ISPEC 2017

13th International Conference on Information Security Practice and Experience
Melbourne, Australia
13-15 Dec 2017

About ISPEC 2017

The 13th International Conference on Information Security Practice and Experience (ISPEC 2017) will be held in Melbourne on 13-15 Dec 2017, organised by Deakin University and Monash University. The ISPEC conference is an established forum that brings together researchers and practitioners to provide a confluence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Singapore (2005), Hangzhou, China (2006), Hong Kong, China (2007), Sydney, Australia (2008), Xi'an, China (2009), Seoul, Korea (2010), Guangzhou, China (2011), Hangzhou, China (2012), Lanzhou, China (2013), Fuzhou, China (2014), Beijing, China (2015), and Zhangjiajie, China (2016). For all sessions, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series.

ISPEC 2017 will be co-located with the 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2017) SocialSec 2017 Website.

News & Updates

Conference proceedings are online NEW
Free access to the ISPEC 2017 proceedings is available at Springer Link from 11 Dec 2017 to 11 Jan 2018. Proceedings
Submission due extended
The paper submission deadline for ISPEC 2017 is extended to 20 Aug 2017. Learn more
Submission system is online
The submission system for ISPEC 2017 is online now. Learn more
Springer publication confirmed
The proceeding of ISPEC 2017 will be published by Springer as a volume of the LNCS series. Learn more
Cluster Computing special issue announced
ISPEC 2017 will have a special issue in Cluster Computing. Learn more
Information Sciences special issue confirmed
ISPEC 2017 will have a special issue in Information Sciences. Learn more
CCPE special issue confirmed
ISPEC 2017 will have a special issue in Concurrency and Computation: Practice and Experience (CCPE). Learn more
FGCS special issue confirmed
ISPEC 2017 will have a special issue in Future Generation Computer Systems (FGCS). Learn more

Keynote Speakers

Note: The order of speakers is sorted according to the alphabetical order of surname.

Mind the Gap: Application-driven evaluation of Smart Contract languages

Andrew Miller
University of Illinois, Urbana-Champaign
USA

Learn More

Abstract

The past year has seen a proliferation of smart contracts systems --- program code on a cryptocurrency blockchain that moves around money. Ethereum is the most well known smart contract platform, though there are also many others. How can we evaluate the expressiveness of smart contract programming languages? In this talk, I'll present a line of research that takes several applications as case studies (a random coin flipping gadget, fair off-chain multiparty computations, and payment channel networks) and attempts to implement them in both Bitcoin script (UTXO-based) and in Ethereum (contract-based). In each setting, we find that the UTXO-based framework requires additional asymptotic overhead compared to Ethereum (either time, computing power, or locked-up collateral).

Biography: Andrew Miller is an Assistant Professor at the University of Illinois, Urbana-Champaign, in Electrical and Computer Engineering and affiliate in Computer Science. He is also an Associate Director of the Initiative for Cryptocurrencies and Contracts (IC3) and an advisor to the zcash project. He received his Ph.D. from the University of Maryland Cybersecurity Center. His research interests are broadly in computer security, and focused on the design of secure decentralized systems and cryptocurrencies. He combines techniques from programming languages, cryptography, and distributed computing.

Secure Storage in the Cloud Using Bespoke Encryption Schemes

Kenny Paterson
Royal Holloway University of London
UK

Learn More

Abstract

In this talk, we'll look at how bespoke encryption schemes can be used to store data in encrypted form at cloud service providers while still allowing various forms of search queries to be carried out against the data. Examples of such schemes include Deterministic Encryption and Order Preserving Encryption, as well as more advanced schemes such as Arx (Poddar et al.), the Lewi-Wu scheme, Kerschbaum's FH-OPE scheme, and CipherBase (Arasu et al.). We'll explain why currently proposed schemes provide insufficient security in practice, and discuss methods by which security can be enhanced whilst preserving search capabilities.

Biography: Kenny Paterson is a Professor of Information Security at Royal Holloway University of London in the UK. His research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. He co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. He is now the editor-in-chief of the Journal of Cryptology. He was made a fellow of the IACR (International Association for Cryptologic Research) in 2017.

Security Proof of Digital Signatures

Willy Susilo
University of Wollongong
Australia

Learn More

Abstract

Digital signatures are the foundation of modern cryptography. We prove the security of a signature scheme by reducing an attack to solving an underlying hard problem. An ideal security reduction should be a tight reduction under a standard assumption in the standard security model without random oracles. Unfortunately, it is hard to program a security reduction capturing the above four features. In this talk, I will focus on tight reduction for digital signatures and introduce two different methods towards tight reduction.

Biography: Willy Susilo is a Professor and the Head of School of Computing and Information Technology and the director of Institute of Cybersecurity and Cryptology (iC2) at the University of Wollongong in Australia. He was previously awarded the prestigious ARC Future Fellow by the Australian Research Council (ARC) and the Researcher of the Year award in 2016 by the University of Wollongong. His main research interests include cybersecurity, cryptography and information security. His work has been cited more than 9,000 times in Google Scholar. He is the Editor-in-Chief of the Information journal. He has served as a program committee member in dozens of international conferences. He is currently serving as an Associate Editors in several international journals, including Elsevier Computer Standards and Interface and International Journal of Information Security (IJIS, Springer). He has published more than 300 research papers in the area of cybersecurity and cryptology.

Blockchain: How crypto meets the industry?

Tsz Hon Yuen
Shield Lab at Huawei Singapore
Singapore

Learn More

Abstract

Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.

Biography: Dr Tsz Hon Yuen is a senior researcher of Shield Lab at Huawei Singapore. He is a member of Cryptography Expert Group in Huawei. He received his PhD degree from University of Wollongong in 2010 and worked in University of Hong Kong before joining Huawei. His current research interests include public key encryption, digital signatures, privacy and blockchain. He has published more than 50 technical papers, including top journals and conferences such as IEEE TC and Eurocrypt. He received the Best Paper Award in ESRORICS 2014. He is also active in industrial fields with more than 10 patents. He has served as the PC members and reviewers for many security and cryptography conferences, workshops and journals.

How to Control Access to Thousands of Shared IoT Devices

Yuliang Zheng
University of Alabama at Birmingham
USA

Learn More

Abstract

The emerging Internet of Things (IoT) promises a highly connected world where tangible things around us are seamlessly integrated into the ever expanding cyber space, which is expected to result in greatly improved quality of life and economic growth. To realize those benefits, it is important for the IoT to have strong security and privacy measures built into it. This presents a number of challenges both at technical and system levels. This talk focuses on our research into controlling access to thousands or more of shared, resource-constrained IoT devices that are orders of magnitude more numerous than the number of passwords a typical person has to manage now. Specific research goals include:

  • Simplicity: the methods are convenient to use by average users.
  • Scalability: the methods allow users to access thousands or even millions of devices with ease.
  • Shared access: the methods afford shared access and control of devices.
  • Adaptability to dynamic changes: the methods can be adapted to an increase or decrease in users as well as in devices.

Biography: Dr. Yuliang Zheng is widely known as the father of the signcryption technology which is now an ISO international standard for cyber security. His pioneering research in immunizing public key encryption against adaptive attacks has been embodied in a multiple number of industry standards including those from ISO, IEEE and IETF.

A prolific researcher with more than 200 refereed publications, Dr. Zheng has been at the forefront ofestablishing international standards for cryptographic engineering. His more recent research focus is on leveraging the Internet of Things, blockchains and Big Data to accelerate the progress of precision medicine.

He plays an active, leadership role in international research communities, co-founding the annual Public Key Cryptography (PKC) conference sponsored by the International Association for Cryptologic Research (IACR) and the annual International Conference on Information Theoretic Security (ICITS). In addition, he serves on the steering committees for a number of research and industrial forums including PKC (Chair of the PKC steering committee since 2007), International Conference on Information Theoretic Security, Information Security Conference, IEEE Security in Storage Workshop and IEEE Information Assurance Standards Committee.

Dr. Zheng was invited to serve as an associate editor of The Computer Journal published by the Oxford University Press and as a guest editor for the IEEE Transactions on Information Theory.

Dr. Yuliang Zheng earned his Bachelor's degree in computer science from Nanjing Institute of Technology (renamed Southeast University 1988), Nanjing, China in 1982. He completed his graduate studies at Yokohama National University in Japan, where he earned his master's and PhD degrees both in electrical and computer engineering, in 1988 and 1991 respectively. After completing his PhD, Dr. Zheng moved to Australia, working at first as a cyber security research scientist at the Australian Defense Force Academy, and then as a professor at the University of Wollongong and Monash University. In 2001, Dr. Zheng was recruited by a joint effort between Bank of America, Wachovia Bank (now part of Wells Fargo) and the University of North Carolina at Charlotte (UNCC) to establish and lead a research center for financial cyber security at UNCC. Since July 2015 he has been with the University of Alabama at Birmingham, serving as the Chair of UAB’s Department of Computer Science.

Conference Schedule

13 Dec14 Dec15 Dec
Room 1Room 2Room 1Room 2Room 1Room 2
All Day Registration
OpeningSess. 6SocialSecSess. 10Sess. 11
Keynote 1Keynote 4
Keynote 2Keynote 5Keynote 8
Coffee Break
Sess. 1MONAMIKeynote 6Keynote 9
Sess. 2Sess. 7SocialSecHuawei Panel - IoT Sec
Lunch
Keynote 3Keynote 7Keynote 10
Sess. 3MONAMIPanel - BlockchainSess. 12MONAMI
Coffee Break
Sess. 4MONAMISess. 8MONAMISess. 13MONAMI
Sess. 5Sess. 9Sess. 14SocialSec
Welcome ReceptionConference BanquetClosing
TimeRoom 1Room 2
08:00-08:45Registration
08:45-09:10Opening
09:10-09:50Keynote 1
09:50-10:30Keynote 2
10:30-10:50Coffee Break
10:50-11:45Lattice CryptoMONAMI
11:45-12:40Searchable Enc
12:50-13:50Lunch
13:50-14:30Keynote 3
14:30-15:55S/W Sec & TrustedMONAMI
15:55-16:15Coffee Break
16:15-17:20Network SecurityMONAMI
17:20-18:15Social & QR Sec
18:30-20:00Welcome Reception
TimeRoom 1Room 2
08:30-09:10Asymmetric Enc (1)SocialSec
09:10-09:50Keynote 4
09:50-10:30Keynote 5
10:30-11:00Coffee Break
11:00-11:40Keynote 6
11:40-13:00BlockchainSocialSec
13:00-14:00Lunch
14:00-14:40Keynote 7
14:40-16:00Panel Discussion - Blockchain
16:00-16:30Coffee Break
16:30-17:10Asymmetric Enc (2)MONAMI
17:10-18:25Signature
19:00-22:00Conference Banquet
TimeRoom 1Room 2
08:35-09:50Asymmetric Enc (3)Cloud Security
09:50-10:30Keynote 8
10:30-11:00Coffee Break
11:00-11:40Keynote 9
11:40-13:00Huawei Panel Discussion - IoT Sec
13:00-14:00Lunch
14:00-14:40Keynote 10
14:40-15:50Cyber-Physical SecMONAMI
15:50-16:20Coffee Break
16:20-17:20AuthenticationMONAMI
17:20-18:20Symmetric EncSocialSec
18:20-18:30Closing

Note: For details of MONAMI and SocialSec sessions, please refer to MONAMI and SocialSec.

Technical Program

ISPEC Keynotes
[Room 1]
Keynote 3 (13 Dec) 13:50-14:30
Security Proof of Digital Signatures Learn more
Willy Susilo, University of Wollongong, Australia
Session Chair: Kaitai Liang, University of Surrey, UK
Keynote 5 (14 Dec) 09:50-10:30
Secure Storage in the Cloud Using Bespoke Encryption Schemes Learn more
Kenny Paterson, Royal Holloway University of London, UK
Session Chair: Willy Susilo, University of Wollongong, Australia
Keynote 6 (14 Dec) 11:00-11:40
Mind the Gap: Application-driven evaluation of Smart Contract languages Learn more
Andrew Miller, University of Illinois, Urbana-Champaign, USA
Session Chair: Joseph Liu, Monash University, Australia
Keynote 7 (14 Dec) 14:00-14:40
Blockchain: How crypto meets the industry? Learn more
Tsz Hon Yuen,Shield Lab at Huawei Singapore, Singapore
Session Chair: Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Keynote 9 (15 Dec) 11:00-11:40
How to Control Access to Thousands of Shared IoT Devices Learn more
Yuliang Zheng, University of Alabama at Birmingham, USA
Session Chair: Ron Steinfeld, Monash University, Australia
MONAMI Keynotes
[Room 1]
Keynote 1 (13 Dec) 09:10-09:50
Privacy in Location Based Services Learn more
Wanlei Zhou, Deakin University, Australia
Keynote 2 (13 Dec) 09:50-10:30
Towards Reliable, Secure and Efficient Energy Supply with Large Renewable Energy at Affordable Price Learn more
Joe Dong, UNSW, Sydney
Keynote 4 (14 Dec) 09:10-09:50
Intermediate- and High-Level Structure Matching and Its Application in Biometrics Learn more
Yongsheng Gao, Griffith University, Australia
Keynote 8 (15 Dec) 09:50-10:30
Fuzzy Transfer Learning for Prediction Learn more
Jie Lu, University of Technology Sydney, Australia
Keynote 10 (15 Dec) 14:00-14:40
Networking for Big Data: Challenges and Opportunities Learn more
Shui Yu, Deakin University, Australia
Panel Discussion - Blockchain
14:40-16:00 (14 Dec) [Room 1]
Joseph Liu (Chair)
Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab
Monash University, Australia

Man Ho Au (Allen)
Co-Director, Monash-HKPU-Collinstar Blockchain Research Lab
Hong Kong Polytechnic University, Hong Kong

Tsz Hon Yuen (John)
Senior Researcher
Shield Lab at Huawei Singapore, Singapore

Andrew Miller
Assistant Professor, Advisor Zcash
University of Illinois, Urbana-Champaign, USA

Khal Achkar
Chief Technology Officer
Hcash Foundation, Australia

Jacob Cheng
Chief Executive Officer
Hyperchain, Australia
Huawei Panel Discussion - IoT Sec
11:40-13:00 (15 Dec) [Room 1]
Robert Deng (Chair)
Professor, IEEE Fellow
Singapore Management University, Singapore

Tieyan Li
Head of Mobile IoT Security
Shield Lab at Huawei Singapore, Singapore

Kenny Paterson
Professor
Royal Holloway University of London, UK

Yuliang Zheng
Professor
University of Alabama at Birmingham, USA

Carsten Rudolph
Director, Oceania Cyber Security Centre
Monash University, Australia
Session 1: Lattice-Based Cryptography
10:50-11:45 (13 Dec) [Room 1]
Session Chair: Amin Sakzad
Compact Lossy and All-but-One Trapdoor Functions from Lattice Full Paper: 20 mins
Leixiao Cheng, Quanshui Wu and Yunlei Zhao
A lattice-based approach to Privacy-Preserving Biometric Authentication without relying on trusted third parties Full Paper: 20 mins
Trung Dinh, Ron Steinfeld and Nandita Bhattacharjee
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption Short Paper: 15 mins
Pradeep Kumar Mishra, Dung Hoang Duong and Masaya Yasuda
Session 2: Searchable Encryption
11:45-12:40 (13 Dec) [Room 1]
Session Chair: Xingliang Yuan
Verifiable Range Query Processing for Cloud Computing Full Paper: 20 mins
Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang and Jie Xiong
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries Full Paper: 20 mins
Yanjun Shen and Peng Zhang
A New Functional Encryption for Multidimensional Range Query Short Paper: 15 mins
Jia Xu, Ee-Chien Chang and Jianying Zhou
Session 3: Software Security and Trusted Computing
14:30-15:55 (13 Dec) [Room 1]
Session Chair: Daniel Luo
A Formal Model for an Ideal CFI Full Paper: 20 mins
Sepehr Minagar, Balasubramaniam Srinivasan and Phu Dung Le
Defending Application Cache Integrity of Android Runtime Full Paper: 20 mins
Jia Wan, Mohammad Zulkernine, Phil Eisen and Cli ord Liem
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks Short Paper: 15 mins
Zhi Wang and Jia Chunfu
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation Short Paper: 15 mins
Lu Ren, Rui Chang, Qing Yin and Wei Wang
Matching function-call graph of binary codes and its applications Short Paper: 15 mins
Yong Tang, Yi Wang, Shuning Wei, Xin Yu and Qiang Yang
Session 4: Network Security
16:15-17:20 (13 Dec) [Room 1]
Session Chair: Yu Wang
Fast discretized Gaussian sampling and post-quantum TLS ciphersuite Full Paper: 20 mins
Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, Saraswathy Rv and Zhe Liu
Automatic encryption schemes based on the neural networks: analysis and discussions on the various adversarial models Short Paper: 15 mins
Yidan Zhang, James Marino, Jiageng Chen, Chunhua Su and Jinguang Han
Relevance Filtering for Shared Cyber Threat Intelligence Short Paper: 15 mins
Thomas Wagner, Esther Palomar, Khaled Mahbub and Ali Abdallah
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment Short Paper: 15 mins
Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang and Wen-Yu Kao
Session 5: Social Network and QR Code Security
17:20-18:15 (13 Dec) [Room 1]
Session Chair: Cheng-Kang Chu
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook Full Paper: 20 mins
Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim and Sebastian Schrittwieser
Covert QR Codes: How to Hide in the Crowd Full Paper: 20 mins
Yang-Wai Chow, Willy Susilo and Joonsang Baek
Home Location Protection in Mobile Social Networks: A Community based Method Short Paper: 15 mins
Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang and Jin Li
Session 6: Asymmetric Enc (1)
08:30-09:10 (14 Dec) [Room 1]
Session Chair: Peng Zhang
The KDM-CCA Security of REACT Full Paper: 20 mins
Jinyong Chang, Honglong Dai and Maozhi Xu
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption Full Paper: 20 mins
Yang Haomiao, Yunfan Huang, Yong Yu, Mingxuan Yao and Xiaosong Zhang
Session 7: Blockchain
11:40-13:00 (14 Dec) [Room 1]
Session Chair: Tsz Hon Yuen
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks Full Paper: 20 mins
Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au and Xiaosong Zhang
A User-Friendly Centrally Banked Cryptocurrency Full Paper: 20 mins
Xuan Han, Yamin Liu and Haixia Xu
Contract Coin: Toward Practical Contract Signing on Blockchain Full Paper: 20 mins
Haibo Tian, Jie Jie He and Li Qing Fu
TTP-free Fair Exchange of Digital Signatures with Bitcoin Full Paper: 20 mins
Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen and Na Li
Session 8: Asymmetric Enc (2)
16:30-17:10 (14 Dec) [Room 1]
Session Chair: Yong Yu
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing Full Paper: 20 mins
Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei and Kaitai Liang
New Proof for BKP IBE Scheme and Improvement in the MIMC setting Full Paper: 20 mins
Song Luo, Lu Yan, Jian Weng and Zheng Yang
Session 9: Signature
17:10-18:25 (14 Dec) [Room 1]
Session Chair: Shi-Feng Sun
Linearly Homomorphic Signatures with Designated Entities Full Paper: 20 mins
Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu and Shao-Jun Yang
Efficient Certicate-Based Signature and Its Aggregation Full Paper: 20 mins
Xinxin Ma, Jun Shao, Cong Zuo and Ru Meng
Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016 Full Paper: 20 mins
Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada and Junpei Yamaguchi
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation Short Paper: 15 mins
Bei Liang and Aikaterini Mitrokotsa
Session 10: Asymmetric Enc (3)
08:35-09:50 (15 Dec) [Room 1]
Session Chair: Chunhua Su
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key Full Paper: 20 mins
Bo Lv, Zhiniang Peng and Shaohua Tang
Key Bit-dependent Attack on Protected PKC using a Single-Trace Full Paper: 20 mins
Bo-Yeon Sim and Dong-Guk Han
Group-based Source-destination Verifiable Encryption with Blacklist Checking Full Paper: 20 mins
Zhongyuan Yao, Yi Mu and Guomin Yang
Compact Attribute-Based and Online-Offline Multi-Input Inner Product Encryptions from Static Assumptions Short Paper: 15 mins
Pratish Datta
Session 11: Cloud Security
08:35-09:50 (15 Dec) [Room 2]
Session Chair: Jiageng Chen
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy Full Paper: 20 mins
Clementine Gritti, Rongmao Chen, Willy Susilo and Thomas Plantard
Outsourcing Encrypted Excel System Full Paper: 20 mins
Ya-Nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang and Meixia Miao
Outsourced Privacy Preserving Random Decision Tree Algorithm under Multi-Parties for Sensor-Cloud Integration Full Paper: 20 mins
Li Ye, Zoe L. Jiang, Xuan Wang, Siu Ming Yiu and Junbin Fang
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing Short Paper: 15 mins
Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong and Julian Jang-Jaccard
Session 12: Cyber-Physical Security
14:40-15:50 (15 Dec) [Room 1]
Session Chair: Carsten Rudolph
Secure Communication in Unmanned Aerial Vehicle Network Full Paper: 20 mins
Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin and Ya-Nan Li
On the Security of In-Vehicle Hybrid Network: Status and Challenges Full Paper: 20 mins
Tianxiang Huang, Jianying Zhou, Yi Wang and Anyu Cheng
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving Short Paper: 15 mins
Zhuo Wei, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng and Robert H. Deng
Enforcing Security in Artificially Intelligent Robots using Monitors Short Paper: 15 mins
Orhio Creado and Phu Dung Le
Session 13: Authentication
16:20-17:20 (15 Dec) [Room 1]
Session Chair: Sheng Wen
EyeSec: A practical shoulder-surfing resistant gaze-based authentication system Full Paper: 20 mins
Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin and Wei Wu
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing Full Paper: 20 mins
Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang and Xingming Sun
A Practical Authentication Protocol for Anonymous Web Browsing Full Paper: 20 mins
Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang and Yali Zeng
Session 14: Symmetric Enc
17:20-18:20 (15 Dec) [Room 1]
Session Chair: Wun-She Yap
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications Full Paper: 20 mins
Yu Sasaki and Kan Yasuda
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-like Ciphers Full Paper: 20 mins
Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li and Maodong Liao
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption Full Paper: 20 mins
Toshiya Shimizu and Takeshi Shimoyama
Social Events
Welcome Reception
18:30-20:00 (13 Dec) [Platform 28]
Conference Banquet
19:00-22:00 (14 Dec) [GoldLeaf Dockland]
Note: our student helpers will take you from the conference venue to the restaurant immediately after the ending of all programs on that day.

Call For Papers

Authors are invited to submit full papers presenting new research results related to information security technologies and applications. Areas of interest include, but are not limited to:

  • Cryptology
  • Applied cryptography
  • Mobile security
  • Cloud security
  • Access control
  • Privacy enhanced technology
  • Viruses and malware
  • Software security
  • Database security
  • Web security
  • Operating system security
  • Intrusion detection
  • Big data security and privacy
  • Biometric Security
  • Implementation
  • Network security
  • Key management
  • Security and privacy in ubiquitous computing
  • Formal methods for security
  • Digital forensics
  • Security for critical infrastructures
  • Embedded systems security
  • Lightweight security
  • Smart grid security
  • Cyber security for urban transportation
  • Cyber-physical security
  • Cryptocurrency

Important Dates

Paper Submission Due05 Aug 2017 Extended to 20 Aug (GMT-11 23:59) (Beijing Time 21 Aug 18:59 / Melbourne Time 21 Aug 20:59) Strict! No more extension!
Author Notification21 Sep 2017
Conference Date13-15 Dec 2017

Journal Special Issues

Selected papers presented at the ISPEC 2017 will be invited to consider submission (after significant extension) for special issues in the following journals:

Future Generation Computer Systems (FGCS) Impact Factor: 3.997
Special Issue on Security and Privacy for Cyber-Physical Systems
Learn more
Concurrency and Computation: Practice and Experience (CCPE) Impact Factor: 1.133
Special Issue on Security and Privacy in Fog Computing
Learn more
Information Sciences Impact Factor: 4.832
Special Issue on Innovative Smart Methods for Security: Emerging Trends and Research Challenges
Learn more
Cluster Computing Impact Factor: 2.04
Special Issue on Security and Privacy Sensor-Cloud Integration
Learn more

Author Instructions

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings or any journal. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. Original contributions are invited up to 16 pages in length (single column) excluding appendices and bibliography and up to 20 pages in total, using at least 11-point fonts and with reasonable margins. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.

ISPEC 2017 Submission Link

We are pleased to announce that the proceeding will be published by Springer as a volume of the Lecture Notes in Computer Science (LNCS) series. Author instructions and LaTeX/Word templates for LNCS publications can be found via the following link.

Springer LNCS Author Information

Accepted Papers

ISPEC 2017 Proceedings at Springer Link
Free access to the ISPEC 2017 proceedings is available at Springer Link from 11 Dec 2017 to 11 Jan 2018.
Proceedings
Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016
Masaya Yasuda (Kyushu University, Japan)
Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan)
Masahiko Takenaka (Fujitsu Laboratories LTD, Japan)
Narishige Abe (Fujitsu Laboratories LTD, Japan)
Shigefumi Yamada (Fujitsu Laboratories LTD, Japan)
Junpei Yamaguchi (Kyushu University, Japan)
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-like Ciphers
Xuan Shen (National University of Defense Technology, China)
Ruilin Li (National University of Defense Technology, China)
Bing Sun (National University of Defense Technology, China)
Lei Cheng (National University of Defense Technology, China)
Chao Li (National University of Defense Technology, China)
Maodong Liao (Chinese Academy of Sciences, China)
The KDM-CCA Security of REACT
Jinyong Chang (Peking University, China)
Honglong Dai (Peking University, China)
Maozhi Xu (Peking University, China)
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
Toshiya Shimizu (Fujitsu Laboratories LTD, Japan)
Takeshi Shimoyama (Fujitsu Laboratories LTD, Japan)
Contract Coin: Toward Practical Contract Signing on Blockchain
Haibo Tian, and (Sun yan-sen Univeristy, China)
Jiejie He (Sun yan-sen Univeristy, China)
Li Qing Fu (Sun yan-sen Univeristy, China)
Linearly Homomorphic Signatures with Designated Entities
Cheng-Jun Lin (Fujian Normal University, China)
Xinyi Huang (Fujian Normal University, China)
Shitang Li (Fujian Normal University, China)
Wei Wu (Fujian Normal University, China)
Shao-Jun Yang (Fujian Normal University, China)
Fast discretized Gaussian sampling and post-quantum TLS ciphersuite
Xinwei Gao (Beijing Jiaotong University, China)
Lin Li( Beijing Jiaotong University, China)
Jintai Ding (University of Cincinnati,USA)
Jiqiang Liu( Beijing Jiaotong University, China)
Saraswathy Rv(University of Cincinnati,USA)
Zhe Liu(University of Luxembourg, Luxembourg )
TTP-free Fair Exchange of Digital Signatures with Bitcoin
Wentao Zhang (Beihang university, China)
Qianhong Wu (Beihang university, China)
Bo Qin (Remin University of China, China)
Tianxu Han (Beihang university, China)
Yanting Zhang (Beihang university, China)
Xiaofeng Chen (Xidian university, China)
Na Li (Beihang university, China)
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption
Yang Haomiao (University of Electronic Science and Technology of China, China)
Yunfan Huang (University of Electronic Science and Technology of China, China)
Yong Yu ( Shaanxi Normal University)
Mingxuan Yao(University of Electronic Science and Technology of China, China)
Xiaosong Zhang(University of Electronic Science and Technology of China, China)
A Secure Variant of the SRP Encryption Scheme with Shorter Private Key
Bo Lv (South China University of Technology, China)
Zhiniang Peng (South China University of Technology, China)
Shaohua Tang(South China University of Technology, China)
A User-Friendly Centrally Banked Cryptocurrency
Xuan Han (University of Chinese Academy of Sciences, China)
Yamin Liu (University of Chinese Academy of Sciences, China)
Haixia Xu (University of Chinese Academy of Sciences, China)
Compact Lossy and All-but-One Trapdoor Functions from Lattice
Leixiao Cheng, and (Fudan University, China)
Quanshui Wu (Fudan University, China)
Yunlei Zhao (Fudan University, China)
Hello, Facebook! Here is the stalkers' paradise!: Design and analysis of enumeration attack using phone numbers on Facebook
Jinwoo Kim (Sungkyunkwan University, South Korea)
Kuyju Kim (Sungkyunkwan University, South Korea)
Junsung Cho (Sungkyunkwan University, South Korea)
Hyoungshick Kim(Sungkyunkwan University, South Korea)
Sebastian Schrittwieser(Saint Polten University, Australia)
Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
Kai He (Dongguan University of Technology, China)
Xueqiao Liu (University of Wollongong, Australia)
Huaqiang Yuan (Dongguan University of Technology, China)
Wenhong Wei (Dongguan University of Technology, China)
Kaitai Liang(Manchester Metropolitan University, United Kingdom)
Efficient Certicate-Based Signature and Its Aggregation
Xinxin Ma (Zhejiang Gongshang University, China)
Jun Shao (Zhejiang Gongshang University, China)
Cong Zuo (Monash University, Australia)
Ru Meng (Shannxi Normal University, China)
Group-based Source-destination Verifiable Encryption with Blacklist Checking
Zhongyuan Yao (University of Wollongong, Australia)
Yi Mu (University of Wollongong, Australia)
Guomin Yang (University of Wollongong, Australia)
Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing
Jian Shen (Nanjing University of Information Science and Technology, China)
Meng Feng (Nanjing University of Information Science and Technology, China)
Dengzhi Liu(Nanjing University of Information Science and Technology, China)
Chen Wang(Nanjing University of Information Science and Technology, China)
Jiachen Jiang(Nanjing University of Information Science and Technology, China)
Xingming Sun(Nanjing University of Information Science and Technology, China)
EyeSec: A practical shoulder-surfing resistant gaze-based authentication system
Na Li (Beihang University, China)
Qianhong Wu (Beihang University, China)
Jingwen Liu (Potevio Information Technology Co., Ltd, China)
Wei Hu (Potevio Information Technology Co., Ltd, China)
Bo Qin (Renmin University of China, China)
Outsourced Privacy Preserving Random Decision Tree Algorithm under Multi-Parties for Sensor-Cloud Integration
Li Ye (Harbin Institute of Technology Shenzhen Graduate School, China)
Zoe L. Jiang (Harbin Institute of Technology, China)
Xuan Wang (Harbin Institute of Technology Shenzhen Graduate School, China)
Siu Ming Yiu (The University of Hong Kong, Hong Kong)
Junbin Fang (Jinan University, China)
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
Yu Sasaki (NTT Corporation, Japan)
Kan Yasuda (NTT Corporation, Japan)
Secure Communication in Unmanned Aerial Vehicle Network
Shuangyu He (Beihang university, China)
Qianhong Wu (Beihang university, China)
Jingwen Liu (Potevio Information Technology Co., Ltd, China)
Wei Hu (Potevio Information Technology Co., Ltd, China)
Bo Qin (Renmin University of China, China)
Ya-Nan Li (Beihang university, China)
Outsourcing Encrypted Excel System
Ya-Nan Li (Beihang University, China)
Qianhong Wu (Beihang University, China)
Wenyi Tang (Renmin University of China, China)
Bo Qin (Renmin University of China, China)
Qin Wang (Beihang University, China)
Meixia Miao (State Key Laboratory of Integrated Service Networks Xidian University, China)
Defending Application Cache Integrity of Android Runtime
Jia Wan (Queen's University, Canada)
Mohammad Zulkernine (Queen's University, Canada)
Phil Eisen (Irdeto Corporation, Canada)
Clifford Liem (Irdeto Corporation, Canada)
On the Security of In-Vehicle Hybrid Network: Status and Challenges
Tianxiang Huang (Chongqing University of Posts and Telecommunications, China)
Jianying Zhou (Singapore University of Technology and Design, Singapore)
Yi Wang (Continental Automotive Singapore Pte Ltd , Singapore)
Anyu Cheng (Chongqing University of Posts and Telecommunications, China)
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Clementine Gritti (EURECOM Sophia Antipolis, France)
Rongmao Chen (National University of Defense Technology, China)
Willy Susilo (University of Wollongong, Australia)
Thomas Plantard (University of Wollongong, Australia)
A lattice-based approach to Privacy-Preserving Biometric Authentication without relying on trusted third parties
Trung Dinh (Monash University, Australia)
Ron Steinfeld (Monash University, Australia)
Nandita Bhattacharjee (Monash University, Australia)
A Formal Model for an Ideal CFI
Sepehr Minagar (Monash University, Australia)
Balasubramaniam Srinivasan (Monash University, Australia)
Phu Dung Le (Monash University, Australia)
Covert QR Codes: How to Hide in the Crowd
Yang-Wai Chow (University of Wollongong, Australia)
Willy Susilo (University of Wollongong, Australia)
Joonsang Baek (University of Wollongong, Australia)
A Practical Authentication Protocol for Anonymous Web Browsing
Xu Yang (RMIT University, Australia)
Xun Yi (RMIT University, Australia)
Hui Cui (RMIT University, Australia)
Xuechao Yang (RMIT University, Australia)
Surya Nepal (CSIRO, Australia)
Xinyi Huang (Fujian Normal University, China)
Yali Zeng (Fujian Normal University, China)
Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries
Yanjun Shen (Monash University, Australia)
Peng Zhang (Shenzheng University)
Verifiable Range Query Processing for Cloud Computing
Yanling Li (Jinan University, China)
Junzuo Lai (Jinan University, China)
Chuansheng Wang (Jinan University, China)
Jianghe Zhang (Jinan University, China)
Jie Xiong (Jinan University, China)
Key Bit-dependent Attack on Protected PKC using a Single-Trace
Bo-Yeon Sim (Kookmin University, South Korea)
Dong-Guk Han (Kookmin University, South Korea)
New Proof for BKP IBE Scheme and Improvement in the MIMC setting
Song Luo (Chongqing University of Technology, China)
Lu Yan (Chongqing University of Technology, China)
Jian Weng (Jinan University, China)
Zheng Yang (Chongqing University of Technology, China)
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks
Ting Chen (University of Electronic Science and Technology of China, China)
Xiaoqi Li (The Hong Kong Polytechnic University, Hong Kong)
Ying Wang (University of Electronic Science and Technology of China, China)
Jiachi Chen (The Hong Kong Polytechnic University, Hong Kong)
Zihao Li (University of Electronic Science and Technology of China, China)
Xiapu Luo (The Hong Kong Polytechnic University, Hong Kong)
Man Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Xiaosong Zhang (University of Electronic Science and Technology of China, China)

Short Papers

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation
Lu Ren (Information Engineering University, China)
Rui Chang (Information Engineering University, China)
Qing Yin (Information Engineering University, China)
Wei Wang(Information Engineering University, China)
Home Location Protection in Mobile Social Networks: A Community based Method
Bo Liu (La Trobe University, Australia)
Wanlei Zhou (Deakin University, Australia)
Shui Yu (Deakin University, Australia)
Kun Wang(Nanjing University of Posts and Telecommunications, China)
Yu Wang (Guangzhou University, China)
Yong Xiang (Deakin University, Australia)
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption
Pradeep Kumar Mishra (Kyushu University, Japan)
Dung Hoang Duong (Kyushu University, Japan)
Masaya Yasuda (Kyushu University, Japan)
Matching function-call graph of binary codes and its applications
Yong Tang (National University of Defense Technology, China)
Yi Wang (National University of Defense Technology, China)
Shuning Wei (Hunan Normal University, China)
Xin Yu (National University of Defense Technology, China)
Qiang Yang (National University of Defense Technology, China)
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing
Hooman Alavizadeh (Massey University, New Zealand)
Dong Seong Kim (University of Canterbury, New Zealand)
Jin B. Hong (University of Canterbury, New Zealand)
Julian Jang-Jaccard (Massey University, New Zealand)
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks
Zhi Wang (Nankai University, China)
Jia Chunfu (Nankai University, China)
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation
Bei Liang (Chalmers University of Technology, Sweden)
Aikaterini Mitrokotsa (Chalmers University of Technology, Sweden)
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving
Zhuo Wei (Shield Lab, Huawei, Singapore)
Yanjiang Yang (Shield Lab, Huawei, Singapore)
Yasmin Rehana (Shield Lab, Huawei, Singapore)
Yongdong Wu (I2R, Astar, Singapore)
Jian Weng (Jinan University, China)
Robert H. Deng (Singapore Management University, Singapore )
A New Functional Encryption for Multidimensional Range Query
Jia Xu (SingTel, Singapore)
Ee-Chien Chang (National University of Singapore, Singapore)
Jianying Zhou (SUTD, Singapore)
Compact Attribute-Based and Online-Offline Multi-Input Inner Product Encryptions from Static Assumptions
Pratish Datta (NTT Secure Platform Laboratories, Japan)
Relevance Filtering for Shared Cyber Threat Intelligence
Thomas Wagner (Birmingham City University, United Kingdom)
Esther Palomar (Birmingham City University, United Kingdom)
Khaled Mahbub (Birmingham City University, United Kingdom)
Ali Abdallah (Birmingham City University, United Kingdom)
Automatic encryption schemes based on the neural networks: analysis and discussions on the various adversarial models
Yidan Zhang (CCNU, China)
James Marino (CCNU, China)
Jiageng Chen (CCNU, China)
Chunhua Su (Aizu University, Japan)
Jinguang Han (University of Surrey, United Kingdom)
Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment
Mei-Ling Chiang (National Chi-Nan University, Taiwan)
Jian-Kai Wang (Chang Gung University, Taiwan)
Li-Chi Feng (Chang Gung University, Taiwan)
Yang-Sen Chen (National Chi-Nan University, Taiwan)
You-Chi Wang (Chang Gung University, Taiwan)
Wen-Yu Kao (National Chi-Nan University, Taiwan)
Enforcing Security in Artificially Intelligent Robots using Monitors
Orhio Creado (Monash University, Australia)
Phu Dung Le (Monash University, Australia)

Registration Information

Full registration payment is required by 13 October 2017 for EACH accepted paper. This deadline will be strictly enforced. Failure to pay the registration fee by 13 October 2017 will result in the exclusion of the papers from the Conference Proceedings.

Registration Fee

Registration Fee (in Australian Dollar)By 13 October 2017After 13 October 2017
Full Registration$990$1090
Student Registration$790N/A
Extra Page (per page)$100N/A
Additional Conference Banquet Ticket (per person)$130$130

Both types of registration include: full attendance of the conference, conference proceedings, welcome reception, conference banquet, morning teas, afternoon teas and lunches.

Student Registration

To be qualified for student registration, you must be currently enrolled as a full time student in a university or an institution. A scanned copy of your valid student ID card must be sent to the conference secretary (abby.xu@insightek.com.au). The student status will be verified.

Please note that if you are the only author registered for an accepted paper, you should choose Full Registration (instead of Student Registration) even though you are a student.

Extra Page Costs

We strongly recommend all authors to format the papers within the page limits specified below. If extra pages are required, payment of $100 per extra page needs to be made together with the conference registration fee.

  • Full papers are limited to 20 pages with maximum 2 extra pages (up to 22 pages in total).
  • Short papers are limited to 10 pages with maximum 2 extra pages (up to 12 pages in total).

Conference Banquet Tickets

A conference banquet ticket is included in both full registration and student registration. Additional conference banquet tickets are available for purchase at the cost of $130 per person. Payment needs to be made together with the conference registration fee.

Invitation Letter

If you need an invitation letter, please contact the conference secretary (abby.xu@insightek.com.au) AFTER you complete the registration. The invitation letter can be issued once your registration payment is received.

Receipts

Hard copy registration receipts can be collected at the reception desk during the conference.

Cancellation Policy

Registration for the conference cannot be canceled. There is no refund of registration fees.

Registration Method

Please click the following link to complete your registration.

ISPEC 2017 Registration System

  • PAPER ID: For non-author registrations, please use "999" for Paper ID in corresponding parts.
  • PAPER Title: For non-author registrations, please use "No Paper" for Paper Title in corresponding parts.
  • NOTE: You may ignore the "IEEE Member ID" entry as this conference does not provide any discount for IEEE members.

Payment via Credit Card or Paypal

Payment via credit card or PayPal can be made directly in the registration system.

Payment via Bank Transfer

Payment via bank transfer are accepted at the following account. For participants who want to pay by bank transfer, please send the payment AS SOON AS POSSIBLE as it takes some time to process the payment.

Account nameInsightek
Bank NameCommonwealth Bank of Australia
Address of Insightek2B Service Road, Blackburn, VIC 3130, Australia
SWIFT codeCTBAAU2S
BSB/Account No063182 10939649
  • TRANSFER NOTE: Please include a note on the bank transfer indicating your name and paper ID.
  • TRANSFER COST: Bank transfer and other related fees have to be paid by the registrant. Please verify carefully during the transfer that all costs are charged to the sender and the correct amount will be received at the above account. Alternatively, please add extra $20.00 to the total amount of registration fee to cover the transfer cost.

After the bank transfer is completed, please send a scanned copy of the bank transfer transaction receipt to the conference secretary (abby.xu@insightek.com.au) with your name and paper ID. We will confirm your registration once we receive the payment and the scanned transaction receipt.

Organising Committee

General Co-chairs

Robert Deng, Singapore Management University, Singapore
Yang Xiang, Swinburne University, Australia
Wanlei Zhou, Deakin University, Australia

Program Co-Chairs

Joseph K. Liu, Monash University, Australia
Pierangela Samarati, Università degli Studi di Milano, Italy

Local Organising Chair

Xiao Chen, Deakin University, Australia

Publicity Chair

Yu Wang, Guangzhou University, China

Program Committee

Man Ho Au, Hong Kong Polytechnic University, Hong Kong
Joonsang Baek, University of Wollongong, Australia
Zubair Baig, Edith Cowan University, Australia
Carlo Blundo, Università degli Studi di Salerno, Italy
Colin Boyd, Norwegian University of Science and Technology, Norway
Alvaro Cardenas, University of Texas at Dallas, US
Aniello Castiglione, University of Salerno, Italy
Jinjun Chen, Swinburne University, Australia
Liqun Chen, University of Surrey, UK
Xiaofeng Chen, Xidian University, China
Raymond Choo, University of Texas at San Antonio, US
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Sara Foresti, DI - Università degli Studi di Milano, Italy
Angelo Genovese, Università degli Studi di Milano, Italy
Dieter Gollmann, Hamburg University of Technology, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Andreas Holzer, University of Toronto, Canada
Xinyi Huang, Fujian Normal University, China
Mitsugu Iwamoto, University of Electro-Comminications, Japan
Julian Jang-Jaccard, Massey University, New Zealand
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Ryan Ko, University of Waikato, New Zealand
Noboru Kunihiro, The University of Tokyo, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Junzuo Lai, Jinan University, China
Costas Lambrinoudakis, University of Piraeus, Greece
Albert Levi, Sabanci University, US
Li Li, University of Luxembourg, Luxembourg
Ming Li, University of Arizona, US
Kaitai Liang, Manchester Metropolitan University, UK
Joseph Liu, Monash University, Australia
Shengli Liu, Shanghai Jiao Tong University, China
Zhe Liu, University of Luxembourg, Luxembourg
Giovanni Livraga, Università degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Rongxing Lu, University of New Brunswick, Canada
Jiqiang Lu, Institute for Infocomm Research, Singapore
Chris Mitchell, Royal Holloway, University of London, UK
Yi Mu, University of Wollongong, Australia
Josef Pieprzyk, Queensland University of Technology, Australia
Sushmita Ruj, Indian Statistical Institute, India
Pierangela Samarati, Università degli Studi di Milano, Italy
Jun Shao, Zhejiang Gongshang University, China
Taeshik Shon, Ajou univ, Korea
Ron Steinfeld, Monash University, Australia
Chunhua Su, University of Aizu, Japan
Willy Susilo, University of Wollongong, Australia
Cong Wang, City University of Hong Kong, Hong Kong
Ding Wang, Peking University, China
Guilin Wang, Huawei, Singapore
Yu Wang, Deakin University, Australia
Sheng Wen, Deakin University, Australia
Qianhong Wu, Beihang University, China
Guomin Yang, University of Wollongong, Australia
Yanjiang Yang, Huawei, Singapore
Wun-She Yap, Universiti Tunku Abdul Rahman, Malaysia
Masaya Yasuda, Kyushu University, Japan
Jiangshan Yu, University of Luxembourg, Luxembourg
Yong Yu, Shaanxi Normal University, China
Tsz Hon Yuen, Huawei, Singapore

Venue

ISPEC 2017 will be held at Deakin Downtown in Melbourne's CBD. Deakin Downtown is located on Level 12 of Tower 2, Collins Square at 727 Collins Street in Docklands. Various public transport options are available. It is only 5 minutes from Southern Cross Station.

Nearby Hotels

5 Star

4 Star

3 Star

Backpackers

All hotels listed above are within 5-15 minutes walking distance to the conference venue. Booking can be made through the hotel website directly, or through other travel agent websites such as booking.com, agoda.com, expedia.com, wotif.com, hotels.com, priceline.com, ctrip.com etc. Note that we do not have any discount with any hotel. We recommend conference participants to book their hotel as early as possible. There are many booking options available such that customers do not need to pay until check-in and they can freely cancel the booking up to one or two days before arrivial. Conference participants may choose this option to book the hotel first, before getting their required internal approval or visa.

Location

Melbourne: The Most Liveable City