Journal Information
IEEE Security & Privacy
https://www.computer.org/csdl/magazine/spImpact Factor: |
2.04 |
Publisher: |
IEEE |
ISSN: |
1540-7993 |
Viewed: |
19392 |
Tracked: |
39 |
Call For Papers
IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community — ranging from academic researchers to industry practitioners.IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership.All submissions in the magazine’s scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.Articles that report the latest advances in research, particularly those that address a narrow technical area and those that lack content reporting results of experimental validation or deployment of new methods or technologies, are generally not suitable for publication in IEEE Security & Privacy. Authors of such works are advised to submit them to research conferences and journals with the appropriate scope. IEEE Transactions on Reliability or IEEE Transactions on Secure and Dependable Systems, for example, might provide appropriate venues for some such submissions.S&P is copublished by the IEEE Computer Society and the IEEE Reliability Society. Technical cosponsors are the IEEE Signal Processing Society and IEEE Engineering in Medicine & Biology Society.S&P accepts commercial and classified advertisements.
Last updated by Dou Sun in 2021-05-02
Special Issues
Special Issue on Real-World Security ProtocolsSubmission Date: 2024-04-12Security protocols underpin many of our digital activities, such as logging on to a Wi-Fi hotspot, accessing an HTTPS website, monitoring a home IoT network, and making electronic payments. A security protocol utilises cryptographic primitives and protocols as building blocks, but also includes users and computers connected through distributed networks where messages may be intercepted and modified. Designing and deploying security protocols is a difficult task, with errors occurring at nearly every step of the software and hardware development lifecycle. Flaws are routinely found on well-known, peer-reviewed, and even standardized protocols. Implementations and deployments sometimes diverge from formally analyzed protocols, either through misunderstandings in the protocol itself, failures to replicate the necessary assumptions made in the analysis, or deviations made in the name of improved efficiency or performance. Usability issues sometimes block or impede the successful deployment of a protocol or yield otherwise negative effects for end users. Over the past several decades, many security protocols have been proposed though not all have made it to production. What are the main considerations for a security protocol to be deployable in the real world? What are the useful lessons that we can learn from the practical deployments of those protocols? What can be done to improve the process by which security protocols are specified, analyzed, implemented, and eventually deployed? This special issue is dedicated to real-world security protocols. Topics include but are not limited to: - Case studies of real-world deployments of security protocols (e.g., SSL/TLS, SSH, Wi-Fi WPA, Bluetooth, EMV, e-voting, e-auction, privacy-enhancing technologies, and multi-party computation) - Implementation challenges (e.g., side-channel attacks) and the common pitfalls - Standardization of security protocols, the challenges and the lessons - Human factors (e.g., usability) and their impact on the practical use of a security protocol - Security proofs, the assurance, limitations and how the security proofs (and the underlying assumptions) stand up to the test in real-world applications - Aspects of efficiency (e.g., rounds, computation, and bandwidth), their relevance to the real-world adoption of a protocol, and how over-optimization might cause failure 图片
Last updated by Dou Sun in 2023-11-11
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
c | Journal of Electronic Testing: Theory and Applications | 0.554 | Springer | 0923-8174 |
Electricity | MDPI | 2673-4826 | ||
c | International Journal of Information Security and Privacy | Idea Group Inc | 1930-1650 | |
Scalable Computing | Springer | 2194-6876 | ||
International Journal of Security, Privacy and Trust Management | AIRCC | 2319-4103 | ||
International Journal of Data Mining, Modelling and Management | Inderscience | 1759-1163 | ||
Journal of Heuristics | 1.682 | Springer | 1381-1231 | |
International Journal of Cyber-Security and Digital Forensics | SDIWC | 2305-0012 | ||
Infosecurity | Elsevier | 1754-4548 | ||
Cryptography | MDPI | 2410-387X |
Full Name | Impact Factor | Publisher |
---|---|---|
Journal of Electronic Testing: Theory and Applications | 0.554 | Springer |
Electricity | MDPI | |
International Journal of Information Security and Privacy | Idea Group Inc | |
Scalable Computing | Springer | |
International Journal of Security, Privacy and Trust Management | AIRCC | |
International Journal of Data Mining, Modelling and Management | Inderscience | |
Journal of Heuristics | 1.682 | Springer |
International Journal of Cyber-Security and Digital Forensics | SDIWC | |
Infosecurity | Elsevier | |
Cryptography | MDPI |
Related Conferences
CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
---|---|---|---|---|---|---|---|
ICICN' | International Conference on Information, Communication and Networks | 2023-07-05 | 2023-07-25 | 2023-08-17 | |||
BIOSE | International Conference on Bioscience & Engineering | 2023-07-29 | 2023-08-05 | 2022-06-25 | |||
ICAN | International Conference on Computing, Analytics and Networks | 2019-10-05 | 2019-11-15 | 2020-02-07 | |||
RoboCom | International Workshop on Communication and Networking for Swarms Robotics | 2020-10-16 | 2020-11-02 | 2021-01-09 | |||
HealthSec | USENIX Workshop on Health Security and Privacy | 2012-05-22 | 2012-08-06 | ||||
IMSM | International Conference on Industrial Manufacturing and Structural Materials | 2024-01-19 | 2024-03-15 | ||||
WUWNet | ACM International Conference on Underwater Networks & Systems | 2023-08-15 | 2023-09-15 | 2023-11-24 | |||
AIPR' | Applied Imagery Pattern Recognition | 2021-08-15 | 2021-10-12 | ||||
b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 | ||
ICEMA | International Conference on Energy Materials and Applications | 2022-02-10 | 2022-03-01 | 2022-05-05 |
Short | Full Name | Submission | Conference |
---|---|---|---|
ICICN' | International Conference on Information, Communication and Networks | 2023-07-05 | 2023-08-17 |
BIOSE | International Conference on Bioscience & Engineering | 2023-07-29 | 2022-06-25 |
ICAN | International Conference on Computing, Analytics and Networks | 2019-10-05 | 2020-02-07 |
RoboCom | International Workshop on Communication and Networking for Swarms Robotics | 2020-10-16 | 2021-01-09 |
HealthSec | USENIX Workshop on Health Security and Privacy | 2012-08-06 | |
IMSM | International Conference on Industrial Manufacturing and Structural Materials | 2024-01-19 | 2024-03-15 |
WUWNet | ACM International Conference on Underwater Networks & Systems | 2023-08-15 | 2023-11-24 |
AIPR' | Applied Imagery Pattern Recognition | 2021-08-15 | 2021-10-12 |
IWSEC | International Workshop on Security | 2019-04-02 | 2019-08-28 |
ICEMA | International Conference on Energy Materials and Applications | 2022-02-10 | 2022-05-05 |
Recommendation