posted by user: 743zh2k || 2261 views || tracked by 4 users: [display]

IWCS 2011 : The 1st FTRA International Workshop on Convergence Security in Pervasive Environments


When Jun 28, 2011 - Jun 30, 2011
Where Crete, Greece
Submission Deadline Jan 31, 2011
Notification Due Mar 1, 2011
Final Version Due Apr 1, 2011

Call For Papers

[IWCS 2011 Call for Papers]

** Important Notices **

1. Submission due: Jan. 31, 2011

2. All accepted papers will bepublished in the Springer LNCS/CCIS proceedings (EI and ISTP),
which will be indexed by the following services: EI Compendex(Since 2010),
ISI Conference Proceedings Citation Index - Science (CPCI-S),
included in ISI Web of Science, DBLP and Scopus.

3. All accepted and presented papers in IWCS 2011, after further revisions,
will be published in the special issues of the following international journals:

- IJDWM, IGI-Gobal (SCI-E),
- The Computer Jorunal, Oxford University Press (SCI-E),
- SCN, Wiley InterScience (SCIE),
- IJITCC, InderScience,
- JoC, FTRA Publishing,
- JIPS, KIPS (KCI-E index)


The 1st FTRA International Workshop on Convergence Security in
Pervasive Environments (IWCS 2011)

Crete, Greece, June 28 - 30, 2011


A recent emerging issue in information technology is the convergence of different kinds of applications. Convergence brings a user-centric environment to provide computing and communication services. In order to realize IT advantages, it requires the integration of security and data management to be suitable for pervasive computing environments. However, there are still many problems and major challenges waiting for us to solve such as the security risks in convergence application, which could appear when devices interact with different kinds of applications. Therefore, we need to explore convergence security in pervasive environments.

IWCS 2011 addresses the various theories and practical applications of convergence security in pervasive environments. It will present important results of significant value in order to improve application services and solve various problems within the scope of IWCS 2011. In addition, we expect it will trigger further related research and technology developments that will improve our lives in the future.

Another area that must be considered in the convergence of different security services in pervasive environments is the Internet of Things (IoT). There are many definitions of the IoT, but all of them revolve around the same central concept: a world-wide network of interconnected objects. It is to be expected that the elements of a pervasive environment will greatly benefit from Internet connectivity, as pervasive devices will be able to interact with external entities by obtaining services or even by providing them. However, it is necessary to address how the different security mechanisms used in the local pervasive environment could interact with protocols and mechanisms (e.g. secure web services) that allow secure collaboration with remote entities. Considering that the security of the IoT is a topic that is currently being considered a priority by many different industrial, commercial and governmental actors, the secure convergence of this new paradigm with pervasive environments is a potential research field that will be taken into account in our workshop.

Topic of Interest
- Trust and Reputation Management in Pervasive Computing
- Security Applications and Services in Pervasive Computing
- Security Model for Pervasive Computing
- Intelligent Multimedia Security Services in Pervasive Computing
- Key Management and Authentication in Pervasive Computing
- Network Security Issues and Protocols in Pervasive Computing
- Access Control and Privacy Protection in Pervasive Computing
- Security Standard for Next Pervasive Computing
- Security in Human Centred Environments
- Natural Interfaces Security Issues
- Advanced Multimodal Interfaces
- Human Oriented Interfaces
- Multimodal Mobile and Ubiquitous Services
- Methods for Multimodal Integration
- Middleware Services for Multimodal and Pervasive Applications
- Context-Awareness in Multimodal Applications
- Multimodal Analysis and Recognition of Contex
- Next Ubiquitous and Immersive Environments
- Virtual Reality and Ubiquitous Computing
- Usability and Accessibility in Ubiquitous Applications
- Applications and Scenarios
- Wireless Applications
- Pervasive Computing Applications
- Wireless Multimedia Applications
- Others: Commercial or Industrial Issue in Pervasive Computing
- Secure collaboration between pervasive environments through the Internet
- Protecting the integration of pervasive environment with the Internet of Things

Paper Submission
There will be a combination of presentations including scientific papers. Prospective authors are invited, in the first instance, to submit papers for oral presentations in any of the areas of interest for this workshop.
Authors should submit a paper with 4-6 pages in length(Max. 8 pages, extra charges for two pages) by using online systems for review.

All accepted papers will be published in the Springer CCIS proceedings (EI and ISTP), which will be indexed by the following services:

EI Compendex(Since 2010), ISI Conference Proceedings Citation Index - Science (CPCI-S), included in ISI Web of Science, DBLP and Scopus.

For more detail, please refer STA 2011 site (URL:

Submission URL:

Important Dates
Paper Submission Deadline: Jan. 31, 2010
Paper Status Notification: Mar. 1, 2011
Camera-ready Due: April 1, 2011
Conference events: June 28 - 30, 2011

If you have any questions about the CFPs and papers submission, please email to
Prof. Jose A. Onieva ( and
Dr. Kyusuk Han (

==General Chairs==
Jose A. Onieva, University of Malaga, Spain
Charalabos Skianis, University of Aegean, Greece

==Program Chairs==
Kyusuk Han, KAIST, Korea
Rodrigo Roman Castro, University of Malaga, Spain

==Publicity Co-chairs==
Christos Xenakis, University of Piraeus, Greece
Eleni Darra, University of Piraeus, Greece
Evangelos Rekleitis, University of Piraeus, Greece

==Program Committee==
Alexander De Luca, Ludwig-Maximilians-Universitat, Germany
Anthony H.M. Chung, University of Lancaster, UK
Antonio Jara, University of Murcia, Spain
Chan Yeun Yeob, Khalifa University of Science Technology and Research, UAE
Damien Sauveron, XLIM, University of Limoges, France
Deok Gyu Lee, ETRI, Korea
Fabio Martinelli, Information Security Group, IIT-CNR, Italy
Florian Michahelles, ETH Zurich, Switzerland
Florina Almen찼rez, University Carlos III of Madrid, Spain
Han-You Jeong, Pusan University, Korea
Hyohyun Choi, Inha Technical College, Korea
Isaac Agudo, Universidad de Malaga, Spain
Jae-il Lee, KISA, Korea
Javier Lopez, Computer Science Department, University of Malaga, Spain
Jeong Hyun Yi, Soongsil University, Korea
Jongsub Moon, Korea University, Korea
Jordi Herrera Joancomarti Open University of Catalonia, Spain
Jose A. Montes Universidad de M찼laga, Spain
Levente Buttyan BME, Hungary
Magdalena Payeras-Capella University of the Balearic Islands, Spain
Manik Lal Das Dhirubhai Ambani Inst. for Information and Communication Tech., India
Marc Lacoste France Telecom R&D/Orange Labs, France
Mar챠a Francisca Hinarejos University of the Balearic Islands, Spain
Mark Billinghurst Univ. of Canterbury, New Zealand
Masoom Alam Institute of Management Sciences(Assistant Professor),Pakistan
Miguel Soriano Universitat Politecnica de Catalunya, Spain
Nicolas Sklavos Tech. Educational Institute of Patras, Greece
Olivier Markowitch ULB, Belgium
Panagiotis Rizomiliotis University of the Aegean, Greece
Pierangela Samarati Department of Information Technologies, University of Milan, Italy
Rodrigo Roman Castro University of Malaga, Spain
Ruben Rios del Pozo University of Malaga, Spain
Sokratis Katsikas Dept. of Technology Education & Digital Systems, University of Piraeus, Greece
Stefanos Gritzalis Info-Sec-Lab, University of the Aegean, Greece
Sunwoong Choi Kookmin University, Korea
Thomas Strang, German Aerospace Center (DLR), Germany
Thomas Wook Choi, Hankuk University of Foreign Studies, Korea
Won Joo Lee, Inha Technical College, Korea
Yong Lee, ChungJu University, Korea

Related Resources

MDPI-SI on DT & FIE in Ed--Scopus,JCI 2023   MDPI Education Sciences Journal - Special Issue on Digital Twins and Future Intelligent Educational Environments
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
doors 2023   3rd Edge Computing Workshop
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
IEEE Journal of Selected Topics in Appli 2023   Security and Privacy-preserving Solutions on Remote Sensing Data of Smart Cities
ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
IEEE PICom 2022   The 20th IEEE International Conference on Pervasive Intelligence and Computing