification of security protocols
- Machine Learning in Cybersecurity
- Artificial Intelligence
Instructions:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a
journal or any other conference/workshop that has proceedings. All submissions should start with a title,
an abstract and keywords, but must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).
Length of the submission should not exceed 16 pages including the bibliography and well-marked appendices, and supplementary material,
and using at least 10 point fonts and reasonable margins.
Submissions must be prepared in CCIS templates
and submitted electronically in PDF format. Details on the
CCIS templates can be found here.
It is strongly recommended that submissions are processed in LaTeX. Authors are advised to check the plagiarism of their manuscripts before submission.
It should not exceed 20%. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Submission of manuscripts does not guarantee acceptance. It will be decided by the Editors, Reviewers and the Organizing Committee.
Please note that at least one author of each accepted paper should register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
CCIS Template: click here.
WHERE TO SUBMIT?
Please submit full length paper on Microsoft CMT using the following link: click here .
HOW TO SUBMIT?
Please follow the following link:
click here *.
*Note that submissions must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).