{"id":22542,"date":"2025-10-21T13:39:15","date_gmt":"2025-10-21T13:39:15","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=22542"},"modified":"2025-10-21T13:41:00","modified_gmt":"2025-10-21T13:41:00","slug":"cfp-usec","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/","title":{"rendered":"Call for Papers: Symposium on Usable Security and Privacy (USEC) 2026"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading purple-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">Call for Papers: Symposium on Usable Security and Privacy (USEC) 2026<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding section-title-r is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p>The Symposium on Usable Security and Privacy (USEC) invites submissions on all aspects of human factors and usability in the context of security and privacy. USEC \u201926 aims to bring together researchers already engaged in this interdisciplinary effort with other researchers in relevant areas. We encourage economics, HCI, AI, theoretical computer science, cryptography, psychology, and business studies researchers and practitioners to submit original research in this area. We particularly encourage collaborative research from authors in multiple fields.<\/p>\n\n\n\n<p>To honor significant contributions that have had a lasting impact on the field, USEC \u201926 will also feature a Test of Time Award. This award will celebrate research demonstrating enduring relevance and influence in usable security and privacy over the past 14 years of USEC. We will invite nominations for this award from the Organizing Committee, Program Committee, and authors submitting their works to USEC \u201926. This recognition will honor research that continues to shape and inspire current and future investigations in the discipline.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Areas of Interest<\/h2>\n\n\n\n<p>Topics include, but are not limited to:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Innovative security or privacy functionality and design<\/li>\n\n\n\n<li>New applications of existing models or technology<\/li>\n\n\n\n<li>Usability evaluations of new or existing security or privacy features and lessons learned<\/li>\n\n\n\n<li>Security testing of new or existing usability features<\/li>\n\n\n\n<li>Psychological, sociological, and economic aspects of security and privacy<\/li>\n\n\n\n<li>Research and design methodologies for human-centric security and privacy research<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Reports of replicating previously published studies and experiments<\/li>\n\n\n\n<li>Reports of failed usable privacy\/security studies or experiments, with the focus on the lessons learned from such experience<\/li>\n\n\n\n<li>Systematization of Knowledge<\/li>\n\n\n\n<li>Inclusive security and privacy<\/li>\n\n\n\n<li>Ethics in human-centric security and privacy research<\/li>\n\n\n\n<li>Usability and privacy for vulnerable populations<\/li>\n\n\n\n<li>Usability in smart manufacturing<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p>All submissions must clearly relate to the human aspects of security or privacy. Papers on security or privacy that do not address usability or human factors will not be considered. Likewise, papers on usability or human factors that do not address security or privacy will not be considered. The determination of whether a paper is within scope will be solely at the discretion of the program committee chairs.<\/p>\n\n\n\n<p>For accepted papers, at least one author must attend USEC 2026 and present their paper.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Submission Guidelines for Papers<\/h2>\n\n\n\n<p>All submissions must be original work; authors must clearly document any overlap with previously published or simultaneously submitted papers from any of the authors. All papers should be written in English. We will review longer papers on mature\/completed work in a research track, as well as shorter papers on work in progress, or work that has yet to begin, in a vision track. We aim to provide a venue for researchers at all stages of their careers and at all stages of their projects. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Use the templates for NDSS Symposium and co-located events.<\/p>\n\n\n\n<p><strong>Research Track<\/strong>: The research track is intended to report on mature work that has been completed. The goal of the USEC\u2019s research track is to disseminate results of interest to the broader usable security and privacy community. Papers must not be more than 12 pages in length using the two-column submission format, excluding bibliography and well-marked appendices. Try to scale the length of the paper according to the contributions you describe therein. Authors have the option to attach to their paper\u2018s supplementary appendices with study materials (e.g., survey instruments, interview guides, etc.) that would not otherwise take up valuable space within the body of the paper. Reviewers are not required to read appendices, so your paper should be self-contained without them.<\/p>\n\n\n\n<p><strong>Meta-Science Track<\/strong>: The Meta-Science Track is intended to report on mature work and seeks to disseminate results that contribute to the broader understanding and improvement of research practices, including the replicability of studies and the systematization of existing knowledge. Submissions in this track may include comprehensive evaluations of research methodologies, studies that replicate and verify prior findings, meta-analyses that synthesize existing literature, and SoK papers that systematically organize and analyze research in a specific domain. Papers must not exceed 12 pages in length using the two-column submission format, excluding bibliography and well-marked appendices. Authors are encouraged to scale the length of their paper according to the contributions they describe therein. Additionally, authors have the option to attach supplementary appendices with materials such as study protocols, datasets, or detailed methodological descriptions that would not otherwise take up valuable space within the body of the paper. However, reviewers are not required to read these appendices, so the main paper should be self-contained without them.<\/p>\n\n\n\n<p><strong>Vision Track:<\/strong> The vision track is intended to report on work in progress or concrete ideas for work that has yet to begin. The focus of the vision track is to spark discussion with the goal of providing the authors helpful feedback, pointers to potentially related investigations, and new ideas to explore. Suitable submissions to the vision track include traditional work-in-progress pieces such as preliminary results of pre-studies but also research proposals and position papers outlining future research. Papers must be up to 5 pages in length using the two-column format, excluding bibliography and well-marked appendices.<\/p>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4f0f7\"><strong>The submission portal for papers: <a href=\"https:\/\/usec26.hotcrp.com\/\">https:\/\/usec26.hotcrp.com\/<\/a><\/strong><\/p>\n\n\n\n<p>Reviewing will be double-blind. Author names and affiliations should not appear in the paper. The authors should make a reasonable effort not to reveal their identities or institutional affiliations in the text, figures, photos, links, or other data that is contained in the paper. Authors\u2019 prior work should be preferably referred to in the third person; if this is not feasible, the references should be blinded. Submissions that violate these requirements will be rejected without review. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Important Dates<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Submission Deadline: 5 December 2025, 11:59 pm, Anywhere-on-earth (AOE)<\/li>\n\n\n\n<li>Reviews Due: 15 December 2025<\/li>\n\n\n\n<li>Discussion Period: 15-19 December 2025<\/li>\n\n\n\n<li>Notification of Acceptance: 19 December 2025<\/li>\n\n\n\n<li>Camera Ready Deadline: 16 January 2026<\/li>\n\n\n\n<li>Workshop Date: 27 February 2026<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conflicts of Interest<\/h2>\n\n\n\n<p>Authors and Program Committee members are required to indicate any conflict of interest and its nature. Advisors and those that they are advising, as well as authors and PC members with an institutional relationship are considered to share a conflict of interest. Professional collaborations (irrespective of whether they resulted in publication or funding) that occurred in the past 2 years and close personal relationships equally constitute a conflict of interest. PC members, including chairs, that have a conflict of interest with a paper, will be entirely excluded from the evaluation of that paper.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Call for Papers: Symposium on Usable Security and Privacy (USEC) 2026 The Symposium on Usable Security and Privacy (USEC) invites submissions on all aspects of human factors and usability in the context of security and privacy. USEC \u201926 aims to bring together researchers already engaged in this interdisciplinary effort with other researchers in relevant areas. &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\">Continued<\/a><\/p>\n","protected":false},"author":259,"featured_media":0,"parent":21279,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-22542","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-21T13:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\",\"name\":\"Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"datePublished\":\"2025-10-21T13:39:15+00:00\",\"dateModified\":\"2025-10-21T13:41:00+00:00\",\"description\":\"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Calls for Submissions for NDSS Symposium 2026\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Call for Papers: Symposium on Usable Security and Privacy (USEC) 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium","description":"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/","og_locale":"en_US","og_type":"article","og_title":"Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium","og_description":"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-10-21T13:41:00+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/","url":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/","name":"Call for Papers: Symposium on Usable Security and Privacy 2026 - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"datePublished":"2025-10-21T13:39:15+00:00","dateModified":"2025-10-21T13:41:00+00:00","description":"Call for papers for the Symposium on Usable Security and Privacy 2026 is now open.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/cfp-usec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/"},{"@type":"ListItem","position":3,"name":"Calls for Submissions for NDSS Symposium 2026","item":"https:\/\/www.ndss-symposium.org\/ndss2026\/submissions\/"},{"@type":"ListItem","position":4,"name":"Call for Papers: Symposium on Usable Security and Privacy (USEC) 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/c-bianchiisoc-org\/","display_name":"Agustin Bianchi"},"relative_dates":{"created":"Posted 2 months ago","modified":"Updated 2 months ago"},"absolute_dates":{"created":"Posted on 21 October 2025","modified":"Updated on 21 October 2025"},"absolute_dates_time":{"created":"Posted on 21 October 2025 1:39 pm","modified":"Updated on 21 October 2025 1:41 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=22542"}],"version-history":[{"count":7,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22542\/revisions"}],"predecessor-version":[{"id":22569,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/22542\/revisions\/22569"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/21279"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=22542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=22542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=22542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}