posted by organizer: dstebila || 10011 views || tracked by 12 users: [display]

ACISP 2015 : Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Australasian Conference on Information Security and Privacy
 
Link: http://www.acisp2015.qut.edu.au/
 
When Jun 29, 2015 - Jul 1, 2015
Where Brisbane, Australia
Submission Deadline Feb 20, 2015
Notification Due Apr 6, 2015
Categories    cryptography   security   privacy
 

Call For Papers

ACISP 2015 - Call For Papers

20th Australasian Conference on Information Security and Privacy
June 29 - July 1, 2015
Queensland University of Technology, Brisbane, Australia
http://www.acisp2015.qut.edu.au/

Original papers pertaining to all aspects of information security, cryptology, and privacy are solicited for submission to the 20th Australasian Conference on Information Security and Privacy (ACISP 2015). Papers may present theory, techniques, applications and practical experiences on a variety of topics. The program committee is especially interested in strengthening ACISP’s support of information security papers.

Topics of interest include, but are not limited to:
- Cryptology
- Mobile security
- Authentication and authorization
- Access control
- Security protocols
- Privacy
- Risk assessment
- Viruses and malware
- Identity management
- Cryptocurrencies
- Cloud security
- Database security
- Intrusion detection
- Security management
- Network security
- Key management
- Secure electronic commerce
- Evaluation and certification
- Digital forensics
- Biometrics

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions should be at most 12 pages (excluding bibliography and appendices), using at least 11-point font and with reasonable margins. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Paper must be submitted using the EasyChair system. Accepted papers will be limited to 18 pages in LNCS format.

Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series.

Best Student Paper Award

A prize will be awarded to the author(s) of the best student paper. Student authors are eligible if they are principal authors and full-time students at the time of submission. This must be indicated when the paper is submitted.

Important Dates
- Submission deadline: February 20, 2015, at 11:59:59 pm UTC-12, using EasyChair
- Notification: April 6, 2015
- Conference: June 29 - July 1, 2015

General Chair
- Josef Pieprzyk (Queensland University of Technology, josef.pieprzyk@qut.edu.au)

Program Committee Co-chairs
- Ernest Foo (Queensland University of Technology, e.foo@qut.edu.au)
- Douglas Stebila (Queensland University of Technology, stebila@qut.edu.au)

Program Committee
- Alex Biryukov (University of Luxembourg, Luxembourg)
- Atsuko Miyaji (Japan Advanced Institute of Science and Technology, Japan, Japan)
- Berkant Ustaoglu (Izmir Institute of Technology, Turkey)
- C. Pandu Rangan (Indian Institute of Technology, Madras, India)
- Cas Cremers (University of Oxford, UK)
- Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
- Craig Costello (Microsoft Research, USA)
- Jean Camp (Indiana University Bloomington, USA)
- Jennifer Seberry (University of Wollongong, Australia)
- Jiankun Hu (University of New South Wales at ADFA, Australia)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
- Joanne Hall (Queensland University of Technology, Australia)
- Joonsang Baek (Khalifa University of Science, Technology and Research, United Arab Emirates)
- Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- KP Chow (University of Hong Kong, Hong Kong)
- Leonie Simpson (Queensland University of Technology, Australia)
- Marc Fischlin (Technical University of Darmstadt, Germany)
- Mark Manulis (University of Surrey, UK)
- Palash Sarkar (Indian Statistical Institute, India)
- Paulo Barreto (University of São Paulo, Brazil, Brazil)
- Raymond Choo (University of South Australia, Australia)
- Rei Safavi-Naini (University of Calgary, Canada)
- Sachin Lodha (Tata Consultancy Services, India)
- Suriadi (Massey University, New Zealand)
- Tancrède Lepoint (CryptoExperts, France)
- Tsuyoshi Takagi (Kyushu University, Japan)
- Udaya Parampalli (University of Melbourne, Australia)
- Vijay Varadharajan (Macquarie University, Australia)
- Willy Susilo (University of Wollongong, Australia)
- Xavier Boyen (Queensland University of Technology, Australia)
- Yi Mu (University of Wollongong, Australia)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IJCSITY 2024   International Journal of Computational Science and Information Technology
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2