Conference Information
NSPW 2025: New Security Paradigms Workshop
https://www.nspw.org/2025
Submission Date:
2025-04-25
Notification Date:
2025-05-30
Conference Date:
2025-08-24
Location:
Aerzen, Germany
Years:
16
CCF: c   CORE: c   Viewed: 25270   Tracked: 38   Attend: 5

Call For Papers
NSPW 2025 invites three types of submissions:

    Regular submissions present a new approach (paradigm) to a security problem or critique existing approaches. While regular submissions may present research results (mathematical or experimental), unlike papers submitted to most computer security venues, these results should not be the focus of the submission; instead, the change in approach should be the focus.
    Theme Submissions are focused on “Trusting” and should explain the connection with the theme in the justification statement (see below). They follow the format of a regular submission.
    Implementation Submissions explore implementing previous NSPW submissions. Historic NSPW submissions often propose new paradigms but do not extend to implementation. These submissions should clearly cite which previous work(s) is being referenced and how the current submission extends beyond the original scope. Original authors may be involved or not; if not, they will be offered the chance to comment on the submission.

NSPW has an optional theme each year to encourage submissions in specific areas of interest or importance. The theme for NSPW 2025 is Trusting.

Relevant topics for this theme include:

    Novel paradigms for conceptualising trust and trusting in computer security
    Trust decisions in a world of deepfakes and misinformation
    Detection of breach of trust, intrusion and misinformation
    Trust boundaries and threat modeling
    Trust in changing threat landscapes and technologies, such as Artificial Intelligence
    Trust evaluation
    Social configuration of trust and mistrust in organisations
    Trust and mistrust as methodological problems in studies of computer security
    The consequences of not trusting
    Audits and certifications
    Authentication and authorization
    Reputation systems and reviewer/recommender systems
    Anomaly detection
    Formal verification and testing
    Privacy
    Decentralized trust
    Zero trust architectures
    Human, social and organisational understandings of trust in technologies

Other interpretations of trusting are welcome.
Last updated by Dou Sun in 2025-03-09
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cCRiSISInternational Conference on Risks and Security of Internet and Systems2024-09-092024-10-082024-11-26
baa1ACSACAnnual Computer Security Applications Conference 2025-05-302025-09-032025-12-09
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
bNSSInternational Conference on Network and System Security2023-03-032023-05-052023-08-14
aa*a1SecurityUSENIX Security Symposium2026-01-292026-08-12
cb2PSTInternational Conference on Privacy, Security and Trust2025-04-042025-06-012025-08-26
baCSFIEEE Computer Security Foundations Symposium2026-01-292026-04-012026-07-26
cEuroS&PIEEE European Symposium on Security and Privacy2025-11-132026-03-052026-07-06
aa*S&PIEEE Symposium on Security and Privacy2025-11-132026-03-192026-05-18
ccNSPWNew Security Paradigms Workshop2025-04-252025-05-302025-08-24
Related Journals