|
| |||||||||||||
ACISP 2026 : The 31st Australasian Conference on Information Security and Privacy | |||||||||||||
| Link: https://acisp.org/index.html | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
|
The 31st Australasian Conference on Information Security and Privacy (ACISP 2026) invites submissions of original papers presenting novel research results in all aspects of information security and privacy. This 31st ACISP will take place in Perth. We welcome papers presenting theories, techniques, implementations, applications, and practical experiences on a variety of topics.
Topics of interest include, but are not limited to: Blockchain technology Cryptology Database security Digital forensics Hardware, Side Channels, and Cyber-physical Systems Security Machine Learning and Security Network security Privacy and Anonymity Software security System security Web Security Systematization of Knowledge (SoK) Papers. We solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge for topics of broad interest to the cybersecurity community. Examples of SoK papers include papers that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or provide an extensive and realistic evaluation and comparison of competing approaches to solving specific security problems. SoK papers must include the prefix “SoK:” in the title of the paper and will be reviewed by the full PC. They will be accepted based on their treatment of existing work and value to the community. Instructions for Authors ACISP 2026 will have two rounds of submission: Round 1 Deadline: Paper submission: 27 Nov 2025 Author notification: 15 Jan 2026 Round 2 Deadline: Paper submission: 26 February 2026 Author notification: 16 April 2026 Camera Ready: 30 April 2026 The first round will have the results, including reject, major revision, and accept. For the major revision, we encourage authors to submit the updated manuscripts to round two. Round two only includes accept and reject. All submissions must be received by 11:59PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized with no author names, affiliations, acknowledgements, or obvious references. Papers not properly anonymized may be rejected without reviews. All submitted papers will be evaluated based on their merits, particularly their importance to cryptography and cybersecurity, novelty, quality of execution, and presentation. For papers that might raise ethical concerns, authors are expected to convince reviewers that proper procedures (such as IRB approval or responsible disclosure) have been followed and due diligence has been made to minimize potential harm. Submissions not meeting the submission guidelines risk rejection regardless of their merits. |
|