posted by user: icisa || 6928 views || tracked by 15 users: [display]

ICITCS 2012 : The International Conference on IT Convergence and Security 2012 (ICITCS 2012)


When Dec 5, 2012 - Dec 7, 2012
Where South Korea
Submission Deadline Sep 14, 2012
Notification Due Sep 27, 2012
Final Version Due Oct 5, 2012
Categories    computer science   IT

Call For Papers

The International Conference on IT Convergence and Security 2012 (ICITCS 2012)
December 5 - 7, 2012, Republic of Korea

Publication: Springer LNEE

The conference seeks contributions presenting novel research results in all aspects of IT Convergence and Security. Submitted papers will be peer-reviewed and the accepted papers and posters will be published in Springer Lecture Notes in Electrical Engineering series (LNEE, ISSN: 1876-1100) which is indexed by ISI and Scopus. Furthermore, the selected papers will be published in the special issues of prestigious international journals after further revision.

Deadline for submission: September 14, 2012
Notification of acceptance of papers: September 27, 2012
Early-bird registration deadline: September 28, 2012
Final papers (Camera ready) due: October 5, 2012

Multimedia Tools and Applications (SCIE) [pending]
Wireless Personal Communications, WIRE (SCIE) [pending]
Information – An International Interdisciplinary Journal (SCIE)
More to be announced

- The paper must be written in English and readable
- The paper must be single-column format with single-spaced, 10 point font in the text
- The paper must be prepared using only the Word (doc) template found at the ICITCS 2012 website:
- The document should be formatted for the standard A4-size paper
- Papers must be submitted Only in Portable Document Format (PDF)
- The paper length limit for full paper: 4 - 8 pages including all figures

Topics of interest may include one or more of the following (but are not limited to) themes;

Track 1. Security Fundamentals: Cryptography and Number Theory/ Authentication, Authorization and Accounting/ Secure Key Creation and Distribution/ Private Information Security/ Biometrics Security/ Financial Security/ Malicious Code/ Theories, Methods, Tools and Applications in Security

Track 2. Industrial & Business Information Security: Security in E-commerce and E-business/ Security Applications and Services/ IPTV Security Services in the Broadband convergence Network (BcN)/ Security for Open convergence system/ Distributed Systems Security/ Trust model and Management/ Emerging Challenges in Industrial Security and Assurance

Track 3. Security Protocols and Applications: Security Protocols for Wireless and Mobile/ Constraint-based Analysis of Security Protocols/ Light-weight Authentication, Authorization and accountability/ Identity and Trust Management/ Secure Communications/ Intrusion Detection and Prevention/ PKI & Digital Signatures

Track 4. Convergence Security: Secure Collaboration in a Ubiquitous Environment/ Corporate Security & Electronic Access Control Solutions: RFID-based, Biometrics-based, etc/ Physical and Logical Security Convergence/ Security and Privacy Challenges in the Healthcare Domain/ Multimedia Security Services in Cloud Computing/ Access Control and Privacy Protection in Pervasive Computing

Track 5. IT Convergence Applications: IT Convergence Technology/ Trans-Media and IT Convergence/ Contents and Application convergence/ Knowledge Convergence Services/ Digital Convergence/ Hybrid of IT/BT, IT/NT/ Embedded SW, Middleware and Operating Systems/ Convergence Application Security

Track 6. Mobile Computing and Future Networks: Multimodal Mobile and Ubiquitous Services/ Mobile Applications and Convergence System/ Mobile, Wireless and Wired Convergence/ Mobile Convergence Service Architecture/ Optical Network and Systems/ Next Generation Networks and Media/ Convergence Networks and Communications/ u-City Convergence Technology/ Future Information Convergence Systems

Track 7. Multimedia and Information Visualization: Multimedia content distribution/ Converged Video Surveillance/ Image processing & visualization for Convergence/ Vision systems, including multi-camera systems/ Converged Information Visualization/ Multimedia and Information Convergence Security

Track 8. Convergence Data Mining and Artificial Intelligence: Database and Data Mining/ Service Mining in Marketing, CRM and Business Intelligence/ Artificial Life and Artificial Immune System/ Biomedical Devices, sensors, and Artificial Organs/ Convergence Technology for Data Mining and AI

Track 9. Web Technology and Software Engineering: Service-centric software engineering/ Web Technology and Internet Commerce/ Web data mining and information retrieval/ Agent-based trade-and mediating services/ Convergence Web Technology/ Web Security

Track 10. Green Convergence Services: Green computing methodologies and paradigms/ Power aware, thermal aware data center design, service, and application/ Energy awareness in network equipment and operations/ Energy efficient network infrastructures and protocols/ Green Computer Security

Center for Industry Security [CIS]
Kyonggi University
Convergence Security Association

For further information regarding the workshop and paper submission, please contact to Joanna Kim, Conference Secretariat (

Related Resources

ICITCS 2018   8th International Conference on IT Convergence and Security
ICDMML 2019   【ACM ICPS EI SCOPUS】2019 International Conference on Data Mining and Machine Learning
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ISCSAI 2018   2018 International Symposium on Computer Science and Artificial Intelligence
SSCI 2019   The 2019 IEEE Symposium Series on Computational Intelligence
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ISBDAI 2018   2018 International Symposium on Big Data and Artificial Intelligence
ACNS 2019   International Conference on Applied Cryptography and Network Security
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy