Call for Papers
Original papers offering novel research contributions on all aspects of Security and Privacy are solicited
for submission to ICSP 2026. Areas of interest include, but are not limited to:
- Cryptographic theory and applications
- Secure cryptographic protocols
- Post-quantum cryptography
- Quantum cryptography
- Leakage-resilient cryptography
- Blockchain technologies and cryptocurrency security
- Internet of Things (IoT) security and privacy
- Security and privacy of Big Data
- Cloud security and edge computing security
- Privacy-preserving cryptographic techniques
- Biometric security and authentication mechanisms
- Access control and identity management
- Steganography and steganalysis
- Cyber-physical systems security
- Embedded systems security
- Lightweight security solutions
- Wireless security and secure communication protocols
- Applications of machine learning in cybersecurity
- Artificial intelligence for security and privacy
- Verification and analysis of security protocols
- Distributed systems security
- Social network security, privacy, and trust
- Cyber-physical security in critical infrastructures
- Database security and access control
Instructions:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a
journal or any other conference/workshop that has proceedings. All submissions should start with a title,
an abstract and keywords, but must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).
Length of the submission should not exceed 16 pages including the bibliography and well-marked appendices, and supplementary material,
and using at least 10 point fonts and reasonable margins.
Submissions must be prepared in CCIS templates
and submitted electronically in PDF format.
It is strongly recommended that submissions are processed in LaTeX. Authors are advised to check the plagiarism of their manuscripts before submission.
It should not exceed 20%. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Submission of manuscripts does not guarantee acceptance. It will be decided by the Editors, Reviewers and the Organizing Committee.
Please note that at least one author of each accepted paper should register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.
Conference Proceedings will be published by Springer in the Communications in Computer and Information Science series.
CCIS Template: click here.
WHERE TO SUBMIT?
Please submit full length paper on Microsoft CMT using the following link: click here .
HOW TO SUBMIT?
Please follow the following link for :
click here *.
*Note that submissions must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).
Proceedings 
Peer reviewed and selected accepted papers of the conference will be published as proceedings with Springer in their prestigious Communications in Computer and Information Science (CCIS) series, which is abstracted/indexed in Scopus, Mathematical Reviews, DBLP, Google Scholar, EI-Compendex, SCImago.
