ICITCS 2012 - The International Conference on IT Convergence and Security 2012 (ICITCS 2012)
View: 819
Website |
Edit Freely
Category ICITCS 2012
Deadline: September 03, 2012 | Date: December 05, 2012-December 07, 2012
Venue/Country: Seoul, South Korea
Updated: 2012-06-12 22:34:20 (GMT+9)
Call For Papers - CFP
December 5-7, 2012, Republic of Koreahttp://icitcs2012.kcis.kr
OVERVIEWThe International Conference on IT Convergence and Security (ICITCS 2012) will be held in December 5-7, 2012, Republic of KoreaAs we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information convergence. In the process of information convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. The goal of this conference is to discover a new progressive technology by upgrading the previous technologies and to solve the technical problems that may have occurred in the process of converging technology in various fields of industry.At ICITCS 2012, IT experts, researchers, and practitioners from each field will be invited to share ideas and research technologies; moreover, encouraged to cooperate with each other to overcome the confronted technical problems. As a result, this conference will become a place of knowledge where a variety of effects can be created.The conference seeks contributions presenting novel research results in all aspects of IT Convergence and Security. Submitted papers will be peer-reviewed and the accepted papers and posters will be published in ICITCS 2012 proceedings published by Springer (ISSN 1876-1100) and indexed by ISI and Scopus. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.IMPORTANT DATESPapers Submission Deadline: September 3, 2012 Notification of Acceptance: September 27. 2012 Final Papers Deadline: 5 October, 2012SPECIAL ISSUEInformationMultimedia Tools and Applications [pending]Wireless Personal Communications, WIRE [pending]More to be announcedPAPER SUBMISSION AND GUIDELINE- The paper must be written in English and readable- The paper must be prepared using only the Word (doc) template found at the bottom of this page or in the announcement section of ICITCS 2012 webpage - Papers must be submitted Only in Portable Document Format (PDF)- The paper length limit for full paper: 4 - 8 pages including all figuresAuthors of accepted papers, or at least one of them, are requested to register and present their work at the conference.Without registration, we cannot guarantee that your paper(s) will be published.PAPER SUBMISSIONPapers must be original, has not been previously published, and currently not under consideration for publication elsewhere. Authors must clearly explain the contribution of the work in terms of its theoretical and/or practical value and relationship to previous work.SCOPE AND TOPICSTopics of interest may include one or more of the following (but are not limited to) themes;Track 1. Security FundamentalsCryptography and Number TheoryAuthentication, Authorization and AccountingSecure Key Creation and DistributionPrivate Information SecurityBiometrics SecurityFinancial SecurityMalicious CodeTheories, Methods, Tools and Applications in SecurityTrack 2. Industrial & Business Information SecuritySecurity in E-commerce and E-businessSecurity Applications and ServicesIPTV Security Services in the Broadband convergence Network (BcN)Security for Open convergence systemDistributed Systems SecurityTrust model and ManagementEmerging Challenges in Industrial Security and AssuranceTrack 3. Security Protocols and ApplicationsSecurity Protocols for Wireless and MobileConstraint-based Analysis of Security ProtocolsLight-weight Authentication, Authorization and accountabilityIdentity and Trust ManagementSecure CommunicationsIntrusion Detection and PreventionPKI & Digital SignaturesTrack 4. Convergence SecuritySecure Collaboration in a Ubiquitous EnvironmentCorporate Security & Electronic Access Control Solutions: RFID-based, Biometrics-based, etcPhysical and Logical Security ConvergenceSecurity and Privacy Challenges in the Healthcare DomainMultimedia Security Services in Cloud ComputingAccess Control and Privacy Protection in Pervasive ComputingTrack 5. IT Convergence ApplicationsIT Convergence TechnologyTrans-Media and IT ConvergenceContents and Application convergenceKnowledge Convergence ServicesDigital ConvergenceHybrid of IT/BT, IT/NTEmbedded SW, Middleware and Operating SystemsConvergence Application SecurityTrack 6. Mobile Computing and Future NetworksMultimodal Mobile and Ubiquitous ServicesMobile Applications and Convergence SystemMobile, Wireless and Wired ConvergenceMobile Convergence Service ArchitectureOptical Network and SystemsNext Generation Networks and MediaConvergence Networks and Communicationsu-City Convergence TechnologyFuture Information Convergence SystemsTrack 7. Multimedia and Information VisualizationMultimedia content distributionConverged Video SurveillanceImage processing & visualization for ConvergenceVision systems, including multi-camera systemsConverged Information VisualizationMultimedia and Information Convergence SecurityTrack 8. Convergence Data Mining and Artificial IntelligenceDatabase and Data MiningService Mining in Marketing, CRM and Business IntelligenceArtificial Life and Artificial Immune SystemBiomedical Devices, sensors, and Artificial OrgansConvergence Technology for Data Mining and AITrack 9. Web Technology and Software EngineeringService-centric software engineeringWeb Technology and Internet CommerceWeb data mining and information retrievalAgent-based trade-and mediating servicesConvergence Web TechnologyWeb SecurityTrack 10. Green Convergence ServicesGreen computing methodologies and paradigmsPower aware, thermal aware data center design, service, and applicationEnergy awareness in network equipment and operationsEnergy efficient network infrastructures and protocolsGreen Computer SecurityORGANIZERCenter for Industry Security [CIS]Kyonggi UniversityConvergence Security AssociationCONTACTFor further information regarding the workshop and paper submission, please contact to Joanna Kim, Conference Secretariat (jason
global.kcis.kr).
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.