ACM SIGCHI General Interest Announcements (Mailing List)


Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
text/plain; charset=UTF-8
Fri, 19 Feb 2016 10:52:40 +1100
Conference Contact <[log in to unmask]>
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
Conference Contact <[log in to unmask]>
text/plain (218 lines)
The 21st Australasian Conference on Information Security and Privacy (ACISP)
Melbourne, Australia
4-6 July 2016

The 21st Australasian Conference on Information Security and Privacy
(ACISP) will be held in Melbourne on 4-6 July 2016, organized by Deakin
University. ACISP was established in 1996 in Wollongong. Now in its 21st
year, the conference is a key forum for international researchers and
industry experts to discuss the latest trends, breakthroughs and challenges
in information security and privacy.

Important Dates

Submission Due: 23 February 2016
Notification: 6 April 2016
Camera-Ready: 20 April 2016
Conference: 4-6 July 2016

Conference Topics

We invite submissions from academia, government, and industry presenting
novel research on all aspects of information security and privacy
primitives or protocols, which include but are not limited to the areas
listed as below. This year we particularly welcome submissions from areas
in cyber-physical security, mobile security, software security and network
security which are under represented in previous ACISP series.

 - Cryptology
 - Applied cryptography
 - Mobile security
 - Cloud security
 - Access control
 - Privacy enhanced technology
 - Viruses and malware
 - Software security
 - Database security
 - Web security
 - Operating system security
 - Intrusion detection
 - Big data security and privacy
 - Biometric Security
 - Implementation
 - Network security
 - Key management
 - Security and privacy in ubiquitous computing
 - Secure electronic payment system
 - Formal methods for security
 - Digital forensics
 - Security for critical infrastructures
 - Embedded systems security
 - Lightweight security
 - Smart grid security
 - Cyber security for urban transportation
 - Cyber-physical security

Journal Recommendations

Selected papers presented at the ACISP 2016 will be invited to consider
submission (after significant extension) for special issues or topical
selections in the following journals:

 - Special Issue for Future Generation Computer Systems (FGCS) (impact
factor: 2.786): Security and Privacy Issues in Fog Computing
 - Topical Selection for Journal of Medical Systems (impact factor: 2.213):
Medical Data Security
 - Special Issue for Computers & Security (impact factor: 1.031): Security
Data Science and Cyber Threat Management
 - Special Issue for Pervasive and Mobile Computing (impact factor: 2.079):
Cybersecurity for Ubiquitous Cities
 - Special Issue for Personal and Ubiquitous Computing (impact factor:
1.518): Security and Privacy for Smart Cities

Author Instructions

Authors are invited to submit original papers: they must not substantially
duplicate work that any of the authors have published elsewhere or have
submitted in parallel to any other conferences that have proceedings or any
journal. The submission must be anonymous, with no author names,
affiliations, acknowledgements, or obvious references. Original
contributions are invited up to 12 pages in length (single column)
excluding appendices and bibliography and up to 20 pages in total, using at
least 11-point fonts and with reasonable margins. Submissions not meeting
the submission guidelines risk rejection without consideration of their
merits. Papers should be submitted via easychair (

Authors of accepted papers must guarantee that at least one of the authors
will register and attend the conference and present their paper. The
proceeding will be published by Springer as a volume of the Lecture Notes
in Computer Science (LNCS) series.

Keynote Speakers

Professor Elisa Bertino
Purdue University, United States.

Professor Chris Mitchell
Royal Holloway, University of London, United Kingdom

Conference Organization

General Chair
Yang Xiang, Deakin University, Australia

Program Co-Chairs
Joseph K. Liu, Monash University, Australia
Ron Steinfeld, Monash University, Australia

Publication Co-Chairs
Dong Seong Kim, University of Canterbury, New Zealand
Kaitai Liang, Aalto University, Finland

Publicity Chair
Nalin Asanka, University of New South Wales, Australia

Web Chair
Yu Wang, Deakin University, Australia

Program Committee
Cristina Alcaraz, University of Malaga, Spain
Myrto Arapinis, University of Edinburgh, UK
Claudio A. Ardagna, Università degli Studi di Milano, Italy
David Aspinall, University of Edinburgh, UK
Giuseppe Ateniese, Sapienza University of Rome, Italy
Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, Khalifa University of Science Technology and Research, UAE
Lynn Batten, Deakin University, Australia
Colin Boyd, Norwegian University of Science and Technology, Norway
Serdar Boztas, RMIT, Australia
Alvaro Cardenas, UT Dallas, US
Aniello Castiglione, University of Salerno, Italy
Jinjun Chen, University of Technology Sydney, Australia
Liqun Chen, HP Labs, UK
Xiaofeng Chen, Xidian University, China
Ray C. C. Cheung, City University of Hong Kong, Hong Kong
Raymond Choo, University of South Australia, Australia
Christophe Doche, Macquarie University, Australia
Ernest Foo, Queensland University of Technology, Australia
Steven Galbraith, University of Auckland, New Zealand
David Galindo, SCYTL Secure Electronic Voting, Spain
Felix Gomez-Marmol, NEC, Germany
Swee-Huay Heng, Multimedia University, Malaysia
Andreas Holzer, University of Toronto, Canada
Xinyi Huang, Fujian Normal University, China
Mitsugu Iwamoto, University of Electro-Communications, Japan
Sanjay Jha, University of New South Wales, Australia
Akinori Kawachi, University of Tokushima, Japan
Dong Seong Kim, University of Canterbury, New Zealand
Howon Kim, Pusan National University, Korea
Steve Kremer, INRIA, France
Marina Krotofil, European Network for Cyber Security, Netherlands
Noboru Kunihiro, University of Tokyo, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Gaëtan Leurent, INRIA, France
Yingjiu Li, Singapore Management University, Singapore
Kaitai Liang, Aalto University, Finland
Shengli Liu, Shanghai Jiaotong University, China
Javier Lopez, University of Malaga, Spain
Jiqiang Lu, Institute for Infocomm Research, Singapore
Rongxing Lu, Nanyang Technological University, Singapore
Kazuhiko Minematsu, NEC, Japan
Chris Mitchell, Royal Holloway, University of London, UK
Yi Mu, University of Wollongong, Australia
Daniela Oliveira, University of Florida, US
Udaya Parampalli, University of Melbourne, Australia
Mathias Payer, Purdue University, US
Christian Payne, Murdoch University, Australia
Thomas Peyrin, Nanyang Technological University, Singapore
Josef Pieprzyk, Queensland University of Technology, Australia
Michalis Polychronakis, Stony Brook University, US
Carsten Rudolph, Monash University, Australia
Kui Ren, State Univ. of New York at Buffalo, US
Reza Reyhanitabar, EPFL, Switzerland
Sushmita Ruj, Indian Statistical Institute, Kolkata, India
Taeshik Shon, Ajou University, Korea
Haya Shulman, Technische Universität Darmstadt, Germany
Anna Squicciarini, Penn State University, US
Willy Susilo, University of Wollongong, Australia
Shaohua Tang, South China University of Technology, China
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Mahesh Tripunitara, University of Waterloo, Canada
Craig Valli, Edith Cowan University, Australia
Frederik Vercauturen, UC Leuven, Belgium
Triet Vo-Huu, Northeastern University, US
Petros Wallden, University of Edinburgh, UK
Cong Wang, City University of Hong Kong, Hong Kong
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Qianhong Wu, Beihang University, China
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Xun Yi, RMIT, Australia
Aaram Yun, Ulsan National Institute of Science and Technology, Korea

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see