ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities.
We are looking for papers with high-quality, original, and unpublished research contributions. The Symposium will start on September 21, 2026 with an exciting technical program, including vetted papers, invited talks, and collocated workshops.
This year's symposium will have two review cycles. All submissions must be received by 11:59 p.m. anywhere on earth Time on the day of the corresponding deadline.
Winter Cycle
Full Paper Submission Deadline: January 09, 2026 (firm)
Notification of Acceptance: March 10, 2026
Registration & Camera Ready: March 24, 2026
Spring Cycle
Full Paper Submission Deadline: April 21, 2026 (firm)
Notification of Acceptance: June 12, 2026
Registration & Camera Ready: June 26, 2026
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.
The symposium proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS).
As in previous years, ESORICS will present a Best Paper Award chosen by the Program Committee. This award is generously sponsored by Springer.
Authors may submit up to a maximum of 6 papers for the Winter Cycle.
Submitted papers must follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English.
Submissions must be uploaded to the following EasyChair website:
https://easychair.org/conferences/?conf=esorics2026
Only PDF files will be accepted. Submissions are not anonymous. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Authors of accepted papers must agree with Springer LNCS copyright and are requested to ensure that their papers are presented at the conference, and to complete a full registration for conference attendance.
Submissions are solicited in the following areas relating to computer security, including but not limited to:
Access Control
Anonymity and Censorship Resistance
Artificial Intelligence for Security
Audit and Accountability
Cyber Attack (e.g., APTs, botnets, DDoS) prevention, detection, investigation, and response.
Data and Computation Integrity
Database Security
Digital Content Protection
Digital Forensics
Formal Methods for Security and Privacy
Governance and Management
Hardware Security
Information Hiding
Identity Management
Information Flow Control
Information Security (including disinformation/fake news detection)
Intrusion Detection
Language-based Security
Malware and Unwanted Software
Network Security
Phishing and Spam Prevention
Privacy Technologies and Mechanisms
Risk Analysis and Management
Secure Electronic Voting
Security Economics and Metrics
Security and Privacy in Cloud / Fog Systems
Security and Privacy of Systems based on Machine Learning and AI
Security and Privacy in Crowdsourcing
Security and Privacy in the IoT and Cyber-Physical Systems
Security and Privacy in Location-based Services
Security and Privacy for Mobile / Smartphone Platforms
Security, Privacy, and Resilience for Large-Scale, Critical Infrastructures (e.g., Smart Grid, AirPorts, Ports)
Security for Emerging Networks (e.g., Home Networks, IoT, Body-Area Networks, VANETs)
Security and Privacy in Social Networks
Security and Privacy in Wireless and Cellular Communications
Software Security
Systems Security
Trustworthy Computing to Secure Networks and Systems
Usable Security and Privacy
Web Security
The program co-chairs require cooperation from both authors and PC members to prevent submissions from being evaluated by reviewers who have a conflict of interest.
On the one hand, during the bidding procedure, PC members will be required to indicate potential CoIs. On the other hand, authors will be asked during the submission process to indicate any PC members with whom they share CoIs, as well as the types of CoIs. That is, if they and one of the authors:
share an institutional affiliation at the time of submission;
had at any time in the past a supervisor/PhD student relationship;
have collaborated or published within the prior two years;
are in some form of financial relationship, or have been at some point during the past two years;
are related, or have close personal friendships.
For other forms of conflict, authors must contact the chairs and explain the perceived conflict.
Program committee members who have conflicts of interest with a paper, including program co-chairs, will be excluded from discussing and reviewing the submission. Authors also need to notify the PC Chairs of any other reason or circumstance that creates a risk that professional judgment may be unduly influenced.
The chairs reserve the right to request further explanation and can remove non-mandatory conflicts at their discretion.