ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TCPLS 2014 - 2nd Workshop on Trusted Communications with Physical Layer Security (TCPLS20014)

Date2014-12-12

Deadline2014-07-15

VenueTexas, USA - United States USA - United States

Keywords

Websitehttps://www.leeds.ac.uk/tcpls2014/index.htm

Topics/Call fo Papers

GLOBECOM 2014 Workshop - 2nd Workshop on Trusted Communications with Physical Layer Security (TCPLS20014)
http://www.leeds.ac.uk/tcpls2014/index.htm
12th December 2014 in Austin, Texas. USA
Deadline for workshop paper submission: July 15, 2014
Acceptance/rejection announcement: September 1, 2014
Final workshop (camera ready) papers due: October 1, 2014
Workshop: December, 12, 2014
===
Due to the broadcast nature of the wireless channels, security and privacy is of utmost concern for future wireless technologies. However, securely transferring confidential information over a wireless network in the presence of eavesdroppers that may intercept the information exchange between legitimate terminals, still remains a challenging task. Although security was originally viewed as a high-layer problem to be solved using cryptographic methods, physical layer security is now emerging as a new promising mean of defense to realize and enhance wireless secrecy in communications. In wireless physical layer security, the breakthrough idea is to exploit the intrinsic characteristics of the wireless channels, such as multipath fading, path losses, or noise, to transmit a message from a source to the intended receiver while keeping confidentiality from both passive and active eavesdroppers.
After the success of the last year, the second workshop on trusted communications with Physical layer security aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on fundamental and practically relevant questions related to the many challenges arising from secure communications at the physical layer. In line with such objectives, original contributions are solicited in topics of interest including, but not limited to, the following:
Secure methodologies and architectures for mobile and wireless networks
Secure signal processing
Secure fundamental theory
Secure advanced spatial diversity techniques (secure cooperative communications, secure two-way cooperative communications, secure MIMO communications and secure cognitive radio systems)
Secure resource allocation (secure optimization, secure cross-layer optimization and game theory techniques)
Multi-user information theoretical security
Cross-layer designs for security
Security and privacy in the Internet of Things
Security and quantum communications
Trust, security and privacy in e-government, e-systems & social networking
Trust, security and privacy in cloud computing
Performance of practical testbeds for PHY security
===
General Chairs
H. Vincent Poor, Princeton University, USA. e-mail: poor-AT-princeton.edu
Maged Elkashlan, Queen Mary, University of London, UK. e-mail: maged-AT-eecs.qmul.ac.uk
Des McLernon, University of Leeds, UK. e-mail: d.c.mclernon-AT-leeds.ac.uk
TPC Chairs
Trung Q. Duong, Queen’s University Belfast, UK. e-mail: trung.q.duong-AT-qub.ac.uk
Kyeong J. Kim, Mitsubishi Electric Research Laboratories (MERL), USA. e-mail: kkim-AT-merl.com
Nghi H. Tran, University of Akron, USA. e-mail: nghi.tran-AT-uakron.edu
Nabil Romero-Zurita, University of Leeds, UK. e-mail: el08lnrz-AT-leeds.ac.uk.

Last modified: 2014-06-03 22:47:17