posted by system || 2331 views || tracked by 6 users: [display]

ACSA 2009 : The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing


When Dec 11, 2009 - Dec 12, 2009
Where Jeju, South Korea
Submission Deadline Jul 15, 2009
Final Version Due Jan 15, 2009
Categories    cryptography   security

Call For Papers


The 2009 FTRG International Workshop on

Advances in Cryptography, Security and Applications

for Future Computing (ACSA-09)

Jeju, Korea, December 11-12, 2009


** Publication: The final version of all accepted and presented papers in ACSA-09 will be included in a Special Issue on COMPUTERS & MATHEMATICS WITH APPLICATIONS (Elsevier) indexed by SCI (About 20 papers).

** Submission Due: July 15, 2009 **





The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09) will be held in Jeju, Korea, December 11-12, 2009.

ACSA-09 will be the most comprehensive workshop focused on advances in Cryptography, Security and Applications for Future Computing. ACSA-09 is intended to foster state-of-the-art research in the area of cryptography, security and its applications for Future Computer Science (FCS). The FCS represents an interdisciplinary field with roots in mathematics and engineering with applications in future computing environments including ubiquitous, pervasive, grid, and P2P computing. It aims to solve the various problems of advanced computing and communication services using mathematics and computer science in future computing environments. The reliable security solutions that rely on in depth cryptography are required as a countermeasure, such as data confidentiality, data integrity, authentication, non-repudiation, and access control services. This workshop focuses on advances in cryptography, security and its application for FCS.

This workshop will also serve as a landmark source for cryptography, security and its applications for FCS and will provide reader the most important state-of-the-art technologies in areas of applied mathematics for FCS. This workshop aims to address the importance of cryptography, security and its application for FCS and to encourage researchers to publish their results in CAM journal. It will accept both original research papers and review articles that enhance the state-of-the-art approaches and solutions in the area of advances in cryptography, security and its applications for FCS. The papers will be peer reviewed and will be selected on the basis of their quality and relevance to the theme of this workshop.




Original contributions, not currently under review to another journal or conference, are solicited in relevant areas including, but not limited to, the following:

- Mathematical and Algorithmic Foundations of Applied Cryptography for FCS

- Authentication and Non-repudiation for FCS

- Design and Analysis of Cryptographic Algorithms and Protocols for FCS

- Pairing Based Cryptography for FCS

- Provable Security for Cryptographic Primitives Suitable for FCS

- Information Security with Mathematical Emphasis for FCS

- Identity and Trust Management for FCS

- Database and System Security for FCS

- Intrusion Detection, Tolerance and Prevention for FCS

- Access control and DRM for FCS

- Information assurance for FCS

- New Security Issues for FCS


Important Dates


Paper Submission Due: July 15, 2009.

First Acceptance Notification: August 31, 2009.

Revision Due: Sept 31, 2009.

Second Acceptance Notification: October 31, 2009.

Presentation Material Due (PPT): November 31, 2009.

Workshop Day: December 13, 2009

Final Acceptance Notification: December 31, 2009.

Camera Ready Due: January 15, 2010

Journal Publication Date: 2nd or 3rd Quarter, 2010 (Tentative)


Submission Guidelines


Prospective authors should prepare manuscripts according to the "Submission Procedure" page at the journal website,

In addition, Authors should submit full paper (ONLY PDF file) with 14-15 pages in length according to the instruction.

Submission System :

**Short Requirements For Authors**

-In order to continue the publication of professional quality special issues in our journal, the items listed below are the minimum requirements for accepting manuscripts for Special Issues submitted for publication in Computers and Mathematics with Applications. We ask you to be sure that your manuscript meets these requirements when it is submitted to us. We will be unable to proceed with the publication of the special issue until these requirements are met. We suggest that you use the following as a checklist before forwarding the final version of your article to the guest editor.

-Addresses: Please make sure your manuscript has current and complete mailing and email addresses for all authors and co-authors. Also, please keep us updated on any address changes.

-Electronic Versions: Either a TEX, AMS- TEX, LaTEX, or Word file for the text of the manuscript is necessary along with a pdf file of the final version of the article. The digital file (TeX or Word file) must match the pdf file exactly. Any discrepancies detected between the two files will cause delays in the publication of the special issue.

-Abstracts: Your manuscript must contain an abstract.

-Keywords: Five keywords should be provided for your manuscript.

-Figures & Graphs: An electronic version of each figure is required. Each figure or graph should also appear in the pdf file of your manuscript.

-The preferred format for figures and graphs is PostScript (ps) or encapsulated PostScript (eps). From with the TEX file of each paper, we import the eps figures. We will try to work with any electronic format that we receive. However, this may cause a delay, and at our discretion, we may require authors to re-submit the illustrations in ps or eps format, compatible with Adobe Illustrator. Each figure or graph should be a separate file.

-References: References should be numbered sequentially in the order of their appearance in the text, not alphabetically. References should be cited in the text in square brackets. If the references in your manuscript are not in this format, you will be asked to redo them, causing a publication delay for the entire special issue.


Proceeding and Publication


First, Materials (PPT) for presentation of accepted papers will be included in a ACSA-09 workshop proceeding.

After closing ACSA-09, final version of all accepted and presented papers in ACSA-09 will be included in a Special Issue of COMPUTERS & MATHEMATICS WITH APPLICATIONS (Elsevier) indexed by SCI (About 20 papers).




==General Chairs==

Prof. Jong Hyuk Park

Department. of Computer Science and Engineering,

Kyungnam University, Korea



Prof. Yi Mu

School of Computer Science and Software Engineering,

University of Wollongong, Australia



==Program Chairs==

Prof. Sang-Soo Yeo

Division of Computer Engineering

Mokwon University, Korea



Prof. Deqing Zou

Department of Information Security

School of Computer Science and Technology

Huazhong University of Science and Technology, China



Prof. Sajid Hussain

Computer Science, Acadia University, Canada



==International Advisory Board==

Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan

Prof. Peng Ning, North Carolina State University, USA

Dr. Kyo Il Chung, ETRI, Korea

Prof. Bart Preneel, Katholieke Universiteit Leuven, Belgium

Prof. Javier Lopez, University of Malaga, Spain

Prof. Victor Leung, University of British Columbia, Canada

Prof. Hyoung Joong Kim, Korea University, Korea

==Publication Chairs==

Prof. Soo-Kyun Kim, PaiChai University, Korea

Prof. Eun-Jun Yoon, Kyungpook National University, Korea

==Publicity Chairs==

Xiaofeng Chen, Xidian University, China

Hung-Min Sun, National Tsing Hua University, Taiwan

Deok Gyu Lee, ETRI, Korea

Lei Shu, National University of Ireland, Ireland

==Program Committee==



Contact Information


If you have any question about the CfP and papers submission, please email to Prof. Jong Hyuk Park ( and Prof. Sang-Soo Yeo (

Related Resources

SECRYPT 2018   15th International Conference on Security and Cryptography
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
USENIX-Security 2018   27th USENIX Security Symposium
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SECURWARE 2018   The Twelfth International Conference on Emerging Security Information, Systems and Technologies
ACNS 2018   Applied Cryptography and Network Security
SPEBD 2018   Workshop on Security and Privacy-Enhanced Big Data
MathSJ 2018   Applied Mathematics and Sciences: An International Journal
AFIN 2018   The Tenth International Conference on Advances in Future Internet