The 6th International Workshop on
Security & Optimization for Wireless Networks
(SOWN 2017)
Sydney, Australia, August 1 - 4, 2017
In conjunction with
The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
(IEEE TrustCom-17)
http://stprp-activity.com/TrustCom2017
All accepted papers will be included in the IEEE TrustCom2017 main proceedings (Indexed by EI)
The 6th International Workshop on Security & Optimization for Wireless Networks (SOWN 2017) covers comprehensively the common issues about security and optimization in the hot area of wireless networks, which does hinder further development of its applications. In particular, this workshop concentrates on security problems like key management, privacy, cryptographic protocol and optimization problems like energy-efficient protocol, topology control strategy, QoS, etc.
The objective of this workshop is to present state of the art research results in the rapidly growing area of wireless networks, with emphasizes on security and optimization issues. Following the success of SOWN-11 (held in Beijing, China, in conjunction with MSN-11) and SOWN 2012 (held in Liverpool, UK, in conjunction with IEEE TrustCom-12). SOWN-13(held in Australia, in conjunction with IEEE TrustCom-13). SOWN-15 (held in Liverpool in conjunction with IEEE CIT2015). SOWN-16 (held in Wuhan in conjunction with IEEE ICPADS 2016). SOWN-17 provides continuously the participants with opportunities to discuss and explore areas related to the Theory, Development, Applications, Experiences, and Evaluation of wireless networks with fellow students, researchers, and practitioners.
ORGANIZING COMMITTEE
General Chairs
Xu Li
Fujian Normal University, China.(xuli@fjnu.edu.cn)
Yi Mu
University of Wollongong, Australia.(ymu@uow.edu.au)
Program Chairs
Dong Yuan
University of Sydney, Australia (dong.yuan@sydney.edu.au)
Hui Lin
Fujian Normal University, China. (linhui@fjnu.edu.cn)
Publicity Chairs
Jia Hu,
University of Exeter, UK.
Xinghua Li
Xidian University, China.
Program Committee
Jianliang Gao, Imperial College, London, UK
Xiucai Ye, University of Tsukuba, Japan
Zhiwei Lin,University of Ulster, UK
Joseph K. Liu,Monash University, Australia
Huaqun Wang,Dalian Ocean University, China
Hung-Min Sun,National Tsing Hua University, Taiwan
Lein Harn,University of Missouri-Kansas City, USA
Yulei Wu,University of Exeter, UK
Yulong Shen,Xidian University, China
Li Yang,Xidian University, China
Yong Li,Beijing Jiaotong University, China
Dongming Wang,Southeast University, China
Liang Xiao,Xiamen University, China
YulongZou,Nanjing University of Posts and Telecommunications, China
Xianhang Zheng,Fuzhou University, China
Xinyi Huang,Fujian Normal University, China
Changlu Lin,Fujian Normal University, China
Jing Zhang,FuJian University of Technology, China
Limei Lin,Fujian Agriculture and Forestry University, China
Yuexin Zhang,Deakin University,Australia
Fuchun Guo,University of Wollongong, Australia
Jin Wang,Yangzhou University, China
Genjian YU,Minjiang University, China
We are seeking papers that describe original and unpublished contributions addressing various aspects of wireless networks. Potential topics of interest include, but are not limited to:
Cross layer design
Trusted computing
Game theory
Big data security
Secure cryptographic protocol
Key management
Secret sharing
Cryptography and its applications
Topology control and fault tolerant
Sensor Cloud
Internet of thing
Fault diagnosis
Positioning and tracking
Green computing
Security and privacy
Cooperation communication
Access control
Modeling and simulation
Resources allocation and schedule
Cognitive radio networks
Paper Submission Deadline: May 10 2017
Notification Date: May 25 2017
Camera-ready Paper Due: May 31 2017
Conference Date: August 1-4 2017
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages in A4 format, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected best papers will be published in high quality international journals.
Submission site (With EasyChair): https://easychair.org/conferences/?conf=trustcom2017 or you can send it as an e-mail attachment to Dr. Dong Yuan at dong.yuan@sydney.edu.au and CC to Dr. Hui Lin at linhui@fjnu.edu.cn.
Papers accepted for workshops will be published by the IEEE Computer Society Press. All accepted papers in the conference will be published in the proceedings of the conference and submitted to the IEEE Xplore Digital Library and indexed by EI. Best Paper Award will be presented in the conference.
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学) |
邮编:350007 联系电话:0591-83456050转406 |
访问量:
158962020年11月04日
|