Cryptology and Information Security: Theory and its Applications
· Secret Key Cryptosystem / Public Key Cryptosystem
· Elliptic Curve Cryptosystem
· Key Management / Random Number Generation
· Digital Signature / Cryptographic Protocol
· Access Control / Identification and Authentication
· Electronic Cash / Electronic Payment / Electronic Commerce
· Smart Card and Secure PDA / Tamper Resistant Software
· Cryptanalysis / Auditing / Ubiquitous Security
· Risk Management and Risk Assessment
· Digital Watermark / Intellectual Property Protection
· Firewall / Intrusion and Detection / Anti-Virus / Information Warfare
· Steganography / Complexity Theory / Computational Number Theory
· Network Security / Computer Security / Information Security / Communication Security
· Blockcahin / Cryptocurrency
Ubiquitous security
· Security for location-based technology
· Privacy-enhancing technologies
· Ubiquitous service security
RFID/USN security
· Lightweight cryptographic protocols
· RFID/USN security standardization
Next-generation security
· VoIP
· IPTV
· SNS
· Big Data
Smart System Security
· Smart Card
· Smart Phone
· Smart Car
· Smart Work
· Smart Grid
Secure Industrial Control System
· Electricity Power Plant
· Highway Control System
· Railroad Control System
· Gas and Oil System
· Financial System
Converged Security
· Culture Security
· Cyber Physical System