<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=ks_c_5601-1987">
<META content="MSHTML 6.00.2900.3562" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>Apologies for cross-postings. Please send to interested
colleagues and<BR>students<BR>
<BR>=============================================================</FONT></DIV>
<DIV> </DIV>
<DIV><FONT
size=2> The
2009 FTRG International Workshop on <BR> Advances in
Cryptography, Security and Applications
<BR> for
Future Computing (ACSA-09) </FONT></DIV>
<DIV> </DIV>
<DIV><FONT
size=2>
<A href="http://www.ftrg.org/acsa2009/">http://www.ftrg.org/acsa2009/</A>
</FONT></DIV>
<DIV> </DIV>
<DIV><FONT
size=2>
Jeju, Korea, December 11-12, 2009</FONT></DIV>
<DIV> </DIV>
<DIV><FONT
size=2>--------------------------------------------------------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>** Publication: The final version of all accepted and
presented papers in ACSA-09 will be included in a Special Issue on
COMPUTERS & MATHEMATICS WITH APPLICATIONS (Elsevier) indexed by SCI (About
20 papers).</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>** Submission Due: July 15, 2009 **</FONT></DIV>
<DIV> </DIV>
<DIV><FONT
size=2>==============================================================</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Overview</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>The 2009 FTRG International Workshop on Advances in
Cryptography, Security and Applications for Future Computing (ACSA-09)
will be held in Jeju, Korea, December 11-12, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>ACSA-09 will be the most comprehensive workshop focused on
advances in Cryptography, Security and Applications for Future Computing.
ACSA-09 is intended to foster state-of-the-art research in the area of
cryptography, security and its applications for Future Computer Science (FCS).
The FCS represents an interdisciplinary field with roots in mathematics and
engineering with applications in future computing environments including
ubiquitous, pervasive, grid, and P2P computing. It aims to solve the various
problems of advanced computing and communication services using mathematics and
computer science in future computing environments. The reliable security
solutions that rely on in depth cryptography are required as a countermeasure,
such as data confidentiality, data integrity, authentication, non-repudiation,
and access control services. This workshop focuses on advances in cryptography,
security and its application for FCS. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>This workshop will also serve as a landmark source for
cryptography, security and its applications for FCS and will provide reader the
most important state-of-the-art technologies in areas of applied mathematics for
FCS. This workshop aims to address the importance of cryptography,
security and its application for FCS and to encourage researchers to publish
their results in CAM journal. It will accept both original research papers and
review articles that enhance the state-of-the-art approaches and solutions in
the area of advances in cryptography, security and its applications for FCS. The
papers will be peer reviewed and will be selected on the basis of their quality
and relevance to the theme of this workshop. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>--------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Topics</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>--------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Original contributions, not currently under review to another
journal or conference, are solicited in relevant areas including, but not
limited to, the following:</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Mathematical and Algorithmic Foundations of Applied
Cryptography for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Authentication and Non-repudiation for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Design and Analysis of Cryptographic Algorithms and
Protocols for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Pairing Based Cryptography for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Provable Security for Cryptographic Primitives Suitable for
FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Information Security with Mathematical Emphasis for
FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Identity and Trust Management for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Database and System Security for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Intrusion Detection, Tolerance and Prevention for
FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Access control and DRM for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- Information assurance for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>- New Security Issues for FCS</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-----------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Important Dates</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-----------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Paper Submission Due: July 15, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>First Acceptance Notification: August 31, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Revision Due: Sept 31, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Second Acceptance Notification: October 31, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Presentation Material Due (PPT): November 31,
2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Workshop Day: December 13, 2009</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Final Acceptance Notification: December 31, 2009.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Camera Ready Due: January 15, 2010</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Journal Publication Date: 2nd or 3rd Quarter, 2010 (Tentative)
</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>------------------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Submission Guidelines</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>------------------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Prospective authors should prepare manuscripts according to
the "Submission Procedure" page at the journal website, </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2> <A
href="http://www.elsevier.com/wps/find/journaldescription.cws_home/301/authorinstructions">http://www.elsevier.com/wps/find/journaldescription.cws_home/301/authorinstructions</A></FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>In addition, Authors should submit full paper (ONLY PDF file)
with 14-15 pages in length according to the instruction. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2> Submission System : <A
href="http://www.editorialsystem.net/acsa2009">http://www.editorialsystem.net/acsa2009</A></FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>**Short Requirements For Authors**</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-In order to continue the publication of professional quality
special issues in our journal, the items listed below are the minimum
requirements for accepting manuscripts for Special Issues submitted for
publication in Computers and Mathematics with Applications. We ask you to be
sure that your manuscript meets these requirements when it is submitted to us.
We will be unable to proceed with the publication of the special issue until
these requirements are met. We suggest that you use the following as a checklist
before forwarding the final version of your article to the guest editor.
</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-Addresses: Please make sure your manuscript has current and
complete mailing and email addresses for all authors and co-authors. Also,
please keep us updated on any address changes. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-Electronic Versions: Either a TEX, AMS- TEX, LaTEX, or Word
file for the text of the manuscript is necessary along with a pdf file of the
final version of the article. The digital file (TeX or Word file) must match the
pdf file exactly. Any discrepancies detected between the two files will cause
delays in the publication of the special issue. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-Abstracts: Your manuscript must contain an abstract.
</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-Keywords: Five keywords should be provided for your
manuscript. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-Figures & Graphs: An electronic version of each figure is
required. Each figure or graph should also appear in the pdf file of your
manuscript. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-The preferred format for figures and graphs is PostScript
(ps) or encapsulated PostScript (eps). From with the TEX file of each paper, we
import the eps figures. We will try to work with any electronic format that we
receive. However, this may cause a delay, and at our discretion, we may require
authors to re-submit the illustrations in ps or eps format, compatible with
Adobe Illustrator. Each figure or graph should be a separate file. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>-References: References should be numbered sequentially in the
order of their appearance in the text, not alphabetically. References should be
cited in the text in square brackets. If the references in your manuscript are
not in this format, you will be asked to redo them, causing a publication delay
for the entire special issue. </FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>----------------------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Proceeding and Publication</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>----------------------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>First, Materials (PPT) for presentation of accepted papers
will be included in a ACSA-09 workshop proceeding.</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>After closing ACSA-09, final version of all accepted and
presented papers in ACSA-09 will be included in a Special Issue of
COMPUTERS & MATHEMATICS WITH APPLICATIONS (Elsevier) indexed by SCI (About
20 papers).</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>----------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Organization</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>----------------</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>==General Chairs==</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Prof. Jong Hyuk Park</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Department. of Computer Science and Engineering,</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Kyungnam University, Korea</FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Email: <A
href="mailto:parkjonghyuk1@hotmail.com">parkjonghyuk1@hotmail.com</A></FONT></DIV>
<DIV> </DIV>
<DIV><FONT size=2>Website: <A
href="http://parkjonghyuk.net">http://parkjonghyuk.net</A></FONT></DIV>
<DIV> </DIV><FONT size=2>
<DIV><BR>Prof. Yi Mu </DIV>
<DIV> </DIV>
<DIV>School of Computer Science and Software Engineering,</DIV>
<DIV> </DIV>
<DIV>University of Wollongong, Australia</DIV>
<DIV> </DIV>
<DIV>Email: <A href="mailto:ymu@uow.edu.au">ymu@uow.edu.au</A></DIV>
<DIV> </DIV>
<DIV>Website: <A
href="http://www.uow.edu.au/~ymu/">http://www.uow.edu.au/~ymu/</A></DIV>
<DIV> </DIV>
<DIV> <BR>==Program Chairs==</DIV>
<DIV> </DIV>
<DIV>Prof. Sang-Soo Yeo</DIV>
<DIV> </DIV>
<DIV>Division of Computer Engineering</DIV>
<DIV> </DIV>
<DIV>Mokwon University, Korea </DIV>
<DIV> </DIV>
<DIV>Email: <A href="mailto:ssyeo@msn.com">ssyeo@msn.com</A></DIV>
<DIV> </DIV>
<DIV>Website: <A href="http://www.ssyeo.net">http://www.ssyeo.net</A></DIV>
<DIV> </DIV>
<DIV> <BR>Prof. Deqing Zou</DIV>
<DIV> </DIV>
<DIV>Department of Information Security</DIV>
<DIV> </DIV>
<DIV>School of Computer Science and Technology </DIV>
<DIV> </DIV>
<DIV>Huazhong University of Science and Technology, China</DIV>
<DIV> </DIV>
<DIV>Email: <A
href="mailto:Deqingzou@hust.edu.cn">Deqingzou@hust.edu.cn</A></DIV>
<DIV> </DIV>
<DIV>Website: <A
href="http://grid.hust.edu.cn/deqingzou/">http://grid.hust.edu.cn/deqingzou/</A></DIV>
<DIV> </DIV>
<DIV><BR>Prof. Sajid Hussain</DIV>
<DIV> </DIV>
<DIV>Computer Science, Acadia University, Canada</DIV>
<DIV> </DIV>
<DIV>Email: <A
href="mailto:dr.sajid.hussain@gmail.com">dr.sajid.hussain@gmail.com</A></DIV>
<DIV> </DIV>
<DIV>Website: <A
href="http://cs.acadiau.ca/~shussain/">http://cs.acadiau.ca/~shussain/</A></DIV>
<DIV> </DIV>
<DIV> <BR>==International Advisory Board==</DIV>
<DIV> </DIV>
<DIV>Prof. Hsiao-Hwa Chen, National Cheng Kung University, Taiwan </DIV>
<DIV> </DIV>
<DIV>Prof. Peng Ning, North Carolina State University, USA </DIV>
<DIV> </DIV>
<DIV>Dr. Kyo Il Chung, ETRI, Korea </DIV>
<DIV> </DIV>
<DIV>Prof. Bart Preneel, Katholieke Universiteit Leuven, Belgium</DIV>
<DIV> </DIV>
<DIV>Prof. Javier Lopez, University of Malaga, Spain</DIV>
<DIV> </DIV>
<DIV>Prof. Victor Leung, University of British Columbia, Canada</DIV>
<DIV> </DIV>
<DIV>Prof. Hyoung Joong Kim, Korea University, Korea</DIV>
<DIV> </DIV>
<DIV> <BR>==Publication Chairs==</DIV>
<DIV> </DIV>
<DIV>Prof. Soo-Kyun Kim, PaiChai University, Korea</DIV>
<DIV> </DIV>
<DIV>Prof. Eun-Jun Yoon, Kyungpook National University, Korea</DIV>
<DIV> </DIV>
<DIV><BR>==Publicity Chairs==</DIV>
<DIV> </DIV>
<DIV>Xiaofeng Chen, Xidian University, China</DIV>
<DIV> </DIV>
<DIV>Hung-Min Sun, National Tsing Hua University, Taiwan</DIV>
<DIV> </DIV>
<DIV>Deok Gyu Lee, ETRI, Korea</DIV>
<DIV> </DIV>
<DIV>Lei Shu, National University of Ireland, Ireland </DIV>
<DIV> </DIV>
<DIV><BR>==Program Committee==</DIV>
<DIV> </DIV>
<DIV> TBA</DIV>
<DIV> </DIV>
<DIV>----------------------</DIV>
<DIV> </DIV>
<DIV>Contact Information</DIV>
<DIV> </DIV>
<DIV>----------------------</DIV>
<DIV> </DIV>
<DIV>If you have any question about the CfP and papers submission, please email
to Prof. Jong Hyuk Park (<A
href="mailto:parkjonghyuk1@hotmail.com">parkjonghyuk1@hotmail.com</A>) and Prof.
Sang-Soo Yeo (<A href="mailto:ssyeo@msn.com">ssyeo@msn.com</A>).</DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>- The End -<BR></FONT></DIV></BODY></HTML>