ISPEC 2017

13th International Conference on Information Security Practice and Experience
Melbourne, Australia
13-15 Dec 2017

About ISPEC 2017

The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 13-15 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Singapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), Xi'an, China (2009), Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), Lanzhou, China (2013), Fuzhou, China (2014), Beijing, China (2015), and Zhangjiajie, China (2016). For all sessions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series.

ISPEC 2017 will be co-located with the 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) SocialSec 2017 Website.

News & Updates

Submission due extended
The paper submission deadline for ISPEC 2017 is extended to 20 Aug 2017. Hard Deadline Learn more
Submission system is online
The submission system for ISPEC 2017 is online now. Learn more
Springer publication confirmed
The proceeding of ISPEC 2017 will be published by Springer as a volume of the LNCS series. Learn more
Cluster Computing special issue announced
ISPEC 2017 will have a special issue in Cluster Computing. Learn more
Information Sciences special issue confirmed
ISPEC 2017 will have a special issue in Information Sciences. Learn more
CCPE special issue confirmed
ISPEC 2017 will have a special issue in Concurrency and Computation: Practice and Experience (CCPE). Learn more
FGCS special issue confirmed
ISPEC 2017 will have a special issue in Future Generation Computer Systems (FGCS). Learn more

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

TBA

Andrew Miller
University of Illinois, Urbana-Champaign
USA

Learn More

Abstract

TBA

Biography: Andrew Miller is an Assistant Professor at the University of Illinois, Urbana-Champaign, in Electrical and Computer Engineering and affiliate in Computer Science. He is also an Associate Director of the Initiative for Cryptocurrencies and Contracts (IC3) and an advisor to the zcash project. He received his Ph.D. from the University of Maryland Cybersecurity Center. His research interests are broadly in computer security, and focused on the design of secure decentralized systems and cryptocurrencies. He combines techniques from programming languages, cryptography, and distributed computing.

Secure Storage in the Cloud Using Bespoke Encryption Schemes

Kenny Paterson
Royal Holloway University of London
UK

Learn More

Abstract

In this talk, we'll look at how bespoke encryption schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. Examples of such schemes include Deterministic Encryption and Order Preserving Encryption, as well as more advanced schemes such as Arx (Poddar et al.), the Lewi-Wu scheme, Kerschbaum's FH-OPE scheme, and CipherBase (Arasu et al.). We'll explain why currently proposed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.

Biography: Kenny Paterson is a Professor of Information Security at Royal Holloway University of London in the UK. His research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. He co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. He is now the editor-in-chief of the Journal of Cryptology. He was made a fellow of the IACR (International Association for Cryptologic Research) in 2017.

TBA

Willy Susilo
University of Wollongong
Australia

Learn More

Abstract

TBA

Biography: Willy Susilo is a Professor and the Head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong in Australia. He was previously awarded the prestigious ARC Future Fellow by the Australian Research Council (ARC) and the Researcher of the Year award in 2016 by the University of Wollongong. His main research interests include cybersecurity, cryptography and information security. His work has been cited more than 9,000 times in Google Scholar. He is the Editor-in-Chief of the Information journal. He has served as a program committee member in dozens of international conferences. He is currently serving as an Associate Editors in several international journals, including Elsevier Computer Standards and Interface and International Journal of Information Security (IJIS, Springer). He has published more than 300 research papers in the area of cybersecurity and cryptology.

Blockchain: How crypto meets the industry?

Tsz Hon Yuen
Shield Lab at Huawei Singapore
Singapore

Learn More

Abstract

Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.

Biography: Dr Tsz Hon Yuen is a senior researcher of Shield Lab at Huawei Singapore. He is a member of Cryptography Expert Group in Huawei. He received his PhD degree from University of Wollongong in 2010 and worked in University of Hong Kong before joining Huawei. His current research interests include public key encryption, digital signatures, privacy and blockchain. He has published more than 50 technical papers, including top journals and conferences such as IEEE TC and Eurocrypt. He received the Best Paper Award in ESRORICS 2014. He is also active in industrial fields with more than 10 patents. He has served as the PC members and reviewers for many security and cryptography conferences, workshops and journals.

TBA

Yuliang Zheng
University of Alabama at Birmingham
USA

Learn More

Abstract

TBA

Biography: Yuliang Zheng is known as the father of the signcryption technology which is now an ISO international standard for data security. His pioneering research into the application of one-way hash to immunizing public key encryption against adaptive attacks has been embodied in numerous international standards for public key cryptography, including those from ISO, IEEE and IETF. An internationally recognized authority in cryptography and network security, Professor Zheng has published over 200 scholarly articles and books on security and holds a multiple number of patents in cyber security. He plays an active, leadership role in international research communities, serving as the Chair of the Steering Committee of the Public Key Cryptography (PKC) conferences sponsored by the International Association for Cryptologic Research (IACR). In addition, he served as an associate editor of The Computer Journal published by the Oxford University Press and is on the steering committees for a number of research and industrial forums including Information Security Conference (ISC), IEEE Information Assurance Standards Committee, and Workshop on Long-Term/Information-Theoretic Security. Since July 2015 Professor Zheng has been with the University of Alabama at Birmingham, the United States, serving as the Chair of the Department of Computer Science.

Call For Papers

Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:

  • Cryptology
  • Applied cryptography
  • Mobile security
  • Cloud security
  • Access control
  • Privacy enhanced technology
  • Viruses and malware
  • Software security
  • Database security
  • Web security
  • Operating system security
  • Intrusion detection
  • Big data security and privacy
  • Biometric Security
  • Implementation
  • Network security
  • Key management
  • Security and privacy in ubiquitous computing
  • Formal methods for security
  • Digital forensics
  • Security for critical infrastructures
  • Embedded systems security
  • Lightweight security
  • Smart grid security
  • Cyber security for urban transportation
  • Cyber-physical security
  • Cryptocurrency

Important Dates

Paper Submission Due05 Aug 2017 Extended to 20 Aug (GMT-11 23:59) (Beijing Time 21 Aug 18:59 / Melbourne Time 21 Aug 20:59) Strict! No more extension!
Author Notification21 Sep 2017
Conference Date13-15 Dec 2017

Journal Special Issues

Selected papers presented at the ISPEC 2017 will be invited to consider submission (after significant extension) for special issues in the following journals:

Future Generation Computer Systems (FGCS) Impact Factor: 3.997
Special Issue on Security and Privacy for Cyber-Physical Systems
Learn more
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.133
Special Issue on Security and Privacy in Fog Computing
Learn more
Information Sciences Impact Factor: 4.832
Special Issue on Innovative Smart Methods for Security: Emerging Trends and Research Challenges
Learn more
Cluster Computing Impact Factor: 2.04
Special Issue on Security and Privacy Sensor-Cloud Integration
Learn more

Author Instructions

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.

ISPEC 2017 Submission Link

We are pleased to announce that the proceeding will be published by Springer as a volume of the Lecture Notes in Computer Science (LNCS) series. Auther instructions and LaTeX/Word templates for LNCS publications can be found via the following link.

Springer LNCS Author Information

Accepted Papers

Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016
Masaya Yasuda (Kyushu University, Japan)
Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan)
Masahiko Takenaka (Fujitsu Laboratories LTD, Japan)
Narishige Abe (Fujitsu Laboratories LTD, Japan)
Shigefumi Yamada (Fujitsu Laboratories LTD, Japan)
Junpei Yamaguchi (Kyushu University, Japan)
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-like Ciphers
Xuan Shen (National University of Defense Technology, China)
Ruilin Li (National University of Defense Technology, China)
Bing Sun (National University of Defense Technology, China)
Lei Cheng (National University of Defense Technology, China)
Chao Li (National University of Defense Technology, China)
Maodong Liao (Chinese Academy of Sciences, China)
The KDM-CCA Security of REACT
Jinyong Chang (Peking University, China)
Honglong Dai (Peking University, China)
Maozhi Xu (Peking University, China)
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
Toshiya Shimizu (Fujitsu Laboratories LTD, Japan)
Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan)
Contract Coin: Toward Practical Contract Signing on Blockchain
Haibo Tian, and (Sun yan-sen Univeristy, China)
Jiejie He (Sun yan-sen Univeristy, China)
Li Qing Fu (Sun yan-sen Univeristy, China)
Linearly Homomorphic Signatures with Designated Entities
Cheng-Jun Lin (Fujian Normal University, China)
Xinyi Huang (Fujian Normal University, China)
Shitang Li (Fujian Normal University, China)
Wei Wu (Fujian Normal University, China)
Shao-Jun Yang (Fujian Normal University, China)
Fast discretized Gaussian sampling and post-quantum TLS ciphersuite
Xinwei Gao (Beijing Jiaotong University, China)
Lin Li( Beijing Jiaotong University, China)
Jintai Ding (University of Cincinnati,USA)
Jiqiang Liu( Beijing Jiaotong University, China)
Saraswathy Rv(University of Cincinnati,USA)
Zhe Liu(University of Luxembourg, Luxembourg )
TTP-free Fair Exchange of Digital Signatures with Bitcoin
Wentao Zhang (Beihang university, China)
Qianhong Wu (Beihang university, China)
Bo Qin (Remin University of China, China)
Tianxu Han (Beihang university, China)
Yanting Zhang (Beihang university, China)
Xiaofeng Chen (Xidian university, China)
Na Li (Beihang university, China)
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption
Yang Haomiao (University of Electronic Science and Technology of China, China)
Yunfan Huang (University of Electronic Science and Technology of China, China)
Yong Yu ( Shaanxi Normal University)
Mingxuan Yao(University of Electronic Science and Technology of China, China)
Xiaosong Zhang(University of Electronic Science and Technology of China, China)
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key
Bo Lv (South China University of Technology, China)
Zhiniang Peng (South China University of Technology, China)
Shaohua Tang(South China University of Technology, China)
A User-Friendly Centrally Banked Cryptocurrency
Xuan Han (University of Chinese Academy of Sciences, China)
Yamin Liu (University of Chinese Academy of Sciences, China)
Haixia Xu (University of Chinese Academy of Sciences, China)
Compact Lossy and All-but-One Trapdoor Functions from Lattice
Leixiao Cheng, and (Fudan University, China)
Quanshui Wu (Fudan University, China)
Yunlei Zhao (Fudan University, China)
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
Jinwoo Kim (Sungkyunkwan University, South Korea)
Kuyju Kim (Sungkyunkwan University, South Korea)
Junsung Cho (Sungkyunkwan University, South Korea)
Hyoungshick Kim(Sungkyunkwan University, South Korea)
Sebastian Schrittwieser(Saint Polten University, Australia)
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
Kai He (Dongguan University of Technology, China)
Xueqiao Liu (University of Wollongong, Australia)
Huaqiang Yuan (Dongguan University of Technology, China)
Wenhong Wei (Dongguan University of Technology, China)
Kaitai Liang(Manchester Metropolitan University, United Kingdom)
Efficient Certicate-Based Signature and Its Aggregation
Xinxin Ma (Zhejiang Gongshang University, China)
Jun Shao (Zhejiang Gongshang University, China)
Cong Zuo (Monash University, Australia)
Ru Meng (Shannxi Normal University, China)
Group-based Source-destination Verifiable Encryption with Blacklist Checking
Zhongyuan Yao (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing
Jian Shen (Nanjing University of Information Science and Technology, China)
Meng Feng (Nanjing University of Information Science and Technology, China)
Dengzhi Liu(Nanjing University of Information Science and Technology, China)
Chen Wang(Nanjing University of Information Science and Technology, China)
Jiachen Jiang(Nanjing University of Information Science and Technology, China)
Xingming Sun(Nanjing University of Information Science and Technology, China)
EyeSec: A practical shoulder-surfing resistant gaze-based authentication system
Na Li (Beihang University, China)
Qianhong Wu (Beihang University, China)
Jingwen Liu (Potevio Information Technology Co., Ltd, China)
Wei Hu (Potevio Information Technology Co., Ltd, China)
Bo Qin (Renmin University of China, China)
Outsourced Privacy Preserving Random Decision Tree Algorithm under Multi-Parties for Sensor-Cloud Integration
Li Ye (Harbin Institute of Technology Shenzhen Graduate School, China)
Zoe L. Jiang (Harbin Institute of Technology, China)
Xuan Wang (Harbin Institute of Technology Shenzhen Graduate School, China)
Siu Ming Yiu (The University of Hong Kong, Hong Kong)
Junbin Fang (Jinan University, China)
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
Yu Sasaki (NTT Corporation, Japan)
Kan Yasuda (NTT Corporation, Japan)
Secure Communication in Unmanned Aerial Vehicle Network
Shuangyu He (Beihang university, China)
Qianhong Wu (Beihang university, China)
Jingwen Liu (Potevio Information Technology Co., Ltd, China)
Wei Hu (Potevio Information Technology Co., Ltd, China)
Bo Qin (Renmin University of China, China)
Ya-Nan Li (Beihang university, China)
Outsourcing Encrypted Excel System
Ya-Nan Li (Beihang University, China)
Qianhong Wu (Beihang University, China)
Wenyi Tang (Renmin University of China, China)
Bo Qin (Renmin University of China, China)
Qin Wang (Beihang University, China)
Meixia Miao (State Key Laboratory of Integrated Service Networks Xidian University, China)
Defending Application Cache Integrity of Android Runtime
Jia Wan (Queen's University, Canada)
Mohammad Zulkernine (Queen's University, Canada)
Phil Eisen (Irdeto Corporation, Canada)
Clifford Liem (Irdeto Corporation, Canada)
On the Security of In-Vehicle Hybrid Network: Status and Challenges
Tianxiang Huang (Chongqing University of Posts and Telecommunications, China)
Jianying Zhou (Singapore University of Technology and Design, Singapore)
Yi Wang (Continental Automotive Singapore Pte Ltd , Singapore)
Anyu Cheng (Chongqing University of Posts and Telecommunications, China)
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clementine Gritti (EURECOM Sophia Antipolis, France)
Rongmao Chen (National University of Defense Technology, China)
Willy Susilo (University of Wollongong, Australia)
Thomas Plantard (University of Wollongong, Australia)
A lattice-based approach to Privacy-Preserving Biometric Authentication without relying on trusted third parties
Trung Dinh (Monash University, Australia)
Ron Steinfeld (Monash University, Australia)
Nandita Bhattacharjee (Monash University, Australia)
A Formal Model for an Ideal CFI
Sepehr Minagar (Monash University, Australia)
Balasubramaniam Srinivasan (Monash University, Australia)
Phu Dung Le (Monash University, Australia)
Covert QR Codes: How to Hide in the Crowd
Yang-Wai Chow (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Joonsang Baek (University of Wollongong, Australia)
A Practical Authentication Protocol for Anonymous Web Browsing
Xu Yang (RMIT University, Australia)
Xun Yi (RMIT University, Australia)
Hui Cui (RMIT University, Australia)
Xuechao Yang (RMIT University, Australia)
Surya Nepal (CSIRO, Australia)
Xinyi Huang (Fujian Normal University, China)
Yali Zeng (Fujian Normal University, China)
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries
Yanjun Shen (Monash University, Australia)
Peng Zhang (Shenzheng University)
Verifiable Range Query Processing for Cloud Computing
Yanling Li (Jinan University, China)
Junzuo Lai (Jinan University, China)
Chuansheng Wang (Jinan University, China)
Jianghe Zhang (Jinan University, China)
Jie Xiong (Jinan University, China)
Key Bit-dependent Attack on Protected PKC using a Single-Trace
Bo-Yeon Sim (Kookmin University, South Korea)
Dong-Guk Han (Kookmin University, South Korea)
New Proof for BKP IBE Scheme and Improvement in the MIMC setting
Song Luo (Chongqing University of Technology, China)
Lu Yan (Chongqing University of Technology, China)
Jian Weng (Jinan University, China)
Zheng Yang (Chongqing University of Technology, China)
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks
Ting Chen (University of Electronic Science and Technology of China, China)
Xiaoqi Li (The Hong Kong Polytechnic University, Hong Kong)
Ying Wang (University of Electronic Science and Technology of China, China)
Jiachi Chen (The Hong Kong Polytechnic University, Hong Kong)
Zihao Li (University of Electronic Science and Technology of China, China)
Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Xiaosong Zhang (University of Electronic Science and Technology of China, China)

Short Papers

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation
Lu Ren (Information Engineering University, China)
Rui Chang (Information Engineering University, China)
Qing Yin (Information Engineering University, China)
Wei Wang(Information Engineering University, China)
Home Location Protection in Mobile Social Networks: A Community based Method
Bo Liu (La Trobe University, Australia)
Wanlei Zhou (Deakin University, Australia)
Shui Yu (Deakin University, Australia)
Kun Wang(Nanjing University of Posts and Telecommunications, China)
Yu Wang (Guangzhou University, China)
Yong Xiang (Deakin University, Australia)
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption
Pradeep Kumar Mishra (Kyushu University, Japan)
Dung Hoang Duong (Kyushu University, Japan)
Masaya Yasuda (Kyushu University, Japan)
Matching function-call graph of binary codes and its applications
Yong Tang (National University of Defense Technology, China)
Yi Wang (National University of Defense Technology, China)
Shuning Wei (Hunan Normal University, China)
Xin Yu (National University of Defense Technology, China)
Qiang Yang (National University of Defense Technology, China)
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing
Hooman Alavizadeh (Massey University, New Zealand)
Dong Seong Kim (University of Canterbury, New Zealand)
Jin B. Hong (University of Canterbury, New Zealand)
Julian Jang-Jaccard (Massey University, New Zealand)
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks
Zhi Wang (Nankai University, China)
Jia Chunfu (Nankai University, China)
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang (Chalmers University of Technology, Sweden)
Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden)
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving
Zhuo Wei (Shield Lab, Huawei, Singapore)
Yanjiang Yang (Shield Lab, Huawei, Singapore)
Yasmin Rehana (Shield Lab, Huawei, Singapore)
Yongdong Wu (I2R, Astar, Singapore)
Jian Weng (Jinan University, China)
Robert H. Deng (Singapore Management University, Singapore )
A New Functional Encryption for Multidimensional Range Query
Jia Xu (SingTel, Singapore)
Ee-Chien Chang (National University of Singapore, Singapore)
Jianying Zhou (SUTD, Singapore)
Compact Attribute-Based and Online-Offline Multi-Input Inner Product Encryptions from Static Assumptions
Pratish Datta (NTT Secure Platform Laboratories, Japan)
Relevance Filtering for Shared Cyber Threat Intelligence
Thomas Wagner (Birmingham City University, United Kingdom)
Esther Palomar (Birmingham City University, United Kingdom)
Khaled Mahbub (Birmingham City University, United Kingdom)
Ali Abdallah (Birmingham City University, United Kingdom)
Automatic encryption schemes based on the neural networks: analysis and discussions on the various adversarial models
Yidan Zhang (CCNU, China)
James Marino (CCNU, China)
Jiageng Chen (CCNU, China)
Chunhua Su (Aizu University, Japan)
Jinguang Han (University of Surrey, United Kingdom)
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment
Mei-Ling Chiang (National Chi-Nan University, Taiwan)
Jian-Kai Wang (Chang Gung University, Taiwan)
Li-Chi Feng (Chang Gung University, Taiwan)
Yang-Sen Chen (National Chi-Nan University, Taiwan)
You-Chi Wang (Chang Gung University, Taiwan)
Wen-Yu Kao (National Chi-Nan University, Taiwan)
Enforcing Security in Artificially Intelligent Robots using Monitors
Orhio Creado (Monash University, Australia)
Phu Dung Le (Monash University, Australia)

Registration Information

Full registration payment is required by 13 October 2017 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 13 October 2017 will result in the exclusion of the papers from the Conference Proceedings.

Registration Fee

Registration Fee (in Australian Dollar)By 13 October 2017After 13 October 2017
Full Registration$990$1090
Student Registration$790N/A
Extra Page (per page)$100N/A
Additional Conference Banquet Ticket (per person)$130$130

Both types of registration include: full attendance of the conference, conference proceedings, welcome reception, conference banquet, morning teas, afternoon teas and lunches.

Student Registration

To be qualified for student registration, you must be currently enrolled as a full time student in a university or an institution. A scanned copy of your valid student ID card must be sent to the conference secretary (abby.xu@insightek.com.au). The student status will be verified.

Please note that if you are the only author registered for an accepted paper, you should choose Full Registration (instead of Student Registration) even though you are a student.

Extra Page Costs

We strongly recommend all authors to format the papers within the page limits specified below. If extra pages are required, payment of $100 per extra page needs to be made together with the conference registration fee.

  • Full papers are limited to 20 pages with maximum 2 extra pages (up to 22 pages in total).
  • Short papers are limited to 10 pages with maximum 2 extra pages (up to 12 pages in total).

Conference Banquet Tickets

A conference banquet ticket is included in both full registration and student registration. Additional conference banquet tickets are available for purchase at the cost of $130 per person. Payment needs to be made together with the conference registration fee.

Invitation Letter

If you need an invitation letter, please contact the conference secretary (abby.xu@insightek.com.au) AFTER you complete the registration. The invitation letter can be issued once your registration payment is received.

Receipts

Hard copy registration receipts can be collected at the reception desk during the conference.

Cancellation Policy

Registration for the conference cannot be canceled. There is no refund of registration fees.

Registration Method

Please click the following link to complete your registration.

ISPEC 2017 Registration System

  • PAPER ID: For non-author registrations, please use "999" for Paper ID in corresponding parts.
  • PAPER Title: For non-author registrations, please use "No Paper" for Paper Title in corresponding parts.
  • NOTE: You may ignore the "IEEE Member ID" entry as this conference does not provide any discount for IEEE members.

Payment via Credit Card or Paypal

Payment via credit card or PayPal can be made directly in the registration system.

Payment via Bank Transfer

Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.

Account nameInsightek
Bank NameCommonwealth Bank of Australia
Address of Insightek2B Service Road, Blackburn, VIC 3130, Australia
SWIFT codeCTBAAU2S
BSB/Account No063182 10939649
  • TRANSFER NOTE: Please include a note on the bank transfer indicating your name and paper ID.
  • TRANSFER COST: Bank transfer and other related fees have to be paid by the registrant. Please verify carefully during the transfer that all costs are charged to the sender and the correct amount will be received at the above account. Alternatively, please add extra $20.00 to the total amount of registration fee to cover the transfer cost.

After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.

Organising Committee

General Co-chairs

Robert Deng, Singapore Management University, Singapore
Yang Xiang, Swinburne University, Australia
Wanlei Zhou, Deakin University, Australia

Program Co-Chairs

Joseph K. Liu, Monash University, Australia
Pierangela Samarati, Università degli Studi di Milano, Italy

Publicity Chair

Yu Wang, Deakin University, Australia

Program Committee

Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, University of Wollongong, Australia
Zubair Baig, Edith Cowan University, Australia
Carlo Blundo, Università degli Studi di Salerno, Italy
Colin Boyd, Norwegian University of Science and Technology, Norway
Alvaro Cardenas, University of Texas at Dallas, US
Aniello Castiglione, University of Salerno, Italy
Jinjun Chen, Swinburne University, Australia
Liqun Chen, University of Surrey, UK
Xiaofeng Chen, Xidian University, China
Raymond Choo, University of Texas at San Antonio, US
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Sara Foresti, DI - Università degli Studi di Milano, Italy
Angelo Genovese, Università degli Studi di Milano, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Andreas Holzer, University of Toronto, Canada
Xinyi Huang, Fujian Normal University, China
Mitsugu Iwamoto, University of Electro-Comminications, Japan
Julian Jang-Jaccard, Massey University, New Zealand
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Ryan Ko, University of Waikato, New Zealand
Noboru Kunihiro, The University of Tokyo, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Junzuo Lai, Jinan University, China
Costas Lambrinoudakis, University of Piraeus, Greece
Albert Levi, Sabanci University, US
Li Li, University of Luxembourg, Luxembourg
Ming Li, University of Arizona, US
Kaitai Liang, Manchester Metropolitan University, UK
Joseph Liu, Monash University, Australia
Shengli Liu, Shanghai Jiao Tong University, China
Zhe Liu, University of Luxembourg, Luxembourg
Giovanni Livraga, Università degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Rongxing Lu, University of New Brunswick, Canada
Jiqiang Lu, Institute for Infocomm Research, Singapore
Chris Mitchell, Royal Holloway, University of London, UK
Yi Mu, University of Wollongong, Australia
Josef Pieprzyk, Queensland University of Technology, Australia
Sushmita Ruj, Indian Statistical Institute, India
Pierangela Samarati, Università degli Studi di Milano, Italy
Jun Shao, Zhejiang Gongshang University, China
Taeshik Shon, Ajou univ, Korea
Ron Steinfeld, Monash University, Australia
Chunhua Su, University of Aizu, Japan
Willy Susilo, University of Wollongong, Australia
Cong Wang, City University of Hong Kong, Hong Kong
Ding Wang, Peking University, China
Guilin Wang, Huawei, Singapore
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Qianhong Wu, Beihang University, China
Guomin Yang, University of Wollongong, Australia
Yanjiang Yang, Huawei, Singapore
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Masaya Yasuda, Kyushu University, Japan
Jiangshan Yu, University of Luxembourg, Luxembourg
Yong Yu, Shaanxi Normal University, China
Tsz Hon Yuen, Huawei, Singapore

Venue

ISPEC 2017 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from Southern Cross Station.

Nearby Hotels

5 Star

4 Star

3 Star

Backpackers

All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.

Location

Melbourne: The Most Liveable City

Deakin Univesity
CCSR
Huawei
Monash University