posted by organizer: dstebila || 4815 views || tracked by 13 users: [display]

ACISP 2015 : Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Australasian Conference on Information Security and Privacy
 
Link: http://www.acisp2015.qut.edu.au/
 
When Jun 29, 2015 - Jul 1, 2015
Where Brisbane, Australia
Submission Deadline Feb 20, 2015
Notification Due Apr 6, 2015
Categories    cryptography   security   privacy
 

Call For Papers

ACISP 2015 - Call For Papers

20th Australasian Conference on Information Security and Privacy
June 29 - July 1, 2015
Queensland University of Technology, Brisbane, Australia
http://www.acisp2015.qut.edu.au/

Original papers pertaining to all aspects of information security, cryptology, and privacy are solicited for submission to the 20th Australasian Conference on Information Security and Privacy (ACISP 2015). Papers may present theory, techniques, applications and practical experiences on a variety of topics. The program committee is especially interested in strengthening ACISP’s support of information security papers.

Topics of interest include, but are not limited to:
- Cryptology
- Mobile security
- Authentication and authorization
- Access control
- Security protocols
- Privacy
- Risk assessment
- Viruses and malware
- Identity management
- Cryptocurrencies
- Cloud security
- Database security
- Intrusion detection
- Security management
- Network security
- Key management
- Secure electronic commerce
- Evaluation and certification
- Digital forensics
- Biometrics

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions should be at most 12 pages (excluding bibliography and appendices), using at least 11-point font and with reasonable margins. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Paper must be submitted using the EasyChair system. Accepted papers will be limited to 18 pages in LNCS format.

Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series.

Best Student Paper Award

A prize will be awarded to the author(s) of the best student paper. Student authors are eligible if they are principal authors and full-time students at the time of submission. This must be indicated when the paper is submitted.

Important Dates
- Submission deadline: February 20, 2015, at 11:59:59 pm UTC-12, using EasyChair
- Notification: April 6, 2015
- Conference: June 29 - July 1, 2015

General Chair
- Josef Pieprzyk (Queensland University of Technology, josef.pieprzyk@qut.edu.au)

Program Committee Co-chairs
- Ernest Foo (Queensland University of Technology, e.foo@qut.edu.au)
- Douglas Stebila (Queensland University of Technology, stebila@qut.edu.au)

Program Committee
- Alex Biryukov (University of Luxembourg, Luxembourg)
- Atsuko Miyaji (Japan Advanced Institute of Science and Technology, Japan, Japan)
- Berkant Ustaoglu (Izmir Institute of Technology, Turkey)
- C. Pandu Rangan (Indian Institute of Technology, Madras, India)
- Cas Cremers (University of Oxford, UK)
- Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
- Craig Costello (Microsoft Research, USA)
- Jean Camp (Indiana University Bloomington, USA)
- Jennifer Seberry (University of Wollongong, Australia)
- Jiankun Hu (University of New South Wales at ADFA, Australia)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
- Joanne Hall (Queensland University of Technology, Australia)
- Joonsang Baek (Khalifa University of Science, Technology and Research, United Arab Emirates)
- Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- KP Chow (University of Hong Kong, Hong Kong)
- Leonie Simpson (Queensland University of Technology, Australia)
- Marc Fischlin (Technical University of Darmstadt, Germany)
- Mark Manulis (University of Surrey, UK)
- Palash Sarkar (Indian Statistical Institute, India)
- Paulo Barreto (University of São Paulo, Brazil, Brazil)
- Raymond Choo (University of South Australia, Australia)
- Rei Safavi-Naini (University of Calgary, Canada)
- Sachin Lodha (Tata Consultancy Services, India)
- Suriadi (Massey University, New Zealand)
- Tancrède Lepoint (CryptoExperts, France)
- Tsuyoshi Takagi (Kyushu University, Japan)
- Udaya Parampalli (University of Melbourne, Australia)
- Vijay Varadharajan (Macquarie University, Australia)
- Willy Susilo (University of Wollongong, Australia)
- Xavier Boyen (Queensland University of Technology, Australia)
- Yi Mu (University of Wollongong, Australia)

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
ICCNS - Ei 2017   ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
SoICT 2017   The Eighth Interntional Symposium on Information and Communication Technology
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
ASPMI 2018   Advances in Security and Privacy of Multimodal Interfaces