International Conference on Applications and Techniques in Information Security (ATIS2014)
26-28/11/2014, Melbourne, Australia

Conference Scope

The 2014 International Conference on Applications and Technologies in Information Security (ATIS), will be the fifth event in the ATIS series, which started in 2010.

As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area. These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom-made for the cryptographic community, etc.

ATIS 2014 focuses on all aspects on techniques and applications in information security research. The purpose of ATIS is to provide a forum for presentation and discussion of innovative ideas, research results, applications and experience from around the world as well as highlight activities in the related areas. The annual ATIS conference highlights new results in the design and analysis of digital security hardware and software implementations. ATIS provides a valuable connection between the theoretical and implementation communities and attracts participants from industry, academia, and government organizations. 

As well as a single track of high-quality presentations, ATIS 2014 will offer invited talks, hands-on training in a computer lab, digital competitions and a special school for PhD and Master students. 

Accepted papers will appear in the proceedings to be published as Springer's Communications in Computer and Information Science Series ( Selected top quality papers accepted and presented in the ATIS2014 will be invited for extension for the special issues of some international journals, including Concurrency and Computation: Practise and Experience (SCI-indexed, ERA2010 rank A).


Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings.

 Attacks against Implementations

  • Digital Forensics
  • Key Recovery 
 Tools and Methodologies

  • Evaluation of Security 
  • Evaluation of Security Tools

  • Digital Forensics
  • Intrusion Detection
  • Malicious software

 Security Implementations

  • Access Control
  • Authentication and Authorization
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Cryptography
  • Information Hiding and Watermarking
  • Intellectual Property Protection
  • Operating System Security
  • Intellectual Property Protection
  • Key Management
 Data Privacy

  • Privacy Protection
  • Smart device information leaks
  • Trusted and Trustworthy Computing
  • Privacy Preservation in Data Release

  • Electronic Commerce Security
  • Cloud Security
  • Digital Forensics
  • Smartphone Security
  • Language-based Security
 Evaluation, standards and protocols

  • Domain name server security
  • Transport Layer Security
  • Risk Evaluation and Security Certification
  • Security Management
 Curbing Cyber Crimes

  • Cyber-Gossip Spread Models
  • Identity authentication
  • Datasets for cyber-gossips detection
  • Collusive crime/piracy detection

Important Dates

  • Paper Submission Due24/08/2014 extended to 01/09/2014 (11:59pm, Pacific Time)
  • Author Notification Due16/09/2014
  • Camera Ready Due: 18/09/2014

Paper Submission

The submitted paper should adhere to the double-blind review policy. All papers will be double-blind reviewed by the Program Committee on the basis of technical quality, relevance to ATIS, originality, significance, and clarity. All paper submissions will be handled electronically. Papers that do not comply with the Submission Guidelines will be rejected without review.

Please note:

  • Authors should use Springer conference paper templates, which can be find in the author’s instruction page here:
  • All papers must be submitted electronically through the paper submission system in PDF format only, with up to 12 pages in length.
  • Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. 
  • Papers must be clearly presented in English and will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation.
  • As papers will be blind refereed, submitted papers must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The paper must start with a title, an abstract, and keywords.
  • Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work.

Paper submission system is available here from 01/06/2014.

Organizing Committee

  • General Chair
    • Prof. Lynn Batten, Deakin University, Australia
  • Program Committee Co-chairs
    • Dr Gang Li, Deakin University, Australia
    • A/Prof. Wenjia Niu, Chinese Academy of Sciences, China
    • Prof. Matthew Warren, Deakin University, Australia
  • ATIS-School Chair
    • A/Prof. Ray Hunt, Canterbury University, New Zealand
  • ATIS-Cup Co-Chairs
    • Dr Rick Harvey, Lockbox, Australia
    • Dr Lei Pan, Deakin University, Australia
  • Award Chair
    • Prof Paul Watters, Massey University, New Zealand
  • Sponsorship Co-Chairs
    • Dr Md Rafiqul Islam, Charles Sturt University, Australia
    • A/Prof. Serdar Boztas, RMIT University, Australia
  • Publicity and Publication Co-Chairs
    • A/Prof. Ping Xiong, Zhongnan University of Economics and Law, China
    • Dr Tianqing Zhu, Deakin University, Australia

Further Information

For all inquiries, please contact the Conference Secretary, Ms Judy Chow:
  • Telephone: +613 925 17477
  • Email:
Shaowu Liu,
Sep 15, 2014, 5:20 PM
Shaowu Liu,
Jul 13, 2014, 1:12 PM