Call for papers
We are looking for papers discussing industrial research and development, focusing on original, high quality, unpublished research and implementation experiences. The Symposium will start on October 4, 2021 with a technical program, including vetted papers, invited talks, poster and panel discussions as well as collocated workshops.
Download the ESORICS 2021 Call for Papers here.
|Winter cycle||Spring cycle|
|Title and abstract:||January 05, 2021 (hard)||May 05, 2021|
|Full paper submission:||January 12, 2021 (hard)||May 12, 2021|
|Early reject notification:||February 21, 2021||June 21, 2021|
|Authors responses due:||February 25, 2021||June 25, 2021|
|Notification to authors:||March 12, 2021||July 12, 2021|
|Camera ready due:||April 12, 2021||August 12, 2021|
You will need to submit your title and abstract by 11:59 pm, Berlin, Germany Time, on the day of the corresponding deadline through the Symposium‘s EasyChair websites by following instructions on how to make a submission.
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference / workshop with proceedings. The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS).
In addition, the Journal of Computer Security will publish a special issue containing selected papers from the ESORICS 2021 proceedings. As in previous years, ESORICS 2021 will present a Best Paper Award chosen by the Program Committee. This award is generously sponsored by Springer.
How to submit your paper
Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.
Submissions must be uploaded to the following EasyChair website:
Only pdf files will be accepted. Submissions are not anonymous.
Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must agree with Springer LNCS copyright and guarantee that their papers will be presented at the conference.
Review process - revised submissions
This year’s symposium will have two review cycles. Within 1.5 month of submission, author notifications of Accept/Revise/Reject decisions will be sent out.
For each submission, one of the following decisions will be made:
- Accept: Papers in this category will be accepted for publication in the proceedings and presentation at the conference, possibly after making minor changes with the oversight of a shepherd.
- Revise: A limited number of papers will be invited to submit a revision; such papers are considered to be promising but need additional work (e.g., new experiments, proofs, or implementations). Authors will receive a specific set of expectations to be met by their revisions. Authors can resubmit such papers, with appropriate revisions, to the spring submission deadline. In revised submissions, the authors should clearly explain in a well-marked appendix how the revisions address the comments of the reviewers. The revised paper will then be re-evaluated, and either accepted or rejected.
- Reject: Papers in this category are declined for inclusion in the conference. Papers rejected from the first review cycle may not be submitted again (even in revised form) to the second review cycle. A paper will be judged to be a resubmit (as opposed to a new submission) if the paper is from the same or similar authors, and there is more than 40% overlap between the original submission and the new paper, it will be considered a resubmission.
(Drawn from the IEEE S&P 2021 and the ACM CCS 2020 CFP)
- Access control
- Anonymity and censorship resistance
- Applied cryptography
- Artificial intelligence for security
- Audit and accountability
- Authentication and biometrics
- Blockchains and distributed ledger security
- Data and computation integrity
- Database security
- Digital content protection
- Digital forensics
- Formal methods for security and privacy
- Hardware security
- Information hiding
- Identity management
- Information flow control
- Information security governance and management
- Intrusion detection
- Language-based security
- Malware and unwanted software
- Network security
- Phishing and spam prevention
- Privacy technologies and mechanisms
- Risk analysis and management
- Secure electronic voting
- Security for artificial intelligence
- Security economics and metrics
- Security and privacy in cloud systems
- Security and privacy in crowdsourcing
- Security and privacy in 'internet of things' and cyber-physical systems
- Security and privacy in location services
- Security and privacy in mobile computing
- Security and privacy in social networks
- Security and privacy in wireless and cellular communications
- Security, privacy and resilience in critical infrastructures
- Software security
- Systems security
- Trusted computing
- Usable security and privacy
- Web security