logo

July 14 - July 16, 2025

Rank: Australasian B (CORE2023)Offline

Australasian Conference on Information Security and Privacy

Updated: 4 days ago
0.0 (0 Ratings)

No followers yet.

Overview

The 30th Australasian Conference on Information Security and Privacy (ACISP 2025) will be held in Wollongong, Australia on 14-16 July 2025. The conference seeks original papers presenting novel research results in all aspects of information security and privacy. The proceedings will be published by Springer as a volume of the Lecture Notes in Computer Science (LNCS) series.

Call for papers

ACISP 2025: Call for Papers

The 30th Australasian Conference on Information Security and Privacy (ACISP 2025) seeks original papers presenting novel research results in all aspects of information security and privacy. This 30th anniversary of ACISP will take place in its inception of the conference, Wollongong. We welcome papers presenting theories, techniques, implementations, applications and practical experiences on a variety of topics.

Topics of Interest

Topics of interest include, but are not limited to:

  • Access Control
  • AI Security
  • Authentication
  • Blockchain technology
  • Cloud security
  • Cryptology
  • Cyber-physical systems security
  • Database security
  • Digital forensics
  • Key management
  • Lightweight security
  • IoT security
  • Network security
  • Privacy attacks and defenses
  • Privacy enhancing technologies
  • Security implementation
  • Security policy
  • Security protocols
  • Software security
  • System security
  • Trustworthy AI
  • Systematization of Knowledge (SoK) Papers

Systematization of Knowledge (SoK) Papers

This year, we also solicit systematization of knowledge (SoK) papers that evaluate, systematize and contextualize existing knowledge for topics of broad interest to the cybersecurity community. Examples of SoK papers include papers that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or provide an extensive and realistic evaluation and comparison of competing approaches to solving specific security problems.

SoK papers must include the prefix "SoK:" in the title of the paper and will be reviewed by the full PC. They will be accepted based on their treatment of existing work and value to the community.

Important Dates

  • 1st Round Paper Submission Deadline: [Changed or passed: 6 November 2024]
  • Notification of Acceptance: [Changed or passed: 22 January 2025]
  • 2nd Round Paper Submission Deadline: [Changed or passed: 9 February 2025, 23:59 AoE]
  • Notification of Acceptance: [Changed or passed: 8 April 2025]
  • Camera-ready Copy: [Changed or passed: 29 April 2025]
  • Registration for authors: [Changed or passed: 1 May 2025]
  • Conference: 14-16 July 2025

Instructions for Authors

ACISP 2025 will have two rounds of submission. The first round will have the results including reject, major revision, and accept. For the major revision, authors are encouraged to submit the updated manuscripts to round two. Round two only includes accept and reject.

All submissions must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Submissions must be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. Submissions must be written in English and have at most 20 pages including bibliography using Springer's LNCS package with no changes to the style. Submissions can exceed 20 pages, but any content beyond 20 pages should be placed in the Appendix. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can make decisions without reading appendices. Submissions not meeting the submission guidelines risk rejection regardless of their merits.

The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series. Accepted papers will be limited to 20 pages (including bibliography and appendices) in LNCS format. Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.

Author instructions and LaTeX/Word templates for LNCS publications can be found via the following link: https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines

Submission Server

Papers should be submitted via easychair at https://easychair.org/conferences/?conf=acisp2025

Special Issues

The extended version of the selected papers from ACISP 2025 will be invited to special issues on Cryptography.

Important Dates

Conference Dates

Conference Date

July 14, 2025July 16, 2025

Submission

(1st Round) Paper Submission Deadline

November 6, 2024

(2nd Round) Paper Submission Deadline

February 9, 2025

Previously:
  • February 19, 2025

Notification

(1st Round) Notification of Acceptance

January 22, 2025

(2nd Round) Notification of Acceptance

April 8, 2025

Camera-Ready

Camera-ready Copy

April 29, 2025

Registration

Registration for authors

May 1, 2025

Source Rank

Source: CORE2023

Rank: Australasian B

Field of Research: Cybersecurity and privacy

Map

Loading feedback section...