Cryptology and Information Security: Theory and its Applications

· Secret Key Cryptosystem / Public Key Cryptosystem
· Elliptic Curve Cryptosystem
· Key Management / Random Number Generation
· Digital Signature / Cryptographic Protocol
· Access Control / Identification and Authentication
· Electronic Cash / Electronic Payment / Electronic Commerce
· Smart Card and Secure PDA / Tamper Resistant Software
· Cryptanalysis / Auditing / Ubiquitous Security
· Risk Management and Risk Assessment
· Digital Watermark / Intellectual Property Protection
· Firewall / Intrusion and Detection / Anti-Virus / Information Warfare
· Steganography / Complexity Theory / Computational Number Theory
· Network Security / Computer Security / Information Security / Communication Security

Ubiquitous security

· Security for location-based technology
· Privacy-enhancing technologies
· Ubiquitous service security

RFID/USN security

· Lightweight cryptographic protocols
· RFID/USN security standardization

Next-generation security

· VoIP
· IPTV
· SNS
· Big Data

Smart System Security

· Smart Card
· Smart Phone
· Smart Car
· Smart Work
· Smart Grid

Secure Industrial Control System

· Electricity Power Plant
· Highway Control System
· Railroad Control System
· Gas and Oil System
· Financial System

Converged Security

· Culture Security
· Cyber Physical System