Click
here to download the call for papers information!
Submission Guidelines
High-quality papers in all PST-related areas that, at the time of submission, are not under review and have not already been published or accepted for publication elsewhere are solicited. Authors MUST ensure to select the track (Privacy, Security, Trust or Emerging Technologies) most relevant to their research when submitting their paper. Accepted papers will be accepted as ‘regular’ papers up to 10 pages, or ‘short’ papers of up to 6 pages including references and appendix. Up to 2 additional pages will be allowed in each category with over-length charges. Every additional page has a cost of $100.00 (CND). The standard IEEE two-column conference format should be used for all submissions. IEEE Manuscript Templates for Conference Proceedings can be downloaded here. The conference proceedings will be submitted for inclusion in IEEE Xplore as in previous editions of the conference. At least one author of an accepted paper must register by July 3, 2026. Accepted (short or regular) papers will be published in the proceedings.
Double-blind Submission
Reviewing will be double-blind: the reviewers will not know the identities of the authors. It will be up to the authors to ensure the proper anonymization of their paper. For effective anonymization please follow these guidelines:
Do not include any author's name or affiliation in the title. Do not include any information in the acknowledgments section that could reveal the identity of the authors. Refer to your own published work in the third person: use “In the previous work of Jones et al.”, not “In our previous work”. If you cite own papers that are not widely available (e.g., a paper currently under review), use anonymous author names in the citation, for example, an author of the form “A. Anonymous”.
List of Topics
- Access Control and Capability Delegation
- Anonymity and Privacy vs. Accountability
- Biometrics, National ID Cards, Identity Theft
- Cloud Security, Web Security and Privacy
- Critical Infrastructure Protection
- Cryptographic Technologies
- Digital Forensics
- Digital Rights Management
- Generative AI security, privacy, and trust
- Human Computer Interaction and PST
- Identity and Trust Management
- Implications of, and Technologies for, Lawful Surveillance
- Internet of Things (IoT) Security and Privacy
- Intrusion Detection / Prevention Technologies
- Network and Wireless Security
- Observations of PST in Practice, Society, Policy and Legislation
- Operating Systems Security
- Post-quantum cryptography
- Privacy Preserving / Enhancing Technologies
- Privacy, Traceability, and Anonymity
- PST Challenges in e-Services, e.g. e-Health, e-Government, e-Commerce
- Quantum Cryptography beyond QKD
- Quantum Key Distribution (QKD) Protocols
- Recommendation, Reputation and Delivery Technologies
- Secure Software Development and Architecture
- Security Analytics and Data Mining
- Security and Privacy Challenges in Blockchain and its Applications
- Trust and Reputation in Self-Organizing Environments
- Trust Technologies, Technologies for Building Trust in e-Business Strategy
- Zero-Day Vulnerabilities, Continuous Authentication
Artifact Evaluation and Reproducibility Badges
PST 2026 will run an optional Artifact Evaluation process for accepted papers. Authors are encouraged to plan ahead when conducting their research and preparing submissions: well-documented code and datasets submitted alongside accepted papers will be evaluated by our Artifact Evaluation Committee and may be awarded
IEEE reproducibility badges, which appear on the paper's IEEE Xplore page. For code and datasets, badges are awarded at three levels — Available, Reviewed, and Reproducible — reflecting increasing degrees of artifact quality and independent verification. For details on the Artifact Evaluation process, please
click here.
PST Special Sessions
2026 23rd International Conference on Privacy, Security, and Trust (PST) also organizes an Emerging Technologies and Trends Special Session to be held in conjunction with the conference. The aim is to provide researchers in focused areas the opportunity to present and discuss their work, as well as to offer a forum for interaction among a broader community of researchers related to the main topics of PST 2026.
Journal Special Issues
Selected papers presented at PST2026 will be recommended (after a significant extension of 40% new material) for some special issues of SCI-indexed journals based on the topic suitability.
Final acceptantance will be subject to additional rounds of review conducted by the respective journals.
Policy on AI Use
Purpose
To uphold academic integrity, transparency, and trust in research, PST 2026 requires clear disclosure of generative AI use and prohibits practices that compromise the credibility of submissions, such as undisclosed AI-generated content, hallucinated citations, or unverified claims.
Definitions
- Generative AI tools: Systems (e.g., ChatGPT, Gemini, Copilot) that generate text, code, images, figures, tables, data summaries, or references.
- AI-generated content: Any output produced wholly or substantially by such tools.
Author Guidelines
1. Mandatory Disclosure
Authors must disclose generative AI use in the “Acknowledgments” section, specifying:
- The tool(s) used,
- The section(s) or elements containing AI-generated content,
- The nature and extent of assistance (e.g., drafting, editing, ideation).
Minor grammar and copy-editing assistance (e.g., grammar or spelling correction) need not be disclosed. Substantive rewriting, summarization, or ideation must be disclosed.
2. AI Cannot Be an Author
Generative AI systems may not be listed as authors or credited with intellectual contributions.
3. Full Human Accountability
Corresponding and co-authors remain solely responsible for:
- Accuracy and verification of all claims, data, and results,
- Independent validation of all references (AI hallucination risks are well-documented),
- Originality, proper attribution, and avoidance of plagiarism,
- Adherence to ethical standards in privacy, security, and trust research.
4. References and Citations
All cited works must exist and be verifiable. Suspected fabricated or hallucinated references may lead to revision requests, rejection, or in severe cases, i.e., institutional notification. Authors may be required to supply full-text copies of key citations upon request.
5. AI-Generated Visuals, Figures, and Code
Any AI-generated images, diagrams, figures, tables, or code must be disclosed per Section 3.1. Authors must confirm:
- No unauthorized reproduction of copyrighted material,
- Visuals and outputs are accurate, non-misleading, and preserve data integrity.
6. Non-Compliance
Undisclosed or inappropriate AI use may result in:
- Mandatory revisions,
- Rejection of the submission,
- Notification to authors' institutions in serious cases.
Awards
PST 2026 will present a
Best Paper Award and a
Best Student Paper Award to recognize outstanding research contributions and encourage students to present their high-quality work at the conference.