posted by organizer: dstebila || 9475 views || tracked by 12 users: [display]

ACISP 2015 : Australasian Conference on Information Security and Privacy

FacebookTwitterLinkedInGoogle


Conference Series : Australasian Conference on Information Security and Privacy
 
Link: http://www.acisp2015.qut.edu.au/
 
When Jun 29, 2015 - Jul 1, 2015
Where Brisbane, Australia
Submission Deadline Feb 20, 2015
Notification Due Apr 6, 2015
Categories    cryptography   security   privacy
 

Call For Papers

ACISP 2015 - Call For Papers

20th Australasian Conference on Information Security and Privacy
June 29 - July 1, 2015
Queensland University of Technology, Brisbane, Australia
http://www.acisp2015.qut.edu.au/

Original papers pertaining to all aspects of information security, cryptology, and privacy are solicited for submission to the 20th Australasian Conference on Information Security and Privacy (ACISP 2015). Papers may present theory, techniques, applications and practical experiences on a variety of topics. The program committee is especially interested in strengthening ACISP’s support of information security papers.

Topics of interest include, but are not limited to:
- Cryptology
- Mobile security
- Authentication and authorization
- Access control
- Security protocols
- Privacy
- Risk assessment
- Viruses and malware
- Identity management
- Cryptocurrencies
- Cloud security
- Database security
- Intrusion detection
- Security management
- Network security
- Key management
- Secure electronic commerce
- Evaluation and certification
- Digital forensics
- Biometrics

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions should be at most 12 pages (excluding bibliography and appendices), using at least 11-point font and with reasonable margins. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. Paper must be submitted using the EasyChair system. Accepted papers will be limited to 18 pages in LNCS format.

Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series.

Best Student Paper Award

A prize will be awarded to the author(s) of the best student paper. Student authors are eligible if they are principal authors and full-time students at the time of submission. This must be indicated when the paper is submitted.

Important Dates
- Submission deadline: February 20, 2015, at 11:59:59 pm UTC-12, using EasyChair
- Notification: April 6, 2015
- Conference: June 29 - July 1, 2015

General Chair
- Josef Pieprzyk (Queensland University of Technology, josef.pieprzyk@qut.edu.au)

Program Committee Co-chairs
- Ernest Foo (Queensland University of Technology, e.foo@qut.edu.au)
- Douglas Stebila (Queensland University of Technology, stebila@qut.edu.au)

Program Committee
- Alex Biryukov (University of Luxembourg, Luxembourg)
- Atsuko Miyaji (Japan Advanced Institute of Science and Technology, Japan, Japan)
- Berkant Ustaoglu (Izmir Institute of Technology, Turkey)
- C. Pandu Rangan (Indian Institute of Technology, Madras, India)
- Cas Cremers (University of Oxford, UK)
- Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
- Craig Costello (Microsoft Research, USA)
- Jean Camp (Indiana University Bloomington, USA)
- Jennifer Seberry (University of Wollongong, Australia)
- Jiankun Hu (University of New South Wales at ADFA, Australia)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
- Joanne Hall (Queensland University of Technology, Australia)
- Joonsang Baek (Khalifa University of Science, Technology and Research, United Arab Emirates)
- Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- KP Chow (University of Hong Kong, Hong Kong)
- Leonie Simpson (Queensland University of Technology, Australia)
- Marc Fischlin (Technical University of Darmstadt, Germany)
- Mark Manulis (University of Surrey, UK)
- Palash Sarkar (Indian Statistical Institute, India)
- Paulo Barreto (University of São Paulo, Brazil, Brazil)
- Raymond Choo (University of South Australia, Australia)
- Rei Safavi-Naini (University of Calgary, Canada)
- Sachin Lodha (Tata Consultancy Services, India)
- Suriadi (Massey University, New Zealand)
- Tancrède Lepoint (CryptoExperts, France)
- Tsuyoshi Takagi (Kyushu University, Japan)
- Udaya Parampalli (University of Melbourne, Australia)
- Vijay Varadharajan (Macquarie University, Australia)
- Willy Susilo (University of Wollongong, Australia)
- Xavier Boyen (Queensland University of Technology, Australia)
- Yi Mu (University of Wollongong, Australia)

Related Resources

CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
JoL 2024   International Journal of Law
S&P 2025   The 45th IEEE Symposium on Security and Privacy
CRBL 2024   International Conference on Cryptography and Blockchain
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
DSIT 2024   7th International Conference on Data Science and Information Technology