Conference Information
NSPW 2026: New Security Paradigms Workshop
Please Login to view website of conference
Submission Date: |
2026-04-30 |
Notification Date: |
2026-06-30 |
Conference Date: |
2026-09-27 |
Location: |
Victoria, British Columbia, Canada |
Years: |
17 |
CCF: c CORE: c Viewed: 28132 Tracked: 38 Attend: 5
Call For Papers
NSPW 2026 invites three types of submissions:
Regular submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus.
Theme Submissions are focused on “The End of Security?” and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission.
Implementation Submissions explore implementing previous NSPW submissions. Historic NSPW submissions often propose new paradigms but do not extend to implementation. These submissions should clearly cite which previous work(s) is being referenced and how the current submission extends beyond the original scope. Original authors may be involved or not; if not, they will be offered the chance to comment on the submission.
NSPW has an optional theme each year to encourage submissions in specific areas of interest or importance. The theme for NSPW 2026 is The End of Security?.
Relevant topics for this theme include:
Legacy technology, out of service devices and IoT
Support and end of support lifecycles
Negotiations of security and usability, security and cost, security and other values
Goals, measures and cut-off points for security work (when is it enough? Will security ever end?)
Risk Management
Threat modelling and preparedness
Detection and non-detection of incidents, incident response and forensics (What can (not) be detected in formal testing, verification and auditing?)
Science studies of security research beyond fixing and solutionism
Securitization and conflicting values and practices
The consequences of the end of security
Mundane security work, the acceptance of insecurity, insecurity as normal
AI supported attacks vectors, the role of AI in the end of security
New paradigms for security beyond assurance, control and solutions
Other interpretations of The End of Security? are welcome.
Regular submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus.
Theme Submissions are focused on “The End of Security?” and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission.
Implementation Submissions explore implementing previous NSPW submissions. Historic NSPW submissions often propose new paradigms but do not extend to implementation. These submissions should clearly cite which previous work(s) is being referenced and how the current submission extends beyond the original scope. Original authors may be involved or not; if not, they will be offered the chance to comment on the submission.
NSPW has an optional theme each year to encourage submissions in specific areas of interest or importance. The theme for NSPW 2026 is The End of Security?.
Relevant topics for this theme include:
Legacy technology, out of service devices and IoT
Support and end of support lifecycles
Negotiations of security and usability, security and cost, security and other values
Goals, measures and cut-off points for security work (when is it enough? Will security ever end?)
Risk Management
Threat modelling and preparedness
Detection and non-detection of incidents, incident response and forensics (What can (not) be detected in formal testing, verification and auditing?)
Science studies of security research beyond fixing and solutionism
Securitization and conflicting values and practices
The consequences of the end of security
Mundane security work, the acceptance of insecurity, insecurity as normal
AI supported attacks vectors, the role of AI in the end of security
New paradigms for security beyond assurance, control and solutions
Other interpretations of The End of Security? are welcome.
Last updated by Dou Sun in 2026-03-11
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | a | a1 | ACSAC | Annual Computer Security Applications Conference | 2026-05-30 | 2026-09-03 | 2026-12-07 |
| c | c | NSPW | New Security Paradigms Workshop | 2026-04-30 | 2026-06-30 | 2026-09-27 | |
| c | b2 | PST | International Conference on Privacy, Security and Trust | 2026-04-10 | 2026-06-01 | 2026-08-26 | |
| a | a* | a1 | Security | USENIX Security Symposium | 2026-01-29 | 2026-08-12 | |
| b | a | CSF | IEEE Computer Security Foundations Symposium | 2026-01-29 | 2026-04-01 | 2026-07-26 | |
| c | EuroS&P | IEEE European Symposium on Security and Privacy | 2025-11-13 | 2026-03-05 | 2026-07-06 | ||
| a | a* | S&P | IEEE Symposium on Security and Privacy | 2025-11-13 | 2026-03-19 | 2026-05-18 | |
| c | CRiSIS | International Conference on Risks and Security of Internet and Systems | 2024-09-09 | 2024-10-08 | 2024-11-26 | ||
| b | NSS | International Conference on Network and System Security | 2023-03-03 | 2023-05-05 | 2023-08-14 | ||
| b | IWSEC | International Workshop on Security | 2019-04-02 | 2019-05-27 | 2019-08-28 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| b | Computers & Security | 5.4 | Elsevier | 0167-4048 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| Computer Law & Security Review | 3.2 | Elsevier | 0267-3649 | |
| c | Computer Law and Security Review | 3.2 | Elsevier | 0267-3649 |
| c | Journal of Cybersecurity | 3.2 | Oxford University Press | 2057-2093 |
| IEEE Security & Privacy | 3.0 | IEEE | 1540-7993 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| Security and Privacy | 1.500 | John Wiley & Sons Ltd | 2475-6725 | |
| Journal of Heuristics | 1.100 | Springer | 1381-1231 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |