ACSA 2015 - 2015 International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA 2015)
Topics/Call fo Papers
The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications for Future Computing (ACSA-15) will be held Jeju, Korea, February 24-26, 2015. ACSA is intended to foster state-of-the-art research in the area of computing, communications, cryptography and security, and their applications for future computer science. The ACSA represents an interdisciplinary field with roots in communications, mathematics and engineering with applications in future computing environments including ubiquitous, pervasive, grid, and P2P computing.
It aims to solve the various problems of advanced computing and communication services using mathematics and computer science in future computing environments.
This symposium focuses on advances in computing, communications, cryptography and security, and their applications and services. This symposium will also serve as a landmark source for communications & Networks and cryptography & security and will provide reader the most important state-of-the-art technologies in areas of applied mathematics for ACSA.
The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the theme of this symposium.
Topics
includes, but is not limited to, the areas listed below:
Track 1. Advanced Computing
-Ubiquitous and Pervasive Computing
-Web and internet computing
-Cloud Computing
-Mobile Computing
-Grid and Cluster Computing
-Distributed and Parallel Computing
-Context-awareness / Location-awareness
-Smart appliances and wearable devices
-Haptic interfaces and interactions for future computing
-UI/UX for future computing
Track 2. Communications and Networks
-Ubiquitous wired and wireless networks
-Wireless sensor network/RFID
-Ubiquitous/pervasive platform and middleware
-Next-generation Internet & IPv6
-Wireless communication technology
-Home networks
-Future internet
-Peer to Peer Networks
-Social Network and Services
-Ubiquitous Communications and Networks
Track 3. Applied Cryptography and Information Security
- Applied cryptography for future computing
- Block/Stream Ciphers for future computing
- Hash Functions for future computing
- Mathematical and Algorithmic Foundations of Applied Cryptography
- Design and Analysis of Cryptographic Algorithms for future computing
- Security Protocols for future computing
- Pairing Based Cryptography for future computing
- Provable Security for Cryptographic Primitives Suitable for future computing
- Information Security with Mathematical Emphasis for future computing
- Public Key Cryptosystems for future computing
- Side Channel Attack for future computing
Track 4. Security Technologies and Applications
- Authentication and Non-repudiation
- Access Control and Authorization
- Privacy Protection and Trust Computing
- Identity and Trust Management
- Database and System Security
- Intrusion Detection, Tolerance and Prevention
- Digital Right Management
- Watermarking and Steganography
- Critical infrastructure protection
- Security for M2M Platform
- Security and privacy issues in V2X
- Security issues in cloud computing and big data system
- Security issues in Smart devices
Track 5: Other IT in ACSA
Current Issues and Challenges in ACSA
It aims to solve the various problems of advanced computing and communication services using mathematics and computer science in future computing environments.
This symposium focuses on advances in computing, communications, cryptography and security, and their applications and services. This symposium will also serve as a landmark source for communications & Networks and cryptography & security and will provide reader the most important state-of-the-art technologies in areas of applied mathematics for ACSA.
The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the theme of this symposium.
Topics
includes, but is not limited to, the areas listed below:
Track 1. Advanced Computing
-Ubiquitous and Pervasive Computing
-Web and internet computing
-Cloud Computing
-Mobile Computing
-Grid and Cluster Computing
-Distributed and Parallel Computing
-Context-awareness / Location-awareness
-Smart appliances and wearable devices
-Haptic interfaces and interactions for future computing
-UI/UX for future computing
Track 2. Communications and Networks
-Ubiquitous wired and wireless networks
-Wireless sensor network/RFID
-Ubiquitous/pervasive platform and middleware
-Next-generation Internet & IPv6
-Wireless communication technology
-Home networks
-Future internet
-Peer to Peer Networks
-Social Network and Services
-Ubiquitous Communications and Networks
Track 3. Applied Cryptography and Information Security
- Applied cryptography for future computing
- Block/Stream Ciphers for future computing
- Hash Functions for future computing
- Mathematical and Algorithmic Foundations of Applied Cryptography
- Design and Analysis of Cryptographic Algorithms for future computing
- Security Protocols for future computing
- Pairing Based Cryptography for future computing
- Provable Security for Cryptographic Primitives Suitable for future computing
- Information Security with Mathematical Emphasis for future computing
- Public Key Cryptosystems for future computing
- Side Channel Attack for future computing
Track 4. Security Technologies and Applications
- Authentication and Non-repudiation
- Access Control and Authorization
- Privacy Protection and Trust Computing
- Identity and Trust Management
- Database and System Security
- Intrusion Detection, Tolerance and Prevention
- Digital Right Management
- Watermarking and Steganography
- Critical infrastructure protection
- Security for M2M Platform
- Security and privacy issues in V2X
- Security issues in cloud computing and big data system
- Security issues in Smart devices
Track 5: Other IT in ACSA
Current Issues and Challenges in ACSA
Other CFPs
- 2015 World Congress on Information Technology Applications and Services
- 4th IFAC Conference on Analysis and Control of Chaotic Systems
- Open Journal of Big Data (OJBD)
- 2015 3rd International Conference on Control, Robotics and Cybernetics (ICCRC2015)
- 2015 7th International Conference on Education Technology and Computer (ICETC2015)
Last modified: 2014-11-08 08:11:26