Home > Event > News
Call for Papers WISA 2010
admin  Mail to admin  HomePage Link http://crypto.knu.ac.kr Date : 2010-2-18 AM 11:50, Hit : 4783  
Preliminary CALL FOR PAPERS


WISA 2010
The 11th International Workshop on Information
Security Applications
http://www.wisa.or.kr
Ramada Plaza Jeju Hotel, Jeju Island, Korea
August 24-26, 2010



The 11th International Workshop on Information Security Applications(WISA 2010) will be held in Jeju Island, Korea on August 24-26, 2010. It is hosted by the Korea Institute of Information Security and Cryptology(KIISC), supported by the Electronics & Telecommunications Research Institute(ETRI) and the Korea Internet & Security Agency(KISA), and sponsored by the Ministry of Public Administration and Security(MoPAS) and the Korea Communications Commission(KCC). The focus of this workshop is on all technical and practical aspects of cryptographic and non-cryptographic security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:              
· Internet & Wireless Security
· E-Commerce Protocols
· Access Control & Database Security
· Biometrics & Human Interface
· Network Security & Intrusion Detection
· Security & Trust Management
· IPTV Security
· Content Protection & Service Security
· Content filtering & Tracing
· Digital Rights Management
· Secure Software & Systems
· Information Hiding
· Digital Forensics
· Secure Hardware
· Cyber Indication & Intrusion Detection
· Multicast & Group Security
· Secure Application Protocols
· Smart Cards & Applications
· Mobile Security
· Privacy & Anonymity
· Public Key Crypto Applications
· Threats & Information Warfare
· Virus Protection & Applications
· Ubiquitous Computing Security
· Combating SPAM
· ID Management
· Peer-to-Peer Security
· Information Assurance
· RFID Security & Applications
· Sensor Network Security & Applications
· Common Criteria
· Cyber Security
· Critical Information Infrastructure Protection
· Video Surveillance Systems

Workshop Tracks
There will be two separate tracks in WISA 2010, full paper track and short abstract track:
¨ Full paper track: Papers presented in the full paper track will be included in the formal proceedings published by Springer in its Lecture Notes in Computer Science(LNCS) Series. A limited number of papers will be selected for presentation in this track through a thorough review by program committee members.
¨ Short abstract track: Papers presented in this track will appear in the workshop pre-proceedings. Papers valuable but not included in the Full paper track due to the space/time limitation will be selected for presentation in this track.

Instructions for Authors
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS"(http://www.springer.de/comp/lncs/authors.html) and limited to at most 15 pages in total.



Important Dates      Paper Submission deadline: June 11, 2010
Acceptance notification: July 9, 2010
Pre-proceedings version deadline: July 31, 2010
Proceedings version deadline: September 18, 2010



Workshop Committee:
¨ General Chair : Jongin Lim, Korea University, Korea (jilim@korea.ac.kr)
¨ Program Co-Chairs :
Yongwha Chung
Korea University, Korea (ychungy@korea.ac.kr)
Moti Yung
Columbia University, USA (moti@cs.columbia.edu)
¨ Organizing Chair : Sang-Choon Kim, Kangwon University, Korea (kimsc@kangwon.ac.kr)
 
 
Today 0 , Total 18 , 1/2 Page.
Call for Papers WISA 2010 4783 2010-02-18
17 Call for Papers ICISC 2010 4286 2010-02-18
16 Mobile Security's Stature Increases As RIM Acquires Certicom 3680 2009-03-03
15 Cryptography, Steganography and Watermarking 14455 2009-01-21
14 Stream Ciphers Cower Before Adi Shamir's CUBE ATTACK 4110 2008-10-09
13 [DPA] How Power Usage Can Tumble Security 3532 2008-10-07
12 [ECC] About Elliptic Curve Cryptography 4943 2008-09-05
11 2008 Ewha-KMS International Workshop on Cryptography 6898 2008-06-09
10 2008 International Conference on Information Culture 2754 2008-06-09
9 Call for Papers in WISA 2008 2964 2008-06-09
 1  2