The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer)

Vancouver, Canada, June 26-28, 2012



NOTICE

- The final version of ACSA-Summer 2012 Program Schedule is now available for downloading.
  ACSA-Summer 2012 Program Schedule

- Accepted Paper List was announced!!
  ACSA-Summer 2012 Accepted Papers

- Publication was changed!!
  Final version of all accepted and presented papers in ACSA Summer 2012 will be published by the following journal (SCIE).
  * Peer-to-Peer Networking and Applications - Springer (SCIE)
  * INFORMATION - International Information Institute (SCIE)
  * Telecommunication Systems - Springer (SCIE)
  * International Journal of Computer Mathematics (IJCM) - Taylor & Francis (SCIE)

- Conference process was modified!!
  Full Paper Submission due: April 5, 2012 (Extended)
  Conference Author notification: May 3, 2012 (Extended)
  Authors Registration due: May 10, 2012 (Extended)
  Revised paper due: May 25, 2012 (Extended)



The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2012-Summer) will be held in Vancouver, Canada, June 26-28, 2012.
Our FTRA-ACSA has been successfully running (ACSA-11 Jeju-Korea, ACSA-10 Gwangju-Korea, ACSA-09 Jeju-Korea). ACSA-Summer 2012 will be the most comprehensive symposium focused on advances in Cryptography, Security and Applications for Future Computing. ACSA-Summer 2012is intended to foster state-of-the-art research in the area of cryptography, security and its applications for Future Computer Science (FCS). The FCS represents an interdisciplinary field with roots in mathematics and engineering with applications in future computing environments including ubiquitous, pervasive, grid, and P2P computing. It aims to solve the various problems of advanced computing and communication services using mathematics and computer science in future computing environments. The reliable security solutions that rely on in depth cryptography are required as a countermeasure, such as data confidentiality, data integrity, authentication, non-repudiation, and access control services. This symposium focuses on advances in cryptography, security and its application for FCS. This symposium will also serve as a landmark source for cryptography, security and its applications for FCS and will provide reader the most important state-of-the-art technologies in areas of applied mathematics for FCS. This symposium aims to address the importance of cryptography, security and its application for FCS and to encourage researchers to publish their results in notable journals. It will accept both original research papers and review articles that enhance the state-of-the-art approaches and solutions in the area of advances in cryptography, security and its applications for FCS. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the theme of this symposium.

The ACSA 2012-Summer is the next event in a New summer series of highly successful the FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, previously held as FTRA ACSA-11, Jeju, Korea, December 12-15, 2011.

Topics

Original contributions, not currently under review to another journal or conference, are solicited in relevant areas including, but not limited to, the following:

Track 1. Cryptography and Information Security

- Encryption and cryptography
- Block/Stream Ciphers
- Hash Functions
- Mathematical and Algorithmic Foundations of Applied Cryptography
- Design and Analysis of Cryptographic Algorithms and Protocols
- Pairing Based Cryptography for FCS
- Provable Security for Cryptographic Primitives Suitable for FCS
- Information Security with Mathematical Emphasis for FCS
- Public Key Cryptosystems
- Side Channel Attack

Track 2. Security Protocols and Applications

- Authentication and Non-repudiation
- Access Control and Authorization
- Identity and Trust Management
- Database and System Security
- Intrusion Detection, Tolerance and Prevention
- Secure communications
- Information Hiding
- Digital Signatures
- Digital Right Management
- Watermarking and Steganography
- Critical infrastructure protection
- Digital rights management
- Computer Forensics
- Trust computing
- Security for M2M Platform
- Security and privacy issues for intelligent vehicular systems and communications

Track 3. Industrial Security & its Business and Services

- Information assurance
- Emergent challenges in security and assurance
- Theories, methods, tools and techniques in managing security
- Security and privacy standards
- Common Criteria
- Risk evaluation and security certification
- Security in E-commerce and E-business
- Security Policy
- Trust model and management
- Smartphone Security issues
- Security for Open convergence system
- IPTV security services in the BcN
- Security issues for Broadband convergence Network (BcN)

Paper :
* Peer-to-Peer Networking and Applications - Springer (SCIE)
* INFORMATION - International Information Institute (SCIE)
* Telecommunication Systems - Springer (SCIE)
* International Journal of Computer Mathematics (IJCM) - Taylor & Francis (SCIE)