Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    SECURENETS 2011 - Securenets 2011 1st International ICST Workshop on Secure Wireless Networks

    View: 562

    Website http://www.valuetools.org/2011 | Want to Edit it Edit Freely

    Category SECURENETS 2011

    Deadline: November 05, 2010 | Date: May 20, 2011

    Venue/Country: Paris, France

    Updated: 2010-09-19 10:35:14 (GMT+9)

    Call For Papers - CFP

    Securenets 2011

    1st International ICST Workshop on Secure Wireless Networks

    May 20, 2011. Ecole Normale Supérieure de Cachan (South of Paris), France

    Scope

    The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-layer has already been established and provides an error free link. Therefore, there has been a recent attention on studying the fundamental ability of the physical-layer to provide secure wireless communications. Physical-layer security is an emerging research area that explores the possibility of achieving perfect-secrecy data transmission among intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The breakthrough concept behind wireless physical-layer security is to exploit the characteristics of the wireless channel for improving the reliability of wireless transmissions The objective of the workshop is to stimulate interest for research in practical and theoretical aspects of physical-Layer security. The workshop will include one keynote lecture and a panel discussion to understand the applicability of the techniques in future wireless systems.

    Workshop Topics

    Solicited topics encompass all aspects of game-theoretical analysis as it applies to communication networks including (but not limited to) the following areas:

    Opportunistic secrecy

    The wiretap channel with feedback

    Authentication over the wiretap channel

    Information theoretic secrecy of fading channels

    Secrecy through public discussion

    Wireless key distribution

    Multi-user channels with secrecy constraints

    MIMO wiretap channels

    Relay-eavesdropper channel

    Scheduling for secure communications

    Game theoretic approaches for secrecy

    Codes for secure transmission

    Secure compression

    Cognitive approaches for secrecy


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.