Logo 3

ISEA–ISAP 2026-27

6th ISEA International Conference on Security and Privacy 2026

December 17-19, 2026 | IIT Jammu, India

About The Conference

The 2026 Edition of the ISEA International Conference on Security and Privacy (ISEA–ISAP 2026-27) is hosted by IIT Jammu and is part of the ISEA Phase III initiative by the Ministry of Electronics and Information Technology, Government of India, aimed at promoting awareness, research, and activities in the field of information security and privacy.

Call for Papers

ISEA–ISAP 2026-27 provides an excellent international forum for sharing knowledge and results in theory, methodology, and applications of Security in information and networks. Papers, special sessions, tutorials, and workshops addressing all aspects and issues of information and network security are being pursued.

The conference invites original contributions from researchers and industry professionals working on cryptographic algorithms, security schemes, cryptanalysis, application security, system security, AI security, cloud security, IoT security, and network security. The conference aims to provide a platform for researchers and practitioners from academia and industry to share knowledge and experience on cutting-edge security solutions in the digital era.

Topics of Interest

Submissions are solicited in (but not limited to) the following areas, organized into three main tracks:

Track A: Security Foundations and Cryptography

  • Cryptography and Applied Cryptography
  • Cryptographic Protocols and Formal Security Proofs
  • Post-Quantum and Quantum Cryptography
  • Privacy-Enhancing Technologies (PETs)
  • Secure Multi-Party Computation and Zero-Knowledge Proofs
  • Blockchain and Distributed Ledger Security
  • Differential Privacy and Data Anonymization
  • Trust, Anonymity, and Accountability
  • Game-Theoretic Approaches to Security

Track B: Systems, Network, and Hardware Security

  • Computer and Network Security
  • Systems and Software Security
  • Hardware Security and Trusted Computing
  • Internet of Things Security and Embedded Systems Security
  • Cloud, Edge, and Virtualization Security
  • Cyber-Physical Systems (CPS) and Critical Infrastructure Security
  • Wireless and Mobile Network Security (5G/6G)
  • Malware Analysis and Reverse Engineering
  • Side-Channel Attacks and Countermeasures
  • Secure Protocol Design and Network Defense Mechanisms

Track C: Applied Security, Privacy, and Emerging Technologies

  • Mobile Device Security
  • Cyber Forensics and Digital Investigation
  • Cybersecurity Operations, Governance, Risk, and Compliance
  • Privacy, Data Protection, and Regulatory Frameworks
  • Fintech Security and Blockchain Applications
  • AI/ML Security (Adversarial Learning, Model Security)
  • Threat Intelligence, SOC, and Security Analytics
  • Identity and Access Management, Zero Trust Architectures
  • Human-Centered Security and Usable Security
  • Security in Smart Cities, Healthcare, and e-Governance
  • Cybercrime, Law Enforcement, and Digital Evidence

Submission Types

1. Full Papers: 10-15 pages (including all text, figures, and references)

2. Short Papers: Up to 6 pages (work-in-progress, position papers)

3. Special Sessions, Workshops, Tutorials, and Demos: Proposals welcome

Submission Guidelines (Double-Blind Review)

Authors are invited to submit full papers, review papers, or abstracts. All submissions must be prepared and submitted in accordance with a double-blind peer review process. Therefore, manuscripts must not contain any author names, affiliations, acknowledgments, or identifying information. Authors should also ensure that self-references are written in a way that does not reveal their identity.

All submissions will undergo peer review, and only accepted and registered papers will be eligible for presentation at the conference and publication in the proceedings.

Note: Acceptance of full-length submissions is strictly based on reviewers’ comments.

Manuscript Preparation Instructions

Manuscripts should be 10–15 pages in length, including text, figures, and references.

Submissions must be made in PDF format only.

For detailed author and editor guidelines, please visit: https://www.springer.com/us/authors-editors/conference-proceedings

Selected papers will be published by Springer Nature as a proceedings volume. All accepted papers will undergo additional quality checks, and only those meeting the required standards will be published. Publication of non-open access content is free of charge.

Submission Portal

All manuscripts must be submitted via CMT using the following link: https://cmt3.research.microsoft.com/ISAP2026

Policy on Use of AI

The use of content generated by artificial intelligence (AI)—including text, figures, images, or code—must be clearly disclosed in the acknowledgments section of the submitted manuscript.

Authors must:
Identify the AI tool used Specify the sections where AI-generated content has been included Briefly describe the extent and manner in which AI was used

Important Dates

30 July 2026

Full Paper Submission Deadline

1 October 2026

Notification of Acceptance

15 November 2026

Camera Ready Paper Submission

Thematic Areas

Computer and Network Security

Mobile Device Security

Systems and Software Security

Hardware Security

Security in Futuristic Technologies

Cryptography

Security in Distributed Wireless Networks

Cyber Forensics

Cybersecurity (Operations, Services, Governance) & Privacy

Fintech Security (Including Blockchain)

Keynote Speakers

Prof. Mauro Conti

Prof. Mauro Conti

University of Padua, Italy (IEEE Fellow)

Prof. Antonino Nocera

Prof. Antonino Nocera

University of Pavia, Italy

Prof. Corrado Aaron Visaggio

Prof. Corrado Aaron Visaggio

Full Professor, University of Foggia, Italy

Prof. Muttukrishnan Rajarajan

Prof. Muttukrishnan Rajarajan

Deputy Head of Engineering, Co-Director, Centre for Online Harm, Safeguarding, Privacy and Identity (COSPI), Co- Founder, Cyber London

Dr. Serena Nicolazzo

Dr. Serena Nicolazzo

University of Pavia, Italy

Dr. Faruk Kazi

Dr. Faruk Kazi

Professor of Electrical Engineering, VJIT Mumbai

Dr. Gopal Krishna Patra

Dr. Gopal Krishna Patra

Director, CSIR-4PI

Mr. Shridhar Bhalchandra Shukla

Mr. Shridhar Bhalchandra Shukla

Chairman of the Board, KPOINT Technologies

Sunil Kumar

Mr. Sunil Kumar

Cyber Security Expert, Govt. of India

Committee

Patron

  • Prof. Manoj Singh Gaur, Director, IIT Jammu

Honorary Chair

  • S. Krishnan, Secretary, Ministry of Electronics and Information Technology (MeitY), India

Advisory Committee

  • V. Kamakoti, Director, IIT Madras
  • Rajat Moona, Director, IIT Ghandhinagar
  • Sukumar Nandi, Senior Professor, IIT Guwahati
  • Tulika Pandey, Scientist G, Ministry of Electronics and Information Technology (MeitY)
  • E. Magesh, Director General, Centre for Development of Advanced Computing (C-DAC)
  • Sanjay Kumar Vyas, Scientist F, Ministry of Electronics and Information Technology (MeitY)

General Chair

  • Prof. Soma Dhavala, IIT Jammu
  • Prof. Vijay Laxmi, MNIT Jaipur

Technical Program Chairs

  • Samaresh Bera, IIT Jammu
  • Suman Banerjee, IIT Jammu
  • Urbi Chaterjee, IIT Kanpur

Organizing Chairs

  • Anil Saini, IIT Jammu
  • Samaresh Bera, IIT Jammu
  • Parvez Faruki, IIT Jammu

Finance Chairs

  • Sharada Prasad Gochiyat, IIT Jammu

Publicity Chairs

  • Chandan Sharma, Senior Project Manager, Centre for Development of Advanced Computing (C-DAC)
  • E. Naresh, Project Officer, Centre for Development of Advanced Computing (C-DAC)
  • Shishir Nagaraja, New Castle University
  • Mauro Conti, Padua University
  • Ahsan Chisti, NIT Srinagar
  • Harsh Verma, NIT Jalaldhar
  • Vijay Kumar Rathore, IIITM Gwalior
  • Sonal Yadav, NIT Raipur

PhD Forum Chairs

  • Vinod P., CUSAT Kochi
  • Preety Singh, LNMIIT Jaipur
  • Rajendra Kumar Solanki, IIT Jammu
  • Ankit Pulkit, IIT Jammu
  • Aishwarya Upadhyay, IIT Jammu

Web Chairs

  • Abhishek Gupta, IIT Jammu
  • Ravi Kumar Bhall, IIT Jammu

Tutorial Chairs

  • Shaifu Gupta, IIT Jammu
  • T.P. Sharma, NIT Hamirpur
  • Monika Sachdev, IKGPTU Kapurthala
  • Gaurav Singhal, NSUT New Delhi

Poster Chairs

  • Sumit Kumar Panday, IIT Jammu
  • Naveen Chauhan, NIT Hamirpur
  • Jyoti Gajrani, Govt. Engineering College, Ajmer

Workshop Chairs

  • Sayantan Mukherjee, IIT Jammu
  • Smita Naval, MNIT Jaipur
  • Jyoti Grover, MNIT Jaipur
  • Urwashi Nayat, NIT Jalandhar

Industry Forum Chairs

  • Mukul Joshi, Trust Lab
  • Sanjeev Kumar, Wadhwani AI
  • M.T. Arvind, Chief Innovation Officer, IIT Jammu

Visa Guidelines

To be updated..

Past Events

ISEA-ISAP 2026: 5th International Conference on Security and Privacy (ISEA-ISAP 2026)
https://isea-isap2026.iitm.ac.in/

ISEA-ISAP 2021: 4th International Conference on Security and Privacy (ISEA-ISAP 2021) Indian Institute of Technology (Indian School of Mines), Dhanbad Dhanbad, India, October 27-30, 2021

ISEA-ISAP 2020: 3rd International Conference on Security and Privacy (ISEA-ISAP 2020)
https://event.iitg.ac.in/isap2020/

2nd ISEA International Conference on Security and Privacy (ISEA-ISAP 2018). Location: Jaipur, India. Dates: January 9–11, 2019.

Ist ISEA International Conference on Security and Privacy Conference 2017, Jan 29- Feb 1, 2017 at NIT Surat, India

Contact Us

Email

isea@iitjammu.ac.in

Venue

IIT Jammu
Nagrota, Jammu, India