posted by organizer: dstebila || 10445 views || tracked by 12 users: [display]

ACISP 2015 : Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Australasian Conference on Information Security and Privacy
 
Link: http://www.acisp2015.qut.edu.au/
 
When Jun 29, 2015 - Jul 1, 2015
Where Brisbane, Australia
Submission Deadline Feb 20, 2015
Notification Due Apr 6, 2015
Categories    cryptography   security   privacy
 

Call For Papers

ACISP 2015 - Call For Papers

20th Australasian Conference on Information Security and Privacy
June 29 - July 1, 2015
Queensland University of Technology, Brisbane, Australia
http://www.acisp2015.qut.edu.au/

Original papers pertaining to all aspects of information security, cryptology, and privacy are solicited for submission to the 20th Australasian Conference on Information Security and Privacy (ACISP 2015). Papers may present theory, techniques, applications and practical experiences on a variety of topics. The program committee is especially interested in strengthening ACISP’s support of information security papers.

Topics of interest include, but are not limited to:
- Cryptology
- Mobile security
- Authentication and authorization
- Access control
- Security protocols
- Privacy
- Risk assessment
- Viruses and malware
- Identity management
- Cryptocurrencies
- Cloud security
- Database security
- Intrusion detection
- Security management
- Network security
- Key management
- Secure electronic commerce
- Evaluation and certification
- Digital forensics
- Biometrics

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions should be at most 12 pages (excluding bibliography and appendices), using at least 11-point font and with reasonable margins. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Paper must be submitted using the EasyChair system. Accepted papers will be limited to 18 pages in LNCS format.

Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series.

Best Student Paper Award

A prize will be awarded to the author(s) of the best student paper. Student authors are eligible if they are principal authors and full-time students at the time of submission. This must be indicated when the paper is submitted.

Important Dates
- Submission deadline: February 20, 2015, at 11:59:59 pm UTC-12, using EasyChair
- Notification: April 6, 2015
- Conference: June 29 - July 1, 2015

General Chair
- Josef Pieprzyk (Queensland University of Technology, josef.pieprzyk@qut.edu.au)

Program Committee Co-chairs
- Ernest Foo (Queensland University of Technology, e.foo@qut.edu.au)
- Douglas Stebila (Queensland University of Technology, stebila@qut.edu.au)

Program Committee
- Alex Biryukov (University of Luxembourg, Luxembourg)
- Atsuko Miyaji (Japan Advanced Institute of Science and Technology, Japan, Japan)
- Berkant Ustaoglu (Izmir Institute of Technology, Turkey)
- C. Pandu Rangan (Indian Institute of Technology, Madras, India)
- Cas Cremers (University of Oxford, UK)
- Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
- Craig Costello (Microsoft Research, USA)
- Jean Camp (Indiana University Bloomington, USA)
- Jennifer Seberry (University of Wollongong, Australia)
- Jiankun Hu (University of New South Wales at ADFA, Australia)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
- Joanne Hall (Queensland University of Technology, Australia)
- Joonsang Baek (Khalifa University of Science, Technology and Research, United Arab Emirates)
- Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- KP Chow (University of Hong Kong, Hong Kong)
- Leonie Simpson (Queensland University of Technology, Australia)
- Marc Fischlin (Technical University of Darmstadt, Germany)
- Mark Manulis (University of Surrey, UK)
- Palash Sarkar (Indian Statistical Institute, India)
- Paulo Barreto (University of São Paulo, Brazil, Brazil)
- Raymond Choo (University of South Australia, Australia)
- Rei Safavi-Naini (University of Calgary, Canada)
- Sachin Lodha (Tata Consultancy Services, India)
- Suriadi (Massey University, New Zealand)
- Tancrède Lepoint (CryptoExperts, France)
- Tsuyoshi Takagi (Kyushu University, Japan)
- Udaya Parampalli (University of Melbourne, Australia)
- Vijay Varadharajan (Macquarie University, Australia)
- Willy Susilo (University of Wollongong, Australia)
- Xavier Boyen (Queensland University of Technology, Australia)
- Yi Mu (University of Wollongong, Australia)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IVSP 2026   2026 8th International Conference on Image, Video and Signal Processing (IVSP 2026)
MLAIJ 2025   Machine Learning and Applications: An International Journal
ACIE 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
CRBL 2025   5th International Conference on Cryptography and Blockchain
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
IJDPS 2025   International Journal of Distributed and Parallel systems
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
IJWesT 2025   International Journal of Web & Semantic Technology