allconferencecfpalerts

Event         Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

14th International Conference of Security, Privacy and Trust Management (SPTM 2026)

Views : 13

When : 2026-07-25

Where : Toronto, Canada

Submission Deadline : 2026-05-23

Categories : Soft Computing    Informatics    Internet Computing   

https://sptm2026.org/

14th International Conference of Security, Privacy and Trust Management (SPTM 2026)

July 25 ~ 26, 2026, Toronto, Canada

Scope & Topics

14th International Conference of Security, Privacy and Trust Management (SPTM 2026) looks for significant contributions to Trust management for networks. Original papers are invited on Security, Privacy and Trust Management of wireless and wired networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

Topics of interest include, but are not limited to, the following

    Trust Management, Identity and Access Control

  • Trust Models, Trust Negotiation and Trust Reasoning
  • Decentralized Trust Management and Zero Trust Architectures
  • Identity and Access Management (IAM), Authentication and Authorization
  • Continuous Authentication and Identity Threat Detection
  • Trust in Cloud Native, Multi Cloud and Distributed Systems
  • Trust and Reputation Systems for Online Platforms
  • Trust in Microservices, APIs and Service Oriented Architectures
  • Trust Management for IoT, Edge, Mobile and Sensor Networks
  • Cross Platform Digital Identity Trust and Verifiable Credentials

    Privacy Engineering and Data Protection

  • Privacy Preserving Machine Learning (PPML)
  • Differential Privacy, Secure Aggregation and Federated Learning
  • Privacy Enhancing Technologies (PETs)
  • Data Anonymization, De identification and Synthetic Data Privacy
  • Privacy in Social Platforms, Digital Ecosystems and Online Communities
  • Privacy by Design, Governance and Compliance Automation
  • Geo Distributed Data Privacy and Cross Border Data Trust
  • Privacy in Cloud, Edge and Distributed Intelligence Systems

    Security Engineering and System Protection

  • Secure Software Development Lifecycle (SSDLC)
  • Vulnerability Discovery, Exploit Mitigation and Secure Coding
  • Software Supply Chain Security and SBOM Management
  • Secure DevOps (DevSecOps) and Continuous Security Testing
  • Security of Cloud, Serverless, Container and Kubernetes Environments
  • Security for IoT, CPS, Autonomous Systems and Robotics
  • Hardware Security, TEEs, Side Channel Attacks and Defenses
  • Chaos Engineering, Resilience Testing and Self Healing Systems
  • Autonomous Cyber Defense Agents

    Cryptography, Blockchain and Distributed Trust

  • Applied Cryptography and Cryptographic Protocols
  • Blockchain Security, Smart Contract Verification and Web3 Trust Models
  • Distributed Ledger Technologies (DLT) and Consensus Security
  • Zero Knowledge Proofs, MPC and Homomorphic Encryption
  • Decentralized Identity (DID) and Verifiable Credentials
  • Post Quantum Cryptography and Quantum Resistant Trust Frameworks
  • Quantum Networks, QKD and Quantum Trust Models

    AI, Machine Learning and Trustworthy Intelligence

  • Adversarial Machine Learning and Model Robustness
  • AI Safety, Alignment and Secure AI Pipelines
  • Trustworthy AI, Explainability and Accountability
  • Detection of Deepfakes, Synthetic Media and AI Generated Threats
  • AI Driven Threat Detection, Security Analytics and Anomaly Detection
  • Trust Management in Multi Agent and Autonomous AI Systems
  • Secure LLM Deployment, Jailbreak Prevention and Policy Enforcement
  • AI Generated Content Provenance, Watermarking and Authenticity Verification
  • Trust in Multimodal Foundation Models (Vision LLMs, Audio LLMs, Video LLMs)

    Network, Cloud and Distributed Security

  • Network Security, Intrusion Detection and Traffic Analysis
  • Cloud Security, Virtualization Security and Multi Cloud Trust
  • Secure Edge Computing, Fog Computing and Distributed Intelligence
  • Secure Communication Protocols and End to End Encryption
  • 5G/6G Security, Mobile Network Trust and Spectrum Security
  • DNS Security, Routing Security and Internet Infrastructure Trust
  • Secure Federated Knowledge Graphs and Distributed Trust Reasoning

    Human Centered Security, Usability and Social Trust

  • Human Factors in Security and Privacy
  • Social Engineering, Phishing and Behavioral Security
  • Trust in Social Networks, Online Communities and Digital Platforms
  • Usable Security and Privacy Interfaces
  • Misinformation, Disinformation and Trust in Digital Media
  • Psychological Models of Trust and Risk Perception
  • Human Machine Trust Calibration and Cognitive Security

    Policy, Governance, Ethics and Regulation

  • Security and Privacy Policy Management
  • Governance, Risk and Compliance (GRC)
  • Ethical AI, Responsible Data Use and Algorithmic Governance
  • Legal, Regulatory and Societal Aspects of Security and Privacy
  • Digital Trust Frameworks and Global Trust Standards
  • Cyber Diplomacy and International Trust Agreements

    Emerging Domains and Future Directions

  • Security and Trust in Metaverse, AR/VR and Immersive Environments
  • Trust in Digital Twins, Simulation Driven Systems and Cyber Physical Twins
  • Security for Autonomous Vehicles, Drones and Smart Mobility
  • Space Systems Security, Satellite Swarm Trust and Orbital Mesh Networks
  • Bio Cybersecurity and Trust in Genomic Data Ecosystems
  • Security for AI Operated Infrastructure (Power Grids, ICS, Smart Cities)
  • Synthetic Data Security, Leakage Risks and Trust Evaluation
  • Trust in AI Driven Autonomous Infrastructure and Cloud Orchestration

Paper Submission

Authors are invited to submit papers through the conference Submission System by May 23, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT)(Confirmed).

Selected papers from SPTM 2026, after further revisions, will be published in the special issue of the following journals.

  • International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed
  • International Journal on Cryptography and Information Security (IJCIS)
  • International Journal of Security, Privacy and Trust Management (IJSPTM)
  • Information Technology in Industry (ITII)

Important Dates

Submission Deadline: May 23, 2026
Authors Notification: June 20, 2026
Final Manuscript Due: June 27, 2026

Co - Located Event


  • 12th International Conference on Image Processing and Pattern Recognition (IPPR 2026)
  • 12th International Conference on Software Engineering (SOENG 2026)
  • 13th International Conference on Computer Science and Information Technology (CSIT 2026)
  • 15th International conference on Parallel, Distributed Computing and Applications (IPDCA 2026)
  • 12th International Conference on Data Mining (DaMi 2026)
  • 12thInternational Conference on Artificial Intelligence and Soft Computing (AIS 2026)
  • 7th International Conference on Natural Language Processing & Applications (NLPA 2026)
  • 7thInternational Conference on Advanced Machine Learning (AMLA 2026)
  • 7thInternational Conference on Big Data and Applications (BDAP 2026)

***** The invited talk proposals can be submitted to sptm@sptm2026.org





User Name : alex
Posted 21-05-2026 on 15:56:22


Related CFPs

CSIT 2026   13th International Conference on Computer Science and Information Technology

NeTCoM 2026   18th International Conference on Networks & Communications (NeTCoM 2026)

AMLA 2026   7th International Conference on Advanced Machine Learning (AMLA 2026)

AIS 2026   12th International Conference on Artificial Intelligence and Soft Computing (AIS 2026)

IJGCA   International Journal of Grid Computing & Applications

All Rights Reserved @ Call for Papers - Conference & Journals