The 2017 International Conference on Applications and Technologies in Information Security

ATIS 2017


Computer Security & Cryptography Security & Trust & Testing



The 2017 International Conference on Applications and Technologies in Information Security (ATIS), will be the eighth event in the ATIS series, which started in 2010.
As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area.
These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.
ATIS 2017 focuses on all aspects on techniques and applications in information security.
Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.
Topics of interest include (but not limited to):
? Attacks against Implementations
- Digital Forensics
- Key Recovery
- Hacking
- Reverse Engineering
? Data Privacy
- Privacy Protection
- Smart device information leaks
- Trusted and Trustworthy Computing
- Privacy Preservation in Data Release
? Evaluation, standards and protocols
- Domain name server security
- Transport Layer Security
- Risk Evaluation and Security Certification
- Security Management
? Security Implementations
- Access Control
- Authentication and Authorization
- Data and System Integrity
- Database Security
- Distributed Systems Security
- Information Hiding and Watermarking Intellectual Property Protection
- Operating System Security
- Intellectual Property Protection
- Key Management
? Tools and Methodologies
- Evaluation of Security
- Evaluation of Security Tools
- Development of Security Tools
? Various Applications
- Electronic Commerce Security
- Cloud Security
- Software Defined Networking
- Digital Forensics
- Internet of Things
- Smartphone Security
- Language-based Security
- Sustainable Practice
- Numerical Modelling
? Vulnerabilities
- Digital Forensics
- Intrusion Detection
- Malicious software
Paper Submissions and Important Dates
The submitted paper should adhere to the double-blind review policy.
All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity.
All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review. Submission is via Easychair at:
https://easychair.org/conferences/?conf=atis2017
Accepted papers will appear in the proceedings to be published by Springer CCIS Series (pending.)
Important dates
? Paper submission: April 2, 2017
? Acceptance/rejection: April 24, 2017
? Camera ready due: May 1, 2017
? Author registration due: May 1, 2017
General Chair
Gang Li, Deakin U., Australia
Organising committee
Lynn Batten, Deakin U., Australia
Judy Chow, Deakin U., Australia
Local Organising committee chair
Julian Jang-Jaccard, Massey U. New Zealand
Program co-chairs
DongSeong Kim, U. of Canterbury, New Zealand
Xuyun Zhang, U. of Auckland, New Zealand
Web chair
Mehmood Baryalai, Massey University
Steering committee
Chair: Lynn Batten, Deakin University, Australia
Heejo Lee, Korea University, Seoul, Korea
Jiqiang Liu, Beijing Jiaotong University, China
Tsutomu Matsumoto, Yokohama National University, Japan
Wenjia Niu, Institute of Information Engineering, Chinese Academy of Sciences, China
Yuliang Zheng, University of Alabama at Birmingham, USA
Jiqiang Liu, Beijing Jiaotong University, China
Secretary: Gang Li, Deakin University, Melbourne, Australia