| |||||||||||||||
SP4SC 2016 : Second International Workshop on Signal Processing for Secure Communications | |||||||||||||||
Link: http://host.uniroma3.it/laboratori/sp4te/sp4sc/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
With the proliferation of many innovative data communications services such as social networks, cloud computing, location-based service, and Internet of Things, security and privacy issues become more and more demanding and challenging. In addition, wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most workshops and symposiums on physical layer secrecy focus on the information-theoretic aspect, we look specifically at the signal processing aspects of secure physical layer communications.
This workshop aims to bring together academics and industry professionals in the signal processing area as well to practitioners and engineers working on the security and privacy aspects of data communications and computer networks. This workshop will also provide a forum to present and discuss emerging ideas, progresses and trends in this highly challenging research field. Accordingly, we invite contributions that apply these signal processing approaches to more advanced wired and wireless systems, such as OFDM systems, cognitive radio, multi-hop networks etc. We also welcome novel research on side-channels and covert channels, where approaches from signal processing are used to strengthen/weaken the security of embedded devices. This will draw interest from researchers that wish to pursue the topic further in these new directions, facilitating scientific cross-fertilization. Topics of interest for articles include (but are not limited to) signal processing, security and privacy for: * Intrusion detection and protection systems * Mobile and wireless communications * Software and cognitive radios * Cloud computing * Pervasive and ubiquitous computing * Location-based service * Social networks * Internet of Things * Side and Covert channels * Hardware Implementation * Key management and Public Key Infrastructures SUBMISSION GUIDELINES All papers must represent original and unpublished work that is not currently under review. Papers should not exceed 6 pages in length. Each submitted paper must conform to the IEEE format and submission guidelines. Submissions will be evaluated according to the relevance and originality of the work and to their ability to generate discussions between the participants of the workshop. The revision process is double-blind. So please remove the authors' names from the pdf file when submitting your paper. PUBLICATION Accepted papers will be published by the IEEE Conference Publishing Services (CPS) and will be submitted to the IEEE-Xplore and the IEEE Computer Society (CSDL) digital libraries. The proceedings are also submitted for indexing through SCOPUS, IEE INSPEC, EI (Compendex), Thomson ISI, and other indexing services. |
|