ACISP: Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2027 or later

 
 

All CFPs on WikiCFP

Event When Where Deadline
ACISP 2026 The 31st Australasian Conference on Information Security and Privacy
Jul 6, 2026 - Jul 9, 2026 Perth, Australia Feb 26, 2026
ACISP 2022 Australasian Conference on Information Security and Privacy
Nov 9, 2021 - Oct 6, 2022 China TBD
ACISP 2019 The 24th Australasian Conference on Information Security and Privacy
Jul 3, 2019 - Jul 5, 2019 Christchurch, New Zealnad Feb 15, 2019
ACISP 2018 23rd Australasian Conference on Information Security and Privacy
Jul 11, 2018 - Jul 13, 2018 Wollongong, Australia Feb 25, 2018
ACISP 2017 Australasian Conference on Information Security and Privacy
Jul 3, 2017 - Jul 5, 2017 Auckland, New Zealand Mar 4, 2017
ACISP 2016 Australasian Conference on Information Security and Privacy
Jul 4, 2016 - Jul 6, 2016 Melbourne TBD
ACISP 2015 Australasian Conference on Information Security and Privacy
Jun 29, 2015 - Jul 1, 2015 Brisbane, Australia Feb 20, 2015
ACISP 2014 The 19th Australasian Conference on Information Security and Privacy
Jul 7, 2014 - Jul 9, 2014 Wollongong, Australia Feb 23, 2014
ACISP 2012 17th Australasian Conference on Information Security and Privacy
Jul 9, 2012 - Jul 11, 2012 Wollongong, Australia Feb 23, 2012
ACISP 2011 16th Australasian Conference on Information Security and Privacy
Jul 11, 2011 - Jul 13, 2011 RMIT University, Melbourne, Australia Feb 18, 2011
ACISP 2010 acisp2010
Jul 5, 2010 - Jul 7, 2010 Australia Feb 9, 2010
 
 

Present CFP : 2026

The 31st Australasian Conference on Information Security and Privacy (ACISP 2026) invites submissions of original papers presenting novel research results in all aspects of information security and privacy. This 31st ACISP will take place in Perth. We welcome papers presenting theories, techniques, implementations, applications, and practical experiences on a variety of topics.

Topics of interest include, but are not limited to:

Blockchain technology
Cryptology
Database security
Digital forensics
Hardware, Side Channels, and Cyber-physical Systems Security
Machine Learning and Security
Network security
Privacy and Anonymity
Software security
System security
Web Security
Systematization of Knowledge (SoK) Papers.
We solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge for topics of broad interest to the cybersecurity community. Examples of SoK papers include papers that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or provide an extensive and realistic evaluation and comparison of competing approaches to solving specific security problems.

SoK papers must include the prefix “SoK:” in the title of the paper and will be reviewed by the full PC. They will be accepted based on their treatment of existing work and value to the community.

Instructions for Authors
ACISP 2026 will have two rounds of submission:

Round 1 Deadline:
Paper submission: 27 Nov 2025
Author notification: 15 Jan 2026

Round 2 Deadline:
Paper submission: 26 February 2026
Author notification: 16 April 2026

Camera Ready: 30 April 2026

The first round will have the results, including reject, major revision, and accept. For the major revision, we encourage authors to submit the updated manuscripts to round two. Round two only includes accept and reject.

All submissions must be received by 11:59PM AoE (UTC-12) on the day of the corresponding deadline. Submitted papers must not substantially overlap with papers that have been published or accepted for publication, or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. All submissions should be properly anonymized with no author names, affiliations, acknowledgements, or obvious references. Papers not properly anonymized may be rejected without reviews.

All submitted papers will be evaluated based on their merits, particularly their importance to cryptography and cybersecurity, novelty, quality of execution, and presentation. For papers that might raise ethical concerns, authors are expected to convince reviewers that proper procedures (such as IRB approval or responsible disclosure) have been followed and due diligence has been made to minimize potential harm. Submissions not meeting the submission guidelines risk rejection regardless of their merits.
 

Related Resources

IJAIT 2026   International Journal of Advanced Information Technology
BDCTA 2026   2026 2nd International Conference on Big Data, Communication Technology and Computer Applications
EI/Scopus-GADM 2026   2026 2nd International Conference on Generative Artificial Intelligence and Digital Media-EI/Scopus
Privacy Symposium (PrivIno) 2026   International Conference on Data Governance, Regulatory Compliance, and Innovative Technologies
BlockSys’ 2026   The 8th International Conference on Blockchain, Artificial Intelligence, and Trustworthy Systems
IJWesT 2026   International Journal of Web & Semantic Technology
ECTI-CON 2026   The 23rd International Conference on Electrical Engineering/Electronics, Computer, Telecommunication, and Information Technology
IOTBC 2026   4th International Conference IOT, Blockchain and Cryptography
CoNeCo 2026   18th International Conference on Computer Networks & Communications
IJCNC 2026   International Journal of Computer Networks & Communications - Scopus, ERA, H Index - 41