Call for Papers
Applications and Techniques in Information Security (ATIS 2025) invites submissions from researchers, practitioners, and industry leaders exploring the evolving landscape of information security. We welcome contributions that present original research, practical implementations, innovative frameworks, or region-specific insights, especially those bridging AI, IoT, blockchain, quantum computing, and integrating policy or governance perspectives.
Publication and Indexing
Accepted submissions will be published in the Springer Communications in Computer and Information Science (CCIS) series, ensuring high scholarly visibility and rigorous peer review. Papers will be indexed in leading repositories, including EI-Compendex, Scopus, SCImago, DBLP, and Google Scholar.
Outstanding contributions will also be invited for expanded submissions to SCI/SCI-E journals, offering further opportunities for recognition and impact.
Conference Scope
ATIS 2025 uniquely blends cutting-edge security research with real-world relevance. Our global conference emphasizes synergy between theoretical foundations and regional needs, particularly for Australia and the Arab world, while promoting cross-disciplinary dialogue in key areas:
- Foundations: Cryptography, secure algorithm design, foundational systems architecture
- Applied Domains: Cybersecurity for healthcare, finance, smart cities, and industrial control systems
- Emerging Technologies: AI/ML-driven security, IoT defense mechanisms, blockchain resilience, quantum-safe systems
- Policy & Governance: Standards, national/international compliance, policy frameworks, governance models
Highlighted Topics (Not Exhaustive)
Quantum Security
- Secure Quantum Computing
- Programming security, QDK/compiler vulnerabilities
- Hybrid secure architectures, modular protection
- Fault-tolerant operations, error-correction codes
- Adversarial resilience in quantum algorithms
- Quantum Cryptography & Secure Communications
- QKD protocols: BB84, E91, CV-QKD
- Entanglement-based networks, satellite QKD, quantum repeaters
- Integration of post-quantum cryptography within QKD systems
- Quantum Sensing & Secure Metrology
- Tamper-resistant quantum sensors
- Secure sensing devices, spoofing/spike injection defenses
- Metrological benchmarks and standards for secure measurement devices
- Quantum Hardware Security
- Security analysis across qubit technologies: superconducting, trapped ions, photonic, silicon spin systems
- Detection of hardware Trojans, side-channel defenses
- Fault and defect tolerance; cryogenic system protections
- Secure Quantum Applications
- AI-powered quantum models with security assurances
- Secure quantum-enabled chemistry/drug discovery and materials science pipelines
- Secure quantum financial cryptography
- Quantum Cloud Security
- Access control in quantum cloud infrastructures
- Secure multi-tenancy, API protections, zero-trust frameworks
- Quantum Education & Training
- Secure quantum curricula, bootcamps, certifications in quantum security
- Quantum Governance & Policy
- Standards and ethical frameworks for quantum operations
- Regulatory compliance for quantum infrastructure
Quantum Machine Learning
- Secure QML Models
- Adversarial robustness, privacy-preserving architectures
- Model poisoning defenses, encrypted training methods
- Resource-Efficient QML
- Noise-resilient training, variational/tensor-network designs
- Sparse models, hybrid quantum-classical augmentation
- Verification & Benchmarking
- Formal QML verification, adversarial testbeds
- Robustness scoring, cross-platform benchmarking frameworks
- Advanced QML Techniques
- Secure quantum kernel methods, dimensionality reduction
- Quantum boosting, bagging, and safe reinforcement learning
- Privacy & Differential Methods
- Quantum differential privacy, secure aggregation Protocols
- Homomorphic encryption in QML, federated learning with privacy
- QML Application Domains
- Healthcare: secure diagnostics, patient confidentiality
- Finance: robust fraud detection, risk assessment
- Cybersecurity: secure malware/anomaly detection
- Critical infrastructure: energy grids, autonomous systems
- Cross-disciplinary: forensics, robotics, logistical security
Quantum Federated Learning
- Frameworks & Architectures
- Secure decentralized QFL and hybrid model designs
- Cross-device quantum learning infrastructures
- Security & Privacy Protocols
- Secure multiparty data sharing, gradient safeguarding
- Resilience to adversarial federated updates
- Adversarial Resilience
- Defense against Byzantine behavior, poisoning, evasion
- Trust scoring, anomaly detection in federated contexts
- Communication Efficiency
- Quantum resource optimization, bandwidth-efficient aggregation
- Entanglement-assisted communications
- Deployment Scenarios
- Edge-quantum and IoT-QFL integrations
- Large-scale AI, smart city applications using QFL
- Domain Applications
- Medicine: secure clinical trials, distributed research
- Materials Science: multi-institutional secure simulation
- Autonomous Systems: federated navigation/control
- Cybersecurity: shared threat intelligence via QFL
- Trust & Governance
- Incentivizing participation, fairness-aware learning
- Reputation scoring, compliance frameworks for quantum data sharing
Post-Quantum Security
- Cryptographic Foundations
- Lattice-based (e.g. LWE, NTRU, Dilithium), code-based (McEliece, HQC), multivariate, hash-based signatures (e.g. SPHINCS+), isogeny-based schemes
- Hybrid PQC-quantum system frameworks
- PQS in Systems
- PQC in blockchain, distributed ledgers, smart contracts
- PQS for IoT ecosystems, 5G/6G networks, satellite communications
- PQC for cloud platform security
- Hybrid & Migration Strategies
- Integrating PQC with classical cryptography
- Enterprise migration roadmaps, PQS adoption frameworks
- Legacy system interoperability and transition effectiveness
- Standardization & Benchmarking
- PQC evaluation methodologies and testing
- NIST PQC standardization efforts (e.g., Kyber, Dilithium, HQC)
- Algorithmic efficiency benchmarks, pilot testing environments
- Hardware & Implementation
- Secure PQC hardware accelerators, FPGA-based deployment
- PQC in secure enclaves, tamper-proof key storage
- Side-channel defenses, lightweight PQC for resource-constrained devices
- Identity & Authentication
- PQC-based identity management, quantum-secure authentication
- Zero-knowledge proofs under PQS, federated identity systems
- PQS Application Domains
- AI-Driven Systems: securing AI/ML pipelines, protecting inference models
- Financial Services: quantum-resistant payment systems, banking defenses
- Critical Infrastructure: security for energy, defense, aerospace domains
- Global Communications: PQS-enabled internet infrastructure, VPNs, TLS protocols
Submission Guidelines
Papers must follow the official Springer CCIS formatting template and will undergo a double-blind peer review. Submissions will be evaluated based on:
- Technical quality
- Relevance to ATIS 2025 themes
- Originality
- Significance of results
- Clarity of presentation
Guidelines
- Length: Maximum of 12 pages (additional pages permitted with extra charges).
- Anonymization: Submissions must be fully anonymized, remove author names, affiliations, acknowledgments, and self-identifying references.
- Submission Platform: Only electronic submissions via the EasyChair portal will be accepted.
- Publication: Accepted papers will be published in the Springer Communications in Computer and Information Science (CCIS) series and indexed in major databases including EI-Compendex, Scopus, SCImago, DBLP, and Google Scholar.
Ethics & Integrity
ATIS 2025 follows Springer’s strict ethical policies:
- Only original, unpublished work may be submitted.
- Plagiarism, duplicate submissions, or content reuse will lead to automatic rejection.
- Authors are solely responsible for the integrity of their work.
- Research ethics and academic integrity must be upheld at all stages of submission, review, and publication.