Conference Information
IFIP SEC 2026: IFIP TC-11 International Information Security and Privacy Conference
Please Login to view website of conference
Submission Date: |
2025-12-19 |
Notification Date: |
2026-02-13 |
Conference Date: |
2026-06-09 |
Location: |
Perth, Australia |
Years: |
41 |
Viewed: 15912 Tracked: 3 Attend: 0
Call For Papers
We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in ICT Systems. Practitioners and industry representatives are encouraged to submit papers.
Topics
We welcome contributions within, but not limited to, the following areas:
Access control and authentication
AI for cybersecurity
Applied cryptography
Audit and risk analysis
Big data security and privacy
Cloud security and privacy
Critical infrastructure protection
Cyber-physical systems security
Data and applications security
Digital forensics
Human aspects of security and privacy
Identity management
Industry networks security
Information security education
Information security management
Information technology misuse and the law
IoT security
Managing information security functions
Mobile security
Multilateral security
Network & distributed systems security
Pervasive systems security
Privacy protection and Privacy-by-design
Privacy-enhancing technologies
Quantum computations and post-quantum cryptography
Security and privacy in LLM’s
Side-channel attacks
Surveillance and counter-surveillance
Trust management
Topics
We welcome contributions within, but not limited to, the following areas:
Access control and authentication
AI for cybersecurity
Applied cryptography
Audit and risk analysis
Big data security and privacy
Cloud security and privacy
Critical infrastructure protection
Cyber-physical systems security
Data and applications security
Digital forensics
Human aspects of security and privacy
Identity management
Industry networks security
Information security education
Information security management
Information technology misuse and the law
IoT security
Managing information security functions
Mobile security
Multilateral security
Network & distributed systems security
Pervasive systems security
Privacy protection and Privacy-by-design
Privacy-enhancing technologies
Quantum computations and post-quantum cryptography
Security and privacy in LLM’s
Side-channel attacks
Surveillance and counter-surveillance
Trust management
Last updated by Dou Sun in 2025-07-13
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | Discover Computing | Springer | 2948-2992 |