Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

SECRYPT is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

SECRYPT is an annual international conference covering research in information and communication security. The International Conference on Security and Cryptography (SECRYPT) seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and applied cryptography. Note that while applied cryptography papers are welcome, pure cryptography papers are out of scope for the conference. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

CONFERENCE AREAS

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

1. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
2. DISTRIBUTED SYSTEMS AND ARCHITECTURES
3. DATA SECURITY AND PRIVACY
4. SECURITY AND AI/MACHINE LEARNING
5. SECURITY AND PRIVACY IN EMERGING SCENARIOS
6. RISKS, POLICIES AND SOFTWARE SECURITY
7. TRUST MANAGEMENT AND USABILITY


AREA 1: APPLIED CRYPTOGRAPHY AND NETWORK SECURITY


  •  Information Hiding
  • Intrusion Detection & Prevention
  • Network Security
  • Privacy Enhancing Cryptography
  • Security Protocols
  • Sensor and Mobile Ad Hoc Network Security
  • Wireless Network Security

AREA 2: DISTRIBUTED SYSTEMS AND ARCHITECTURES


  • Blockchain security
  • Critical Infrastructure Protection
  • Peer-to-Peer Security
  • Security in Distributed Systems
  • Security Information Systems Architecture

AREA 3: DATA SECURITY AND PRIVACY


  • Access Control
  • Anonymity
  • Biometrics Security and Privacy
  • Database Security and Privacy
  • Data Integrity
  • Ethical and Legal Implications of Security and Privacy
  • Identity Management
  • Personal Data Protection for Information Systems
  • Privacy Enhancing Technologies
  • Security and Privacy Policies

AREA 4: SECURITY AND AI/MACHINE LEARNING


  • Adversarial Machine Learning
  • AI-based Solutions for Security
  • Attacks on Machine Learning
  • Secure Federated Learning
  • Security Vulnerabilities of Large Language Models

AREA 5: SECURITY AND PRIVACY IN EMERGING SCENARIOS


  • Security and Privacy for Big Data
  • Security and Privacy in Crowdsourcing
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-Based Services
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Smart Grids
  • Security and Privacy in Social Networks
  • Security and Privacy in the Cloud

AREA 6: RISKS, POLICIES AND SOFTWARE SECURITY


  • Formal Methods and Security
  • Information Systems Auditing
  • Intellectual Property Protection
  • Insider Threats and Countermeasures
  • Organizational Security Policies
  • Risk Assessment
  • Secure Software Development Methodologies
  • Security Verification and Validation
  • Software Metrics

AREA 7: TRUST MANAGEMENT AND USABILITY


  •  Human factors
  • Reliability and Dependability
  • Security Requirements
  • Security Metrics and Measurement
  • Security usability
  • Trust Management and Reputation Systems

KEYNOTE SPEAKERS

SECRYPT 2026 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.

PAPER SUBMISSION

Authors can submit their work in the form of a complete paper or an abstract, but please note that accepted abstracts are presented but not published in the proceedings of the conference. Complete papers can be submitted as a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas.

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

When submitting a complete paper please note that only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews. Authors should also avoid using an excessive number of self-citations.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted complete papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
The proceedings will be submitted for indexation by SCOPUS, Google Scholar, DBLP, Semantic Scholar, EI and Web of Science / Conference Proceedings Citation Index.

IMPORTANT DATES

Conference Date: 16 - 18 July, 2026

Paper Submission: March 3, 2026
Authors Notification:
April 30, 2026
Camera Ready and Registration:
May 15, 2026

Paper Submission: April 16, 2026
Authors Notification:
May 22, 2026
Camera Ready and Registration:
June 5, 2026

Workshops
Workshop Proposal: March 18, 2026

Special Sessions
Special Session Proposal: March 18, 2026

Tutorials
Tutorial Proposal: June 12, 2026

Demos
Demo Proposal: June 12, 2026

Panels
Panel Proposal: June 12, 2026

Abstracts
Abstract Submission: May 22, 2026
Authors Notification: June 8, 2026
Camera Ready and Registration: June 17, 2026

SECRETARIAT

SECRYPT Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
             2900-616 Setubal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186
e-mail: secrypt.secretariat@insticc.org
Web: https://secrypt.scitevents.org

VENUE

Available soon.

CONFERENCE CHAIR

Pierangela SamaratiUniversità degli Studi di Milano, Italy

PROGRAM CHAIR

Sabrina De Capitani Di VimercatiUniversità degli Studi di Milano, Italy

PROGRAM COMMITTEE MEMBERS

Available soon.

footer