Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    ICITCS 2012 - The International Conference on IT Convergence and Security 2012 (ICITCS 2012)

    View: 819

    Website | Want to Edit it Edit Freely

    Category ICITCS 2012

    Deadline: September 03, 2012 | Date: December 05, 2012-December 07, 2012

    Venue/Country: Seoul, South Korea

    Updated: 2012-06-12 22:34:20 (GMT+9)

    Call For Papers - CFP

    December 5-7, 2012, Republic of Korea

    http://icitcs2012.kcis.kr

    OVERVIEW

    The International Conference on IT Convergence and Security (ICITCS 2012) will be held in December 5-7, 2012, Republic of Korea

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information convergence. In the process of information convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. The goal of this conference is to discover a new progressive technology by upgrading the previous technologies and to solve the technical problems that may have occurred in the process of converging technology in various fields of industry.

    At ICITCS 2012, IT experts, researchers, and practitioners from each field will be invited to share ideas and research technologies; moreover, encouraged to cooperate with each other to overcome the confronted technical problems. As a result, this conference will become a place of knowledge where a variety of effects can be created.

    The conference seeks contributions presenting novel research results in all aspects of IT Convergence and Security. Submitted papers will be peer-reviewed and the accepted papers and posters will be published in ICITCS 2012 proceedings published by Springer (ISSN 1876-1100) and indexed by ISI and Scopus. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.

    IMPORTANT DATES

    Papers Submission Deadline: September 3, 2012

    Notification of Acceptance: September 27. 2012

    Final Papers Deadline: 5 October, 2012

    SPECIAL ISSUE

    Information

    Multimedia Tools and Applications [pending]

    Wireless Personal Communications, WIRE [pending]

    More to be announced

    PAPER SUBMISSION AND GUIDELINE

    - The paper must be written in English and readable

    - The paper must be prepared using only the Word (doc) template found at the bottom of this page or in the announcement section of ICITCS 2012 webpage

    - Papers must be submitted Only in Portable Document Format (PDF)

    - The paper length limit for full paper: 4 - 8 pages including all figures

    Authors of accepted papers, or at least one of them, are requested to register and present their work at the conference.

    Without registration, we cannot guarantee that your paper(s) will be published.

    PAPER SUBMISSION

    Papers must be original, has not been previously published, and currently not under consideration for publication elsewhere. Authors must clearly explain the contribution of the work in terms of its theoretical and/or practical value and relationship to previous work.

    SCOPE AND TOPICS

    Topics of interest may include one or more of the following (but are not limited to) themes;

    Track 1. Security Fundamentals

    Cryptography and Number Theory

    Authentication, Authorization and Accounting

    Secure Key Creation and Distribution

    Private Information Security

    Biometrics Security

    Financial Security

    Malicious Code

    Theories, Methods, Tools and Applications in Security

    Track 2. Industrial & Business Information Security

    Security in E-commerce and E-business

    Security Applications and Services

    IPTV Security Services in the Broadband convergence Network (BcN)

    Security for Open convergence system

    Distributed Systems Security

    Trust model and Management

    Emerging Challenges in Industrial Security and Assurance

    Track 3. Security Protocols and Applications

    Security Protocols for Wireless and Mobile

    Constraint-based Analysis of Security Protocols

    Light-weight Authentication, Authorization and accountability

    Identity and Trust Management

    Secure Communications

    Intrusion Detection and Prevention

    PKI & Digital Signatures

    Track 4. Convergence Security

    Secure Collaboration in a Ubiquitous Environment

    Corporate Security & Electronic Access Control Solutions: RFID-based, Biometrics-based, etc

    Physical and Logical Security Convergence

    Security and Privacy Challenges in the Healthcare Domain

    Multimedia Security Services in Cloud Computing

    Access Control and Privacy Protection in Pervasive Computing

    Track 5. IT Convergence Applications

    IT Convergence Technology

    Trans-Media and IT Convergence

    Contents and Application convergence

    Knowledge Convergence Services

    Digital Convergence

    Hybrid of IT/BT, IT/NT

    Embedded SW, Middleware and Operating Systems

    Convergence Application Security

    Track 6. Mobile Computing and Future Networks

    Multimodal Mobile and Ubiquitous Services

    Mobile Applications and Convergence System

    Mobile, Wireless and Wired Convergence

    Mobile Convergence Service Architecture

    Optical Network and Systems

    Next Generation Networks and Media

    Convergence Networks and Communications

    u-City Convergence Technology

    Future Information Convergence Systems

    Track 7. Multimedia and Information Visualization

    Multimedia content distribution

    Converged Video Surveillance

    Image processing & visualization for Convergence

    Vision systems, including multi-camera systems

    Converged Information Visualization

    Multimedia and Information Convergence Security

    Track 8. Convergence Data Mining and Artificial Intelligence

    Database and Data Mining

    Service Mining in Marketing, CRM and Business Intelligence

    Artificial Life and Artificial Immune System

    Biomedical Devices, sensors, and Artificial Organs

    Convergence Technology for Data Mining and AI

    Track 9. Web Technology and Software Engineering

    Service-centric software engineering

    Web Technology and Internet Commerce

    Web data mining and information retrieval

    Agent-based trade-and mediating services

    Convergence Web Technology

    Web Security

    Track 10. Green Convergence Services

    Green computing methodologies and paradigms

    Power aware, thermal aware data center design, service, and application

    Energy awareness in network equipment and operations

    Energy efficient network infrastructures and protocols

    Green Computer Security

    ORGANIZER

    Center for Industry Security [CIS]

    Kyonggi University

    Convergence Security Association

    CONTACT

    For further information regarding the workshop and paper submission, please contact to Joanna Kim, Conference Secretariat (jasonatglobal.kcis.kr).


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.