ESORICS: European Symposium on Research in Computer Security



Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
ESORICS 2024 European Symposium on Research in Computer Security
Sep 16, 2024 - Sep 20, 2024 Bydgoszcz, Poland Jan 8, 2024
ESORICS 2023 European Symposium on Research in Computer Security 2023
Sep 25, 2023 - Sep 29, 2023 The Hague, The Netherlands May 28, 2023
ESORICS 2022 27th European Symposium on Research in Computer Security (ESORICS)
Sep 26, 2022 - Sep 30, 2022 Copenhagen, Denmark May 29, 2022 (May 22, 2022)
ESORICS 2021 European Symposium on Research in Computer Security
Oct 4, 2021 - Oct 8, 2021 Darmstadt, Germany May 5, 2021 (Jan 5, 2021)
ESORICS 2019 The 24th European Symposium on Research in Computer Security
Sep 23, 2019 - Sep 27, 2019 Luxembourg Apr 22, 2019
ESORICS 2018 23rd European Symposium on Research in Computer Security
Sep 3, 2018 - Sep 7, 2018 Barcelona, Spain Apr 18, 2018
ESORICS 2017 Twenty-second European Symposium on Research in Computer Security
Sep 11, 2017 - Sep 15, 2017 Oslo, Norway Apr 19, 2017
ESORICS 2016 European Symposium on Research in Computer Security
Sep 26, 2016 - Sep 30, 2016 Heraklion, Greece Apr 22, 2016
Sep 21, 2015 - Sep 25, 2015 Vienna, Austria Apr 4, 2015
ESORICS 2014 19th European Symposium on Research in Computer Security
Sep 7, 2014 - Sep 11, 2014 Wroclaw, Poland Apr 9, 2014
ESORICS 2013 18th European Symposium on Research in Computer Security
Sep 9, 2013 - Sep 11, 2013 Egham, England Apr 10, 2013 (Mar 31, 2013)
ESORICS 2012 17th European Symposium on Research in Computer Security
Sep 10, 2012 - Sep 12, 2012 Pisa, Italy Apr 10, 2012
ESORICS 2011 European Symposium on Research in Computer Security
Sep 12, 2011 - Sep 14, 2011 Leuven, Belgium Mar 21, 2011
ESORICS 2010 15th European Symposium on Research in Computer Security
Sep 20, 2010 - Sep 22, 2010 Athens, Greece Apr 7, 2010
ESORICS 2009 14th European Symposium on Research in Computer Security
Sep 21, 2009 - Sep 25, 2009 Saint Malo, France Apr 17, 2009
ESORICS 2008 13th European Symposium on Research in Computer Security
Oct 6, 2008 - Oct 8, 2008 Malaga, Spain Mar 31, 2008

Present CFP : 2024

C a l l F o r P a p e r s

29th European Symposium on Research in Computer Security (ESORICS) 2024

16-20 September 2024, Bydgoszcz, Poland


ESORICS is the annual European research event in Computer Security.

The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities.

We are looking for papers with high quality, original and unpublished
research contributions. The Symposium will start on September 16, 2024
with an exciting technical program, including vetted papers, invited
talks and collocated workshops.

Important Dates:

All submissions must be received by 11:59 p.m. any where on earth Time
on the day of the corresponding deadline.

* Title and abstract: April 19, 2024 (firm)
* Full paper submission: April 19, 2024 (firm)
* Notification to authors: June 14, 2024
* Camera ready due: June 28, 2024

Submission Guidelines:

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference / workshop with proceedings. Papers that either lack
originality, clarity in presentation, fall outside the scope of this
call for papers or were already rejected in the first review cycle,
might be rejected without a review. Authors will be promptly informed
in such cases.

Publication Guidelines:

The symposium proceedings will be published by Springer in the Lecture
Notes in Computer Science series (LNCS). In addition, we will publish
a special issue containing selected papers from the ESORICS 2024
proceedings. As in previous years, ESORICS will present a Best Paper
Award chosen by the Program Committee. This award is generously sponsored
by Springer.

How to submit your paper:

Submitted papers must follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions must be uploaded
to the following EasyChair website:

Only pdf files will be accepted. Submissions are not anonymous.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must agree
with Springer LNCS copyright and guarantee that their papers will be
presented at the conference.

Topics of Interests:

Submissions are solicited in all areas relating to computer security,
including but not limited to:

* Access Control
* Anonymity and Censorship Resistance
* Artificial Intelligence for Security
* Audit and Accountability
* Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
* Data and Computation Integrity
* Database Security
* Digital Content Protection
* Digital Forensics
* Formal Methods for Security and Privacy
* Hardware Security
* Information Hiding
* Identity Management
* Information Flow Control
* Information Security
* Intrusion Detection
* Governance and Management
* Language-based Security
* Malware and Unwanted Software
* Network Security
* Phishing and Spam Prevention
* Privacy Technologies and Mechanisms
* Risk Analysis and Management
* Secure Electronic Voting
* Security Economics and Metrics
* Security and Privacy in Cloud / Fog Systems
* Security and Privacy of Systems based on Machine Learning and A.I.
* Security and Privacy in Crowdsourcing
* Security and Privacy in the IoT and Cyber-Physical Systems
* Security and Privacy in Location-based Services
* Security and Privacy for Mobile / Smartphone Platforms
* Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
* Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
* Security and Privacy in Social Networks
* Security and Privacy in Wireless and Cellular Communications
* Software Security
* Systems Security
* Trustworthy Computing to Secure Networks and Systems
* Usable Security and Privacy
* Web Security

Conflict of Interest (CoI):

The program co-chairs require cooperation from both authors and PC
members to prevent submissions from being evaluated by reviewers who
have a conflict of interest. In the one hand, during the bidding
procedure, PC members will be required to indicate potential CoIs. On
the other hand, authors will be asked during the submission process to
indicate any PC members with whom they share CoIs as well as the types
of CoIs. That is, if they and one the authors 1) share an
institutional affiliation at the time of submission; 2) had at any
time in the past a supervisor/PhD student relationship; 3) have
collaborated or published with in the prior two years; 4) are in some
form of financial relationship, or have been at some point during the
past two years; or 5) are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and
explain the perceived conflict.

Program committee members who have conflicts of interest with a paper,
including program co-chairs, will be excluded from discussing and
reviewing the submission. Authors also need to notify the PC Chairs of
any other reason or circumstance that creates a risk that professional
judgement may be unduly influenced.

The chairs reserve the right to request further explanation and can
remove non-mandatory conflicts at their discretion.

Organizing Team

Michal Choras, Bydgoszcz University of Science and Technology
Sokratis Katsikas, Norwegian University of Science and Technology

Joaquin Garcia-Alfaro, Institut Polytechnique de Paris
Rafal Kozik, Bydgoszcz University of Science and Technology

Paria Shirani, University of Ottawa
Wenjuan Li, Hong Kong Polytechnic University

Tomasz Marciniak, Bydgoszcz University of Science and Technology

Marek Pawlicki, Bydgoszcz University of Science and Technology

Michal Grzybowski, Fundacja Pischingera

Aleksandra Pawlicka, University of Warsaw


Full list available at

This call for papers and additional information about the conference
can be found at

Related Resources

CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
Ei/Scopus-ACCMI 2024   2024 2nd Asia Conference on Automation, Cloud Computing and Machine Intelligence (ACCMI 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICMIP 2025   2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
TrustCom 2024   The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications
EDCC 2025   20th European Dependable Computing Conference
ECAI 2024   27th European Conference on Artificial Intelligence