Journal Information
IEEE Security & Privacy
Impact Factor:
Call For Papers
IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community — ranging from academic researchers to industry practitioners.IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership.All submissions in the magazine’s scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.Articles that report the latest advances in research, particularly those that address a narrow technical area and those that lack content reporting results of experimental validation or deployment of new methods or technologies, are generally not suitable for publication in IEEE Security & Privacy. Authors of such works are advised to submit them to research conferences and journals with the appropriate scope. IEEE Transactions on Reliability or IEEE Transactions on Secure and Dependable Systems, for example, might provide appropriate venues for some such submissions.S&P is copublished by the IEEE Computer Society and the IEEE Reliability Society. Technical cosponsors are the IEEE Signal Processing Society and IEEE Engineering in Medicine & Biology Society.S&P accepts commercial and classified advertisements.
Last updated by Dou Sun in 2021-05-02
Special Issues
Special Issue on Real-World Security Protocols
Submission Date: 2024-04-12

Security protocols underpin many of our digital activities, such as logging on to a Wi-Fi hotspot, accessing an HTTPS website, monitoring a home IoT network, and making electronic payments. A security protocol utilises cryptographic primitives and protocols as building blocks, but also includes users and computers connected through distributed networks where messages may be intercepted and modified. Designing and deploying security protocols is a difficult task, with errors occurring at nearly every step of the software and hardware development lifecycle. Flaws are routinely found on well-known, peer-reviewed, and even standardized protocols. Implementations and deployments sometimes diverge from formally analyzed protocols, either through misunderstandings in the protocol itself, failures to replicate the necessary assumptions made in the analysis, or deviations made in the name of improved efficiency or performance. Usability issues sometimes block or impede the successful deployment of a protocol or yield otherwise negative effects for end users. Over the past several decades, many security protocols have been proposed though not all have made it to production. What are the main considerations for a security protocol to be deployable in the real world? What are the useful lessons that we can learn from the practical deployments of those protocols? What can be done to improve the process by which security protocols are specified, analyzed, implemented, and eventually deployed? This special issue is dedicated to real-world security protocols. Topics include but are not limited to: - Case studies of real-world deployments of security protocols (e.g., SSL/TLS, SSH, Wi-Fi WPA, Bluetooth, EMV, e-voting, e-auction, privacy-enhancing technologies, and multi-party computation) - Implementation challenges (e.g., side-channel attacks) and the common pitfalls - Standardization of security protocols, the challenges and the lessons - Human factors (e.g., usability) and their impact on the practical use of a security protocol - Security proofs, the assurance, limitations and how the security proofs (and the underlying assumptions) stand up to the test in real-world applications - Aspects of efficiency (e.g., rounds, computation, and bandwidth), their relevance to the real-world adoption of a protocol, and how over-optimization might cause failure 图片
Last updated by Dou Sun in 2023-11-11
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICICN'International Conference on Information, Communication and Networks2023-07-052023-07-252023-08-17
BIOSEInternational Conference on Bioscience & Engineering2023-07-292023-08-052022-06-25
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2020-10-162020-11-022021-01-09
HealthSecUSENIX Workshop on Health Security and Privacy 2012-05-222012-08-06
IMSMInternational Conference on Industrial Manufacturing and Structural Materials2024-01-19 2024-03-15
WUWNetACM International Conference on Underwater Networks & Systems2023-08-152023-09-152023-11-24
AIPR'Applied Imagery Pattern Recognition2021-08-15 2021-10-12
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
ICEMAInternational Conference on Energy Materials and Applications2022-02-102022-03-012022-05-05