Conference Information
ACNS 2026: International Conference on Applied Cryptography and Network Security
https://acns2026.github.io/Submission Date: |
2026-01-23 |
Notification Date: |
2026-03-19 |
Conference Date: |
2026-06-22 |
Location: |
New York City, New York, USA |
Years: |
24 |
CCF: c CORE: b QUALIS: b1 Viewed: 75089 Tracked: 128 Attend: 15
Call For Papers
Papers on all technical aspects of information security and privacy are solicited for submission. Areas of interest include, but are not limited to the following topics
Core Cryptography and Fundamentals
This category includes foundational cryptographic concepts and methods. It's the bedrock of security research.
Applied cryptography
Cryptanalysis
Cryptographic primitives and protocols
Lightweight cryptography
Post-quantum security
AI, Machine Learning, and Security
This is a rapidly growing area that deserves its own section to highlight both the use of AI in security and the security of AI systems themselves.
Artificial Intelligence (AI) for security
Automated security analysis
Security and privacy of systems based on ML and AI
Security of ML
Security using ML
Game-theoretic analysis of secure systems
Systems, Network, and Application Security
This section focuses on the practical security of systems, from hardware to software and networks.
Authentication, biometric security and privacy
Cloud security and privacy
Critical infrastructure security and privacy
Email, app, and web security and privacy
Hardware Security
Identity management
Internet-of-Things security and privacy
Mobile and wireless security
Network security protocols
Secure distributed computing and consensus protocols
Systems security and privacy
Trust management and trustworthy computing in networks or systems
Privacy and Data Protection
Given the increasing importance of data privacy, this category groups topics dedicated to protecting user data and anonymity.
Data protection
Metadata privacy and censorship resistance
Privacy-enhancing technologies
Usable security and privacy
Blockchain security and privacy
Security Attacks, Threats, and Analysis
This category includes research on new attack vectors, malicious software, and methods for analyzing security vulnerabilities.
Internet fraud and cybercrime
Malicious code and unsolicited software
Side-channel analysis and physical attacks
Emerging and Special Topics
This section can be a catch-all for topics that are either highly specialized or represent new, forward-looking areas of research.
Future Internet security and privacy
Secure electronic voting
Security and privacy metrics
Last updated by Dou Sun in 2025-09-13
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2021 | 186 | 37 | 19.9% |
| 2017 | 149 | 34 | 22.8% |
| 2016 | 183 | 35 | 19.1% |
| 2015 | 157 | 33 | 21% |
| 2014 | 147 | 33 | 22.4% |
| 2013 | 150 | 35 | 23.3% |
| 2012 | 192 | 33 | 17.2% |
| 2011 | 172 | 31 | 18% |
| 2010 | 178 | 32 | 18% |
| 2009 | 150 | 32 | 21.3% |
| 2008 | 131 | 30 | 22.9% |
| 2007 | 260 | 31 | 11.9% |
| 2006 | 218 | 33 | 15.1% |
| 2005 | 158 | 35 | 22.2% |
| 2004 | 297 | 36 | 12.1% |
| 2003 | 191 | 32 | 16.8% |
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Applied Surface Science | 6.9 | Elsevier | 0169-4332 | |
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Ad Hoc Networks | 4.8 | Elsevier | 1570-8705 |
| Applied Ontology | 3.5 | IOS Press | 1570-5838 | |
| c | Peer-to-Peer Networking and Applications | 2.6 | Springer | 1936-6442 |
| Journal of Cryptographic Engineering | 1.4 | Springer | 2190-8508 | |
| b | Designs, Codes and Cryptography | 1.400 | Springer | 0925-1022 |
| Cryptography and Communications | 1.200 | Springer | 1936-2447 | |
| Optical Memory and Neural Networks | 1.000 | Springer | 1060-992X | |
| Applied Categorical Structures | 0.600 | Springer | 0927-2852 |