Conference Information
NSPW 2026: New Security Paradigms Workshop
Please Login to view website of conference

Submission Date:
2026-04-30
Notification Date:
2026-06-30
Conference Date:
2026-09-27
Location:
Victoria, British Columbia, Canada
Years:
17
CCF: c   CORE: c   Viewed: 28132   Tracked: 38   Attend: 5

Call For Papers
NSPW 2026 invites three types of submissions:

Regular submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus.
Theme Submissions are focused on “The End of Security?” and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission.
Implementation Submissions explore implementing previous NSPW submissions. Historic NSPW submissions often propose new paradigms but do not extend to implementation. These submissions should clearly cite which previous work(s) is being referenced and how the current submission extends beyond the original scope. Original authors may be involved or not; if not, they will be offered the chance to comment on the submission.

NSPW has an optional theme each year to encourage submissions in specific areas of interest or importance. The theme for NSPW 2026 is The End of Security?.

Relevant topics for this theme include:

Legacy technology, out of service devices and IoT
Support and end of support lifecycles
Negotiations of security and usability, security and cost, security and other values
Goals, measures and cut-off points for security work (when is it enough? Will security ever end?)
Risk Management
Threat modelling and preparedness
Detection and non-detection of incidents, incident response and forensics (What can (not) be detected in formal testing, verification and auditing?)
Science studies of security research beyond fixing and solutionism
Securitization and conflicting values and practices
The consequences of the end of security
Mundane security work, the acceptance of insecurity, insecurity as normal
AI supported attacks vectors, the role of AI in the end of security
New paradigms for security beyond assurance, control and solutions

Other interpretations of The End of Security? are welcome.
Last updated by Dou Sun in 2026-03-11
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
baa1ACSACAnnual Computer Security Applications Conference 2026-05-302026-09-032026-12-07
ccNSPWNew Security Paradigms Workshop2026-04-302026-06-302026-09-27
cb2PSTInternational Conference on Privacy, Security and Trust2026-04-102026-06-012026-08-26
aa*a1SecurityUSENIX Security Symposium2026-01-292026-08-12
baCSFIEEE Computer Security Foundations Symposium2026-01-292026-04-012026-07-26
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
cCRiSISInternational Conference on Risks and Security of Internet and Systems2024-09-092024-10-082024-11-26
bNSSInternational Conference on Network and System Security2023-03-032023-05-052023-08-14
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
Related Journals
CCFFull NameImpact FactorPublisherISSN
bComputers & Security5.4Elsevier0167-4048
cJournal of Information Security and Applications3.7Elsevier2214-2126
Computer Law & Security Review3.2Elsevier0267-3649
cComputer Law and Security Review3.2Elsevier0267-3649
cJournal of Cybersecurity3.2Oxford University Press2057-2093
IEEE Security & Privacy3.0IEEE1540-7993
ACM Transactions on Privacy and Security2.8ACM2471-2566
Security and Privacy1.500John Wiley & Sons Ltd2475-6725
Journal of Heuristics1.100Springer1381-1231
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650