Submission Guidelines
Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2026 conference. SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new, comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths. We also encourage the submission of vision papers related to security standardization. The vision track is intended to report on work in progress or concrete ideas for work that has yet to begin. The focus in the vision track is to spark discussion, to provide authors with helpful feedback, pointers to potentially related investigations, and new ideas to explore. Suitable submissions to the vision track include traditional work-in-progress pieces, such as preliminary results of pre-studies, as well as research proposals and position papers outlining future research.
List of Topics
Papers may present theory, applications, or practical experience in the field of security standardisation, including, but not necessarily limited to:
List of Topics | ||
---|---|---|
Access Control | Biometrics | Cloud Computing |
Critical National Infrastructure Protection | Standards, Consistency & Comparison | Critiques Of Standards |
Cryptanalysis | Cryptographic Protocols | Cryptographic Techniques |
Evaluation Criteria | Formal Analysis of Standards | History of Standardization |
Identity Management | Industrial Control Systems Security | Internet Security |
Interoperability of Standards | Intrusion Detection | Key Management and PKIs |
Standardisation Process Management | Mobile Security | Network Security |
Open Standards and Open Source | Payment System Security | Privacy |
Regional and International Standards | RFID Tag Security | Risk Analysis |
Protocol Analysis | Security Controls & Management | Security Protocols |
Security Services | Security Tokens | Smart Cards |
Telecommunications Security | Trusted Computing | Web Security |
Blockchain | Internet of Things | Data Protection Law and Regulations |
Submitted papers must be original, unpublished, anonymous, and not submitted to journals or other conferences/workshops that have proceedings. Submissions must be written in English and should be at most 23 pages in the Springer LCNS format, including references, but not counting appendices. Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Papers not meeting these guidelines risk rejection without consideration. All submitted papers will be reviewed by at least three members of the program committee. Authors submitting a systematisation of knowledge paper should have a title starting with “SoK: ”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria. Vision papers should be marked as such upon submission. Accepted papers will be published via Springer’s Lecture Notes in Computer Science (LNCS). Authors of accepted papers must complete and sign a Consent-to-Publish form. At least one author of each accepted paper must register for the conference.
Submission Server
The submission server is open and can be accessed here. The submission server closes 15 September 2026 (Tuesday), Anywhere on Earth (AoE = UTC-12h).