The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11)

Jeju, Korea, December 12-15, 2011



NOTICE

Recently, the ACSA-11 organizing committee has already provided all the corresponding authors in the accepted paper list with the final notification (which contains the authors' presentation and registration instructions). If you do not receive the final notification, please email to acsa2011.group@gmai l.com.




- The Draft 2nd version of FTRA WCC 2011 Program Schedule is now available for downloading.

- Jeju Tour Program : One Day & Half Day tour Final Program is now available for downloading.
- Jeju Tour Program Contact
: MoongCheeEventTour, Minju Jeoung, E-mail : wongirl35@hanmail.net



The 2011 FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11) will be held in Jeju, Korea, December 12-15, 2011.

ACSA-11 will be the most comprehensive workshop focused on advances in Cryptography, Security and Applications for Future Computing. ACSA-10 is intended to foster state-of-the-art research in the area of cryptography, security and its applications for Future Computer Science (FCS). The FCS represents an interdisciplinary field with roots in mathematics and engineering with applications in future computing environments including ubiquitous, pervasive, grid, and P2P computing. It aims to solve the various problems of advanced computing and communication services using mathematics and computer science in future computing environments. The reliable security solutions that rely on in depth cryptography are required as a countermeasure, such as data confidentiality, data integrity, authentication, non-repudiation, and access control services. This workshop focuses on advances in cryptography, security and its application for FCS. This workshop will also serve as a landmark source for cryptography, security and its applications for FCS and will provide reader the most important state-of-the-art technologies in areas of applied mathematics for FCS. This workshop aims to address the importance of cryptography, security and its application for FCS and to encourage researchers to publish their results in notable journals. It will accept both original research papers and review articles that enhance the state-of-the-art approaches and solutions in the area of advances in cryptography, security and its applications for FCS. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the theme of this workshop.

The ACSA-11 is the next event in a series of highly successful the FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing, previously held as FTRA ACSA-10, Gwangju, Korea, December 9-11, 2010.

Topics

Original contributions, not currently under review to another journal or conference, are solicited in relevant areas including, but not limited to, the following:

Track 1. Cryptography and Information Security

- Encryption and cryptography
- Block/Stream Ciphers
- Hash Functions
- Mathematical and Algorithmic Foundations of Applied Cryptography
- Design and Analysis of Cryptographic Algorithms and Protocols
- Pairing Based Cryptography for FCS
- Provable Security for Cryptographic Primitives Suitable for FCS
- Information Security with Mathematical Emphasis for FCS
- Public Key Cryptosystems
- Side Channel Attack

Track 2. Security Protocols and Applications

- Authentication and Non-repudiation
- Access Control and Authorization
- Identity and Trust Management
- Database and System Security
- Intrusion Detection, Tolerance and Prevention
- Secure communications
- Information Hiding
- Digital Signatures
- Digital Right Management
- Watermarking and Steganography
- Critical infrastructure protection
- Digital rights management
- Computer Forensics
- Trust computing
- Security for M2M Platform
- Security and privacy issues for intelligent vehicular systems and communications

Track 3. Industrial Security & its Business and Services

- Information assurance
- Emergent challenges in security and assurance
- Theories, methods, tools and techniques in managing security
- Security and privacy standards
- Common Criteria
- Risk evaluation and security certification
- Security in E-commerce and E-business
- Security Policy
- Trust model and management
- Smartphone Security issues
- Security for Open convergence system
- IPTV security services in the BcN
- Security issues for Broadband convergence Network (BcN)


Full Paper :
* Computers & Mathematics with Applications (CMa) - Elsevier (SCI)
* Computers & Electrical Engineering (CEE) - Elsevier (SCIE)
* International Journal of Communication Systems (IJCS) - Wiley (SCI-E)
* Security and Communication Network (SCN) - Wiley (SCI-E)
* INFORMATION - International Information Institute (SCIE)
* International Journal of Mobile Information Systems (IJMIS) - IOS Press (SCIE)
* Journal of Internet Technology (SCIE)
* Personal and Ubiquitous Computing - Springer (SCIE)

Information - International Information Institute

Regular Paper :
* Lecture Notes in Electrical Engineering (LNEE) - Springer (SCOPUS and EI Index)
* Human-Centric and Information Sciences (HCIS) - Springer
* International Journal of Information Technology, Communications and Convergence (IJITCC) – InderScience
* Journal of Information Processing Systems (JIPS) - Korea Information Processing Society
* Journal of Convergence (JoC) - FTRA Publishing


Joint Symposium/Workshop