ACISP 2026: The 31st Australasian Conference on Information Security and Privacy Perth, Australia, July 6-9, 2026 |
| Conference website | https://acisp.org/index.html |
| Submission link | https://easychair.org/conferences/?conf=acisp2026 |
| Submission deadline | February 26, 2026 |
The 31st Australasian Conference on Information Security and Privacy (ACISP 2026) invites submissions of original papers presenting novel research results in all aspects of information security and privacy. This 31st ACISP will take place in Perth. We welcome papers presenting theories, techniques, implementations, applications, and practical experiences on a variety of topics.
ACISP 2026 has two submission rounds. The first round has already closed.
Round 2 Deadline:
- Paper submission: 26 February 2026
- Author notification: 16 April 2026
- Camera Ready: 30 April 2026
Submission Guidelines
Submissions must be written in English, a PDF file using Springer's LNCS package, no more than 20 pages including bibliography, excluding well-marked appendices, and supplementary material. Author instructions and LaTeX/Word templates for LNCS publications can be found via the following link: https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines. Note that reviewers are not required to read the appendices or any supplementary material. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can make decisions without reading appendices. Authors should not change any style of the LNCS format. Submissions not following the required format may be rejected without review.
The proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series. Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference and present their paper.
Papers should be submitted via EasyChair at https://easychair.org/my/conference?conf=acisp2026
List of Topics
- Blockchain technology
- Cryptology
- Database security
- Digital forensics
- Hardware, Side Channels, and Cyber-physical Systems Security
- Machine Learning and Security
- Network security
- Privacy and Anonymity
- Software security
- System security
- Web Security
Systematization of Knowledge (SoK) Papers:
We solicit systematization of knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge for topics of broad interest to the cybersecurity community. Examples of SoK papers include papers that provide an important new viewpoint on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or provide an extensive and realistic evaluation and comparison of competing approaches to solving specific security problems.SoK papers must include the prefix “SoK:” in the title of the paper and will be reviewed by the full PC. They will be accepted based on their treatment of existing work and value to the community.
