• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Call for Papers: Special Issue on Real-World Security Protocols

IEEE Security & Privacy seeks submissions for this upcoming special issue.

Important Dates

  • Articles due to ScholarOne: 12 April 2024 
  • Publication date: November/December 2024


Security protocols underpin many of our digital activities, such as logging on to a Wi-Fi hotspot, accessing an HTTPS website, monitoring a home IoT network, and making electronic payments. A security protocol utilises cryptographic primitives and protocols as building blocks, but also includes users and computers connected through distributed networks where messages may be intercepted and modified.

Designing and deploying security protocols is a difficult task, with errors occurring at nearly every step of the software and hardware development lifecycle. Flaws are routinely found on well-known, peer-reviewed, and even standardized protocols. Implementations and deployments sometimes diverge from formally analyzed protocols, either through misunderstandings in the protocol itself, failures to replicate the necessary assumptions made in the analysis, or deviations made in the name of improved efficiency or performance. Usability issues sometimes block or impede the successful deployment of a protocol or yield otherwise negative effects for end users.

Over the past several decades, many security protocols have been proposed though not all have made it to production. What are the main considerations for a security protocol to be deployable in the real world? What are the useful lessons that we can learn from the practical deployments of those protocols? What can be done to improve the process by which security protocols are specified, analyzed, implemented, and eventually deployed?

This special issue is dedicated to real-world security protocols. Topics include but are not limited to:

  • Case studies of real-world deployments of security protocols (e.g., SSL/TLS, SSH, Wi-Fi WPA, Bluetooth, EMV, e-voting, e-auction, privacy-enhancing technologies, and multi-party computation)
  • Implementation challenges (e.g., side-channel attacks) and the common pitfalls
  • Standardization of security protocols, the challenges and the lessons
  • Human factors (e.g., usability) and their impact on the practical use of a security protocol
  • Security proofs, the assurance, limitations and how the security proofs (and the underlying assumptions) stand up to the test in real-world applications
  • Aspects of efficiency (e.g., rounds, computation, and bandwidth), their relevance to the real-world adoption of a protocol, and how over-optimization might cause failure


Submission Guidelines

For author information and submission criteria for full-papers, please visit the Author Information page. As stated there, full papers should be 4900 – 7200 words in length, with a maximum of 15 references. Please submit full papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere.


Questions?

Contact the guest editors at sp6-24@computer.org.

  • Feng Hao, University of Warwick, UK
  • Christopher Wood, Cloudflare, USA

LATEST NEWS
Episode 4 | Inside IEEE Leadership
Episode 4 | Inside IEEE Leadership
Generative AI as a Tool for Revolution of AI-Powered Healthcare App: Theory, Design, and Cognitive Impact Assessment
Generative AI as a Tool for Revolution of AI-Powered Healthcare App: Theory, Design, and Cognitive Impact Assessment
Computing’s Top 30: Li Yang
Computing’s Top 30: Li Yang
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Read Next

Episode 4 | Inside IEEE Leadership

Generative AI as a Tool for Revolution of AI-Powered Healthcare App: Theory, Design, and Cognitive Impact Assessment

Computing’s Top 30: Li Yang

Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists

Automating Compliance in Life Sciences for Real-Time Audit Readiness

Computing’s Top 30: Rohan Basu Roy

Episode 3 | How IEEE Can Support and Enhance Academia

Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter