SECURENETS 2011 - Securenets 2011 1st International ICST Workshop on Secure Wireless Networks
View: 562
Website http://www.valuetools.org/2011 |
Edit Freely
Category SECURENETS 2011
Deadline: November 05, 2010 | Date: May 20, 2011
Venue/Country: Paris, France
Updated: 2010-09-19 10:35:14 (GMT+9)
Call For Papers - CFP
Securenets 20111st International ICST Workshop on Secure Wireless NetworksMay 20, 2011. Ecole Normale Supérieure de Cachan (South of Paris), FranceScopeThe issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-layer has already been established and provides an error free link. Therefore, there has been a recent attention on studying the fundamental ability of the physical-layer to provide secure wireless communications. Physical-layer security is an emerging research area that explores the possibility of achieving perfect-secrecy data transmission among intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The breakthrough concept behind wireless physical-layer security is to exploit the characteristics of the wireless channel for improving the reliability of wireless transmissions The objective of the workshop is to stimulate interest for research in practical and theoretical aspects of physical-Layer security. The workshop will include one keynote lecture and a panel discussion to understand the applicability of the techniques in future wireless systems.Workshop TopicsSolicited topics encompass all aspects of game-theoretical analysis as it applies to communication networks including (but not limited to) the following areas:Opportunistic secrecyThe wiretap channel with feedbackAuthentication over the wiretap channelInformation theoretic secrecy of fading channelsSecrecy through public discussionWireless key distributionMulti-user channels with secrecy constraintsMIMO wiretap channelsRelay-eavesdropper channelScheduling for secure communicationsGame theoretic approaches for secrecyCodes for secure transmissionSecure compressionCognitive approaches for secrecy
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.