Call for Papers

Screenshot (8) - Kopie Screenshot (8) - Kopie - Kopie

CfP AsiaARES 2015

AsiaARES is a new conference that builds on the success of seven subsequent annual ARES conferences and specifically aims at a better access of most current IT-security research results to and from the Asian region. The ultimate goal is to establish a community and a meeting point for security researchers and to make travel shorter and the venues easily accessible for researchers from Asia. To allow a large number of researchers to participate we will also provide interactive sessions for research in progress papers and poster sessions. Moreover, we will offer virtual presentations for which you submit a video presentation in addition to your paper and the paper will be discussed using online collaboration tools.

AsiaARES emphasizes the interplay between foundations and practical issues of security in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. The conference is devoted to the critical examination and research challenges of the various aspects of Secure and Dependable Computing and the definition of a future road map.
Selected papers that are accepted by and presented at AsiaARES will be published, after further revision, in special issues of international journals.

AsiaARES 2015 will be held as a Special Track Conference within ICT-EURASIA .

ICT-EURASIA 2015 will be held for the first time as part of IFIPs WCC-2015 at the Daejeon Convention Center in Daejeon, Korea from October 4th to 7th 2015. On a two-year basis the International Federation for Information Processing brings together experts from all over the world, representing the commercial, industrial and scientific sector, to showcase and discover innovative ideas.. ICT-Eurasia is supported by ASEA-Uninet (ASEAN-European University Network), EPU (Eurasian Pacific University Network), IFIP (International Federation for Information Processing).

Important Dates

  • Submission Deadline: May 10th, 2015 May 22nd, 2015
  • Author Notification: June 26th, 2015
  • Camera Ready Deadline: July 22nd, 2015
  • C onference: October 4th – 7th, 2015

Submission and Registration Details

  • Contributions should present original research that has not been published or submitted yet.
  • Contributions should not exceed 10 pages and must be submitted as PDF in LNCS format.
  • Papers should be submitted electronically via
  • At least one author per contribution must be registered at the WCC-2015 conference.


The proceedings of the conference will be published by Springer LNCS as part of the WCC-2015 Conference Proceedings.

Post Publications

The following venues for the AsiaARES’15 post publications have been confirmed:

  • SI on Foundations and Practice of Security in Emerging ICT Applications (IJCSSE, SCIE journal)
    Guest Editors: Ilsun You (Korean Bible University, South Korea), Sherali Zeadally (University of Kentucky, USA), A Min Tjoa (Vienna University of Technology, Austria)

For further informatin please hava a look at the call for papers for the special issue of

Program Committee Chairperson

Ilsun You, Soon Chun Hyang University, South Korea

Program Committee

Topics and areas of interest include, but are not limited to:

  • Authorization and Authentication
  • Availability and Reliability
  • Business Continuity & Resilience
  • Cost/Benefit Analysis
  • Cryptography
  • Dependability Aspects for  Special Applications (e.g. ERP-Systems, Logistics)
  • Dependability Aspects of Electronic Government (e-Government)
  • Dependability Administration
  • Dependability in Open Source Software
  • Designing Security Requirements
  • Digital Forensics
  • E-Commerce
  • Dependability
  • Failure Prevention
  • Identity Management
  • IPR of Security Technology
  • Incident Response and Prevention
  • Information Flow Control
  • Information Hiding
  • Internet Dependability
  • Interoperability Aspects
  • Intrusion Detection and Fraud Detection
  • Legal Issues
  • Mobile Security
  • Network and Organizational Vulnerability Analysis
  • Network Security
  • Privacy-Enhancing Technologies
  • Process based Security Models and Methods
  • RFID Security and Privacy
  • Risk planning, Analysis & Awareness Safety Critical Systems
  • Secure Enterprise Architectures
  • Security Issues for Ubiquitous Systems
  • Security and Privacy in E-Health
  • Security and Trust Management in P2P and Grid applications
  • Security and Privacy for Sensor Networks, Wireless/Mobile Devices and   Applications
  • Security and Usability
  • Security as Quality of Service
  • Security in Distributed Systems / Distributed Databases
  • Security in Electronic Payments
  • Security in Electronic Voting Software Engineering of Dependable   Systems
  • Software Security Standards, Guidelines and Certification
  • Survivability of Computing Systems
  • Temporal Aspects of Dependability Threats and Attack Modeling
  • Trusted Computing Tools for Dependable System Design and  Evaluation Trust Models and Trust   Management
  • VOIP, Wireless Security