Convergence-based service environments are embedded in large-capacity servers and adopt client/server models. Applications, devices, networks, and infrastructure are converging and creating an immense amount of content, which poses complex challenges for organizations, developers and users. In the field of security, we are seeing the convergence of frameworks and paradigms like augmented reality, ubiquitous computing and pervasive computing; and we are seeing new kinds of content, much of it user-generated, that can be searched, organized and consumed on many devices and in many formats [10][11][12][13][14][15] Division of Information and Communication, Baekseok University, Cheonan, Republic of Korea tion frameworks, scalable algorithms, and new paradigms for information discovery; and ways of searching, organizing and delivering converged information for delivery at the right place, at the right time and at the right level of detail. This special focus issue on convergence security systems will address the need for novel services and reviews security vulnerabilities in recent years. Some of these research areas are listed below.• Privacy and authentication for wireless networks This special issue is devoted to one of the hottest topics in convergence security systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques.Lee et al.[1] present reconfigurable real number-field elliptic curve cryptography to improve security. They propose a method for configuring a cryptographic system using real number-field coordinates on an elliptic curve, as well as a finite field, through expansion of existing elliptic curve cryptography. They discuss a method for application of an elliptic curve defined on a real-number field for cryptographic systems and the advantages obtained from the use of a realnumber field. Hong [2] introduces an efficient and secure 123