ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

AISC 2011 - Australasian Information Security Conference 2011

Date2011-01-17

Deadline2010-08-16

VenuePerth, Australia Australia

Keywords

Websitehttps://conf.isi.qut.edu.au/aisc11

Topics/Call fo Papers

ACSW-AISC aims at promoting research on all aspects of information security and increasing communication between academic and industrial researchers working in this area. It is a one-day conference in conjunction with the Australasian Computer Science Conference, part of Australasian Computer Science Week to be held at Curtin University of Technology (QUT) during 17-20 January 2011. We seek submissions from academic and industrial researchers on all theoretical and practical aspects of information security. Suggested topics include, but are not restricted to, the following.

. Access control
. Anonymity and pseudonymity
. Cryptography and cryptographic protocols
. Database security
. Identity management and identity theft
. Intrusion detection and prevention
. Malicious software
. Network security
. Privacy enhancing technologies
. Trust and risk
Program Co-Chairs

Colin Boyd Queensland University of Technology, Australia
Josef Pieprzyk Macquarie University, Australia

Program Committee

Joonsang Baek, Inst. for Infocomm Research
Lynn Batten, Deakin University
Ljiljana Brankovic, University of Newcastle
Raymond Choo, Australian Inst. of Criminology
Asha Rao, RMIT University
Jason Reid, Qld University of Technology
Ray Hunt, University of Canterbury
Ron Steinfeld, Macquarie University
Jill Slay, University of South Australia
Willy Susilo, University of Wollongong
Clark Thomborson, The University of Auckland
Ian Welch, Victoria University of Wellington
Huaxiong Wang, Nanyang Technology University
Duncan S. Wong, City University of Hong Kong
Yang Xiang, Deakin University
Xun Yi, Victoria University
Key dates

Submission of paper: 16 August 2010
Notification of authors: 4 October 2010
Final version: 5 November 2010

Instructions for Authors Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 12 pages in length (single column and minimum 11pt) excluding appendices and bibliography and up to 20 pages in total. (Alternatively authors can use the formatting instructions for the series Conferences in Research and Practice in Information Technology: http://crpit.com/. In this case papers should be no more than 10 pages in length.)
There will be an award for the best student paper. A paper that can be categorized as a "student paper" should be marked with "Student Paper" at the top of the anonymous submission. The definition of a "student paper" is a paper where at least 75% of the work is done by the student (and usually, the student's name appears as the first author).
Papers will be judged on originality, significance, correctness and clarity. The contribution of the paper should be clearly explained in both general and technical terms. Submission of a paper includes a commitment that, should the paper be accepted, at least one author will attend the workshop to present the work.
Papers must be submitted electronically and be received by the submission deadline. Late submissions and non-electronic submissions will not be considered. The detail of the submission procedure will be available at:

http://conf.isi.qut.edu.au/aisc11/

Publication Proceedings will be published in revised form through the Australian Computer Society (ACS) in its Conferences in Research and Practice in Information Technology (CRPIT) series. At least one author must register for the workshop to ensure publication of the paper. Each paper must be presented by the respective author.

Last modified: 2010-06-04 19:32:22