| |||||||||||
FTRA WCC 2010 : [CALL FOR PARTICIPATION] The 2010 FTRA International World Convergence Conference 2010 (FTRA WCC 2010) | |||||||||||
Link: http://www.ftrai.org/wcc2010/ | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
CALL FOR PARTICIPATION %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% The 2010 FTRA International World Convergence Conference 2010 (FTRA WCC 2010) - Gwangju, Korea, December 9-11, 2010 - http://www.ftrai.org/wcc2010/ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCE DESCRIPTION The 2010 FTRA International World Convergence Conference (FTRA WCC 2010) will be held in will be held in Gwangju, Korea, December 9-11, 2010. The Conference is aimed at addressing key themes on "Technologies and Services for Converged environments". WCC 2010 chairs are very pleased to inform you that WCC 2010 has completed the paper review process and more than 170 people have registered so far before the registration deadline November 15. This year the WCC 2010 will take place in Gwangju, the ancient Capital of Korea, from 9-11 Dec. 2010, with the following key features: Topics Covered: + Cryptography and Security for Converged environments + Wireless sensor network for Converged environments + Multimedia for Converged environments + Smartphone for Converged environments + Bio-inspired computing for Converged environments + U-Healthcare for Converged environments %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% ORGANIZATION Steering Chair: + James J. Park, Seoul National University of Science and Technology (SeoulTech), Korea General / General-vice Chairs: + Han-Chieh Chao, National Ilan University, Taiwan + Sang-Soo Yeo, Mokwon University, Korea + Laurence T. Yang, St Francis Xavier University, Canada + Jong Suk Ahn, Dongguk University, Korea + Bezalel Gavish , Southern Methodist University, USA + Jianhua Ma, Hosei University, Japan + Young-Sik Jeong, Wonkwang University, Korea Program Chairs: + Jin Kwak, Soonchunhyang University, Korea + Shiguo Lian, France Telecom R&D Beijing, China + Sajid Hussain, Fisk University, USA + Seungmin Rho, Korea University, Korea + Isaac Woungang , Ryerson University, Canada + Bernady O. Apduhan , Kyushu Sangyo University, Japan + Hang-Bae Chang, Daejin University, Korea + Hosin Lee, University of IOWA, USA + Jaewoo Kang, Korea University, Korea + Mi Young Nam, Inha University, Korea + Yang Sun Lee, Chosun University, Korea + Sumi Helal, Program Co-Chair, University of Florida, USA + Deok Gyu Lee, ETRI, Korea Local Chairs: + Sang Yep Nam, Kookje College, Korea + Jong An Park, Chosun University, Korea + Tae Sun Choi, Gwangju Institute of Science anc Technology, Korea + Seong Ro Lee, Mokpo National University, Korea + Yong Sun Moon, Sunchon National University, Korea + Soo Hyung Kim, Chonnam National University, Korea + Chulwon Kim, Honam University, Korea Continuing the tradition of its successful predecessors, the program of WCC-10 will include: - Keynotes by Prof. Nazim Agoulmine, Prof. S. Shyam Sundar, and Prof. Kiseon Kim - Research Tracks with 158 research papers presenting for in-depth discussion of advanced research topics. - A great social program to encourage informal discussion among peers. We invite you to attend WCC-10! %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% INVITED SPEAKER (http://www.ftrai.org/wcc2010/invited.html) Dr. Nazim Agoulmine (University of Evry, France) - Challenges in U-Care and U-Health Smart Homes for Elderly: Convergence of Technologies as an Effective Approach Dr. S. Shyam Sundar (Pennsylvania State University, USA) - The Psychology of Convergence, New Environments, New Meanings Dr. Kiseon Kim (GIST, Korea) - Challenges in Underwater Sensor Networks and the 3-dimensional Localization Issue Using Mobile Beacons %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% List of WCC 2010 Workshops: + International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10) Site: http://www.ftrai.org/acsa2010 + International Workshop on Smartphone Applications and Services (Smartphone 2010) Site: http://www.ftrai.org/smartphone2010 + International Symposium on Wireless sensor network Technologies and Applications for Smart Space (WTA 2010) Site: http://www.ftrai.org/wta2010 + International Workshop on Advanced Future Multimedia Services (AFMS 2010) Site: http://www.ftrai.org/afms2010 + International Workshop on Bio-inspired computing for Hybrid Information Technology (BHIT 2010) Site: http://www.ftrai.org/bhit2010 + International Workshop on U-Healthcare Technologies and Services (U-Healthcare 2010) Site: http://www.ftrai.org/uhealthcare2010 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONFERENCE LOCATION & WEB SITE Gwangju is the leading city of the Honam region, which is being sought for its cutting-edge industry and culture, and a core middle city leading the development of the southwestern region. For a long time Gwangju has been known as a hometown of justice, art and beauty because citizens have never turned a blind eye to injustice and enjoy art, flavor and taste. You can see more specific information with the following link. http://eng.gwangju.go.kr/tourist/main.jsp Conference web site: http://www.ftrai.org/wcc20100/ Travel & Hotel Reservation site: http://www.ftrai.org/wcc2010/travel.html Registration site: http://www.ftrai.org/acsa2010/registration.html (ACSA 2010) http://www.ftrai.org/smartphone2010/registration.html (Smartphone 2010) http://www.ftrai.org/wta2010/registration.html (WTA 2010) http://www.ftrai.org/afms2010/registration.html (AFMS 2010) http://www.ftrai.org/bhit2010/registration.html (BHIT 2010) http://www.ftrai.org/uhealthcare2010/registration.html (UHealthcare 2010) %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% CONTACT For further information regarding the workshop and paper submission, please contact: ftra.secretary01@gmail.com or ftra.secretary02@gmail.com %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Accepted Paper Lists [ACSA 2010] 1. Fine-Grained User Access Control in Ciphertext-Policy Attribute-Based Encryption 2. Privacy Preserving Frequent Itemsets Mining via Secure Collaborative Framework 3. Security Analysis and Enhancement for Three-party Authenticated Key Exchange Protocol 4. Threat Scenario-Based Security Risk Analysis using the Use Case Modeling in Information Systems 5. Security Analysis of an Ultra-lightweight RFID Authentication Protocol--SLMAP 6. Cloud-DLS: Dynamic Trusted Scheduling for Cloud Computing Based on Bayesian Cognitive Method 7. Convertible Ring Signatures with Gradual Revelation of Non-Signers 8. Adaptive-capacity and Robust Natural Language Watermarking For Agglutinative Languages 9. Differential Fault Analysis on Block Cipher SEED 10. Results on Rotation Symmetric Functions over GF(p) 11. A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications 12. On Weaknesses of the HDCP Authentication and Key Exchange Protocol and Its Repair 13. Task-based Behavior Detection of Illegal Codes 14. Authenticated Public Key Broadcast Encryption Scheme Secure Against Insiders' Attack 15. Secure Key Establishment & Mutual Authentication In WPAN (SKEMA) 16. Modeling and Quantitatively Predicting Software Security Based on Stochastic Petri Nets 17. A Scalable and Privacy-preserving Child-care & Safety Service in Ubiquitous Computing Environment 18. Fault Detection and DFA Countermeasure for Montgomery Power Ladder in ECC 19. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups 20. A New Multistage Approach to Detect Subtle DDoS Attacks 21. Secure Concurrency Control Protocol with Timeliness Guarantees in Real-Time Database Systems 22. Securing Mobile Network Prefix Provisioning for NEMO based Vehicular Networks 23. Authentication Protocol using Identifier in Ad-hoc Network Environmente 24. Improving Performance of Network Covert Timing Channel through Huffman Coding 25. Related Key Chosen IV Attacks on Decimv2 and Decim-128 26. Mining Constraints in Role-Based Access Control 27. AS Alliance Based Security Enhancement for Inter-domain Routing Protocol 28. BLESS: Object Level Encryption for Secured Object-Based Storage System 29. A Novel Method for SQL Injection Attack Detection Based on Removing SQL Query Attribute Values 30. Discrete Logarithm Problem using Index Calculus Method 31. Enhanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks 32. Photography Forensic Approaches Based on Optical Illusions and a Signal Processing Technique 33. The Effect and Strategy Research of the Secure E-Commerce by the Application of P2P 34. Evaluating Trustworthiness of Prefix Announcements in Internet Routing 35. Generic Construction of Identity-Based Strong Key-Insulated Signature 36. Towards Implicitly Thwarting Stealth Malware with a Feather-weight Hypervisor 37. Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption 38. An Interaction Vulnerability Detection Model in Large Distributed System Based on Finite State Machine 39. Diffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication 40. Lightweight Access Control for Resource Limited Clients on Valid XML Data Streams 41. Non-Linear Approximations in Differential-Multiple Linear Cryptanalysis 42. Designing User Profiling Prototype for Identification of Malicious Forums 43. Detecting Memory Leak Using Virtualization Technology 44. Cryptanalysis of Grain 45. A more practical remote user authentication scheme using smart cards 46. A Study on Windows Malicious Code Classification System 47. Differential-Multidimensional Linear Cryptanalysis 48. Reconfigurable Hardware Implementation of a Simple Authentication Protocol for a Wireless Sensor Networks Platform 49. Related Key Chosen IV Attack on Modified Version of SNOW2.0 50. Immune-inspired Pattern Recognition Algorithm of Roving Agents for Anomaly Detection 51. An Efficient Privacy-Preserving Identity-Based Broadcast Signcryption for Large-Scale Wireless Sensor Networks 52. Integral Cryptanalysis of Reduced-Round MIBS Block Cipher 53. Breaking the Spacing Based Authentication Protocol 54. Even-variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity 55. Reliable Reputation Measure based on Feedback Ratings for E-business Application 56. Development to Protection Model from Large-Scale Information Leakage in Web Environments 57. Integrating Intrusion Detection and Access Control Systems: A survey 58. Fingerprint Verification using Geometric Hashing and Principal Component Analysis 59. AGVUS Ultra-Lightweight Mutual Authentication Protocol for Low-cost RFID Tags 60. Visualization of Abnormal Behavior Detection using Parallel Coordinate and Correspondence Analysis 61. Reversible Data Hiding for Halftone Images Using Histogram Modification 62. OpenID Based Personal Information Management System 63. A Tool Implementation Applied by PF Architectural Pattern to Integrate the Open Source Software for the Static Analysis 64. Design and Implementation of Code Virtualization for Binary Code Protection 65. Cryptanalysis of improved simple three-party key exchange protocols 66. A Scalable and Robust Hierarchical Key Establishment Scheme for Mission-Critical Applications over Sensor Networks 67. The Study on a Convergence Security Service for Manufacturing Industries 68. A Security Model for IPTV with One-Time Password and Conditional Access System for Smart Mobile Platforms 69. Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks 70. Guess and Determine Attack on Bivium 71. Generic Constructions for Strong Designated Verifier Signature 72. Virus Detection Method based on Behavior Resource Tree 73. EAACS: A Proactive and Adaptive Access Control Scheme for Parallel Multiple Emergencies Management of CPS applications 74. A Method of Risk Assessment for Multi-Factor Authentication [WTA 2010] 75. Extracting and Visualizing Human Activity Patterns of Daily Living in a Smart Home Environment 76. Power-Aware Scheme for Reliable Data Delivery in Wireless Sensor Networks 77. Activity-driven Optimized Bus Specific Clock Gating for Ultra-Low-Power Smart Space Applications 78. Real-Time Low Bitrate Multimedia Communication For Smart Spaces and Wireless Sensor Networks 79. Pair-wise Key Management in Heterogeneous Sensor Networks 80. Specified Nearest Neighbor Query Processing in WSNs-based Smart Spaces 81. Collaborative Routing and Camera Selection for Visual Wireless Sensor Networks 82. Real-time Physiological and Vision Monitoring of Vehicle Driver for Nonintrusive Drowsiness Detection 83. ITFBS: Adaptive Intrusion-tolerant Scheme for Body Sensor Networks in Smart Space Application 84. Implementation of SOPC Embedded System for Wireless Sensor Networks Control Center with uClinux Operating System 85. Smart Device Applying Self-adaptation Technologies for Smart Space 86. On Implementation of the IEEE 802.15.4 Module with CFP in NS-2 87. A study on PVDF sensor using wireless experimental system for bridge structural local monitoring 88. Storage-efficient Data Gathering in Wireless Sensors 89. A Study of Context-Based Adaptive Service Model in Home Environments 90. Medium Reservation based Sensor MAC protocol for Low Latency and High Energy Efficiency 91. A Novel Scheme to Prevent MAC Layer Misbehavior in IEEE 802.11 Ad Hoc Networks 92. Attack Containment in Mobile Ad-hoc Networks through Fair 93. Towards More Reliable and Secure Source Routing in Mobile Ad Hoc and Sensor Networks 94. An Enhanced Two-Factor User Authentication in Wireless Sensor Networks 95. A circular polarization antenna design for improving the reception of UHF RFID reader 96. The Biometric based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits 97. Power-efficient M-ary PSSK communications 98. Wireless LAN Access Point Placement based on User Mobility 99. Mobile SMS Spam Filtering 101. The impacts of an electronic marketplace with multiple independent retailers for smart grocery ordering systems 102. Ontology based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications 103. Human Abnormality Detection for Smart Spaces using Motion Sequence Matching 104. A Polygon Reduction Method for Improving Accuracy of Ranging-Based Indoor Localization System 105. Efficient Signal Detection Scheme Based on Spreading Sequence for LED-ID Systems 106. Tunnel Restraint to Prevent Out-of-Order Packets for Route Optimization in Proxy Mobile IPv6 107. Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks 108. Energy Efficient Distributed Face Recognition in Wireless Sensor Network 109. Dynamic Voltage and Frequency Scaling for Power-Constrained Design using Process Voltage and Temperature Sensor Circuits 110. Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video coding 111. Guard-Border Cut Detection Algorithm in Wireless Sensor Network 112. Security Framework for RFID-based Applications in Smart Home Environment [AFMS 2010] 113. Data Reorganization for Scalable Video Service with Embedded Mobile Devices 114. Color Division Method By Neo-Impressionist Manner 115. A Novel Secure RF4CE Communication for Efficient Multimedia Control in Smart Home Embedded Systems 116. Area-Efficient Convolutional Deinterleaver for Mobile-TV Receiver 117. ENFFiS: An Enhanced NAND Flash Memory File System for Mobile Embedded Multimedia System 118. Physical Activity Recognition using Multiple Sensors Embedded in a Wearable Device 119. An intrinsic semantic framework for recognizing image objects 120. A Middleware for Projector-based Procedure-aware Tabletop Applications 121. Evaluating Two Implementations of the Component Responsible for Decoding Video and Audio in the Brazilian Digital TV Middleware 122. A Study on Block-based Recovery of Damaged Digital Forensic Evidence Image 123. The Study on Content Based MuItimedia Data Retrieval System 124. TZCD-MBOK Watermarking Scheme for Disaster Broadcasting Service in T-DMB System 125. Tertiary hash tree: hash-based index structure for high-dimensional data 126. Strategies for Global Commercialization of the WiBro Service Based on the Delta Model and ANP 127. Application of Semantic Web Technologies for Automatic Multimedia Annotation 128. Recommender System Design using Movie Genre Similarity and Preferred Genres in SmartPhone 129. Multimodal Concept Fusion using Semantic Closeness for Image Concept Disambiguation 130. English Course E-learning System Based On Relative Item Difficulty Using Web Component Composition 131. Lifting a Metadata Model to the Semantic Multimedia World 132. A Cultural Dimensions Model Based on Smart Phone Applications 133. A Multi-dimensional UI Design for Content Browser on Mobile IPTV [Smartphone 2010] 134. ANON - a Twitter for products 135. Sketching up the world: In-situ authoring for mobile Augmented Reality 136. Android Runtime Security Policy Enforcement Framework 137. Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control 138. PowerPedia 139. Mobile Exploration of Geotagged Photos 140. Secure and Efficient Public Key Management In Next Generation Mobile Networks 151. A Smartphone Watch for Mobile Surveillance Service 152. Performance Analysis of Authentication and Key Distribution Scheme for Mobile Multi-hop Relay in IEEE 802.16j 153. Recovery method of Deleted Record for SQLite Database 154. An Efficient and Low Cost Windows Mobile BSN Monitoring System Based on TinyOS 155. Ensuring Anonymity for LBSs in Smartphone Environment [U-Healthcare] 156. Security Requirements and Standard Architecture Design for u-health Device 157. Design an Efficient Routing Strategy for VANETs in a City Environment 158. Medicare-Grid: A Grid Based E-Health System 159. TOL-PTEQ for In-sufficient Cyclic-prefix OFDM Transmissions 160. Self-Decision Activity in Hierarchical Wireless Sensor Networks 161. ECG Dipole Source Localization in 3D Human Model 162. A Software Architecture for Collaborative Visualization Environments 163. Error-resilient Transmission of Patient Video over Mobile Network 164. A Study on a Portable Health Monitoring System with Wristband using Photoplethysmograph and Skin Temperature [BHIT] 165. LGTBase: LARGE-like GlcNAc-transferase Database 166. Feature Extraction for Termite Tunneling Using Information Relevance and GA 167. SignatureClust: A Tool for Landmark Gene-guided Clustering 168. Putative Xylosyltransferase Genes in Trichomonas vaginalis 169. Effects of 12-Weeks Circuit Weight Training and Aerobic Exercise on Body Composition, Physical Fitness, and Pulse Wave Velocity in Obese Collegiate Women |
|