posted by organizer: dstebila || 4574 views || tracked by 14 users: [display]

ACISP 2015 : Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Australasian Conference on Information Security and Privacy
 
Link: http://www.acisp2015.qut.edu.au/
 
When Jun 29, 2015 - Jul 1, 2015
Where Brisbane, Australia
Submission Deadline Feb 20, 2015
Notification Due Apr 6, 2015
Categories    cryptography   security   privacy
 

Call For Papers

ACISP 2015 - Call For Papers

20th Australasian Conference on Information Security and Privacy
June 29 - July 1, 2015
Queensland University of Technology, Brisbane, Australia
http://www.acisp2015.qut.edu.au/

Original papers pertaining to all aspects of information security, cryptology, and privacy are solicited for submission to the 20th Australasian Conference on Information Security and Privacy (ACISP 2015). Papers may present theory, techniques, applications and practical experiences on a variety of topics. The program committee is especially interested in strengthening ACISP’s support of information security papers.

Topics of interest include, but are not limited to:
- Cryptology
- Mobile security
- Authentication and authorization
- Access control
- Security protocols
- Privacy
- Risk assessment
- Viruses and malware
- Identity management
- Cryptocurrencies
- Cloud security
- Database security
- Intrusion detection
- Security management
- Network security
- Key management
- Secure electronic commerce
- Evaluation and certification
- Digital forensics
- Biometrics

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions should be at most 12 pages (excluding bibliography and appendices), using at least 11-point font and with reasonable margins. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Paper must be submitted using the EasyChair system. Accepted papers will be limited to 18 pages in LNCS format.

Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series.

Best Student Paper Award

A prize will be awarded to the author(s) of the best student paper. Student authors are eligible if they are principal authors and full-time students at the time of submission. This must be indicated when the paper is submitted.

Important Dates
- Submission deadline: February 20, 2015, at 11:59:59 pm UTC-12, using EasyChair
- Notification: April 6, 2015
- Conference: June 29 - July 1, 2015

General Chair
- Josef Pieprzyk (Queensland University of Technology, josef.pieprzyk@qut.edu.au)

Program Committee Co-chairs
- Ernest Foo (Queensland University of Technology, e.foo@qut.edu.au)
- Douglas Stebila (Queensland University of Technology, stebila@qut.edu.au)

Program Committee
- Alex Biryukov (University of Luxembourg, Luxembourg)
- Atsuko Miyaji (Japan Advanced Institute of Science and Technology, Japan, Japan)
- Berkant Ustaoglu (Izmir Institute of Technology, Turkey)
- C. Pandu Rangan (Indian Institute of Technology, Madras, India)
- Cas Cremers (University of Oxford, UK)
- Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
- Craig Costello (Microsoft Research, USA)
- Jean Camp (Indiana University Bloomington, USA)
- Jennifer Seberry (University of Wollongong, Australia)
- Jiankun Hu (University of New South Wales at ADFA, Australia)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
- Joanne Hall (Queensland University of Technology, Australia)
- Joonsang Baek (Khalifa University of Science, Technology and Research, United Arab Emirates)
- Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- KP Chow (University of Hong Kong, Hong Kong)
- Leonie Simpson (Queensland University of Technology, Australia)
- Marc Fischlin (Technical University of Darmstadt, Germany)
- Mark Manulis (University of Surrey, UK)
- Palash Sarkar (Indian Statistical Institute, India)
- Paulo Barreto (University of São Paulo, Brazil, Brazil)
- Raymond Choo (University of South Australia, Australia)
- Rei Safavi-Naini (University of Calgary, Canada)
- Sachin Lodha (Tata Consultancy Services, India)
- Suriadi (Massey University, New Zealand)
- Tancrède Lepoint (CryptoExperts, France)
- Tsuyoshi Takagi (Kyushu University, Japan)
- Udaya Parampalli (University of Melbourne, Australia)
- Vijay Varadharajan (Macquarie University, Australia)
- Willy Susilo (University of Wollongong, Australia)
- Xavier Boyen (Queensland University of Technology, Australia)
- Yi Mu (University of Wollongong, Australia)

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
USENIX Security 2017   USENIX Security '17
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SOUPS 2017   Symposium on Usable Privacy and Security
EuropeanSeC 2017   2017 European Security Conference
SI: Security-BD-SmartCity 2017   Special Issue on Security and Privacy in Big Data-enabled Smart Cities: Opportunities and Challenges