Conferences related to Secure Communications

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.


2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.


SoutheastCon 2019

The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.

  • SOUTHEASTCON '96

  • SOUTHEASTCON '97

  • SOUTHEASTCON '98

  • SOUTHEASTCON '99

  • SOUTHEASTCON 2000

  • SOUTHEASTCON 2001

  • SOUTHEASTCON 2002

  • SOUTHEASTCON 2003

  • SOUTHEASTCON 2004

  • SOUTHEASTCON 2005

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • IEEE SOUTHEASTCON 2013

    Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2014

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SoutheastCon 2015

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SoutheastCon 2016

    Annual Region 3 Trifecta of Student competitions, Technical papers and volunteer training and administration.

  • SoutheastCon 2017

    Broad scope professional paper conference, region 3 annual meeting, region 3 annual student conference

  • SoutheastCon 2018

    SoutheastCon is a annual conference held in Region 3 and covers a Professional Track, Student Track and Regional Track.


2019 IEEE Industry Applications Society Annual Meeting

The Annual Meeting is a gathering of experts who work and conduct research in the industrial applications of electrical systems.



Periodicals related to Secure Communications

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...



Most published Xplore authors for Secure Communications

Back to Top

No authors for "Secure Communications"


Xplore Articles related to Secure Communications

Back to Top

The IEE Seminar on Quantum Cryptography: Secure Communications for Business? - Title

2005 The IEE Seminar on Quantum Cryptography: Secure Communications for Business (Ref. No. 2005/11310), 2005

The following topics were dealt with: free space quantum cryptography; PKI; business-to-business security; space systems; quantum key distribution; optical fibre networks; quantum communication; mid-infrared single photon source; and quantum information processing.


Pulse sequence optimization in time-modulated arrays for secure communications

2016 IEEE International Symposium on Antennas and Propagation (APSURSI), 2016

The sideband radiations (SR) generated in time-modulated linear arrays (TMLAs) because of the periodicity of the modulating pulse sequence are exploited for secure communication purposes. The pulse sequence controlling the on/off status of the array elements is optimized by means of a binary Genetic Algorithm (GA) in order to maximize the distortion of the signal transmitted by the array along ...


Secure communications in local multipoint distribution service (LMDS) networks

IEEE Transactions on Wireless Communications, 2009

The transmission of confidential information over LMDS networks is investigated in the present paper from an information-theoretic standpoint. The major factor impairing the link performance at these networks is rain attenuation, a physical phenomenon exhibiting both spatial and temporal variation. Based on an accurate channel modeling, analytical expressions of the probability of non-zero secrecy capacity and the outage probability for ...


Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels

IEEE Transactions on Information Forensics and Security, 2016

In this paper, we consider the problem of jointly designing transmit precoding (TPC) matrix and receive filter matrix subject to both secrecy and per- transmitter power constraints in the multiple-input multiple-output (MIMO) interference channel, where K legitimate transmitter-receiver pairs communicate in the presence of an external eavesdropper. Explicitly, we jointly design the TPC and receive filter matrices based on the ...


Performance of Secure Communications Over Correlated Fading Channels

IEEE Signal Processing Letters, 2012

We study the performance of secure communications over correlated fading channels in the presence of an eavesdropper, where the main and eavesdropper channels are correlated. We derive exact expressions for both the average secrecy capacity and the outage probability in the form of infinite series. Moreover, the truncated error of the infinite series representations involved in the analytical results is ...



Educational Resources on Secure Communications

Back to Top

IEEE.tv Videos

Yoshihiro Ohba: Secure Multicast Group Communication in ECHONET-Lite - Industry Forum Panel: WF IoT 2016
Net Neutrality Briefing - Oleg Logvinov - IoT Washington DC 2015
Achieving a Secure and Resilient Cyber Ecosystem - Homeland Security's Tom Ruoff
Pt. 1: Blockchain in Telecom - Claudio Lima - Industry Panel 2, IEEE Globecom, 2019
5G Proof-of-Concept (PoC) Systems with focus on real use cases - Juha Silipa and Mark Cudak: Brooklyn 5G Summit 2017
Heritage Circle - Rohde
How will 5G drive the self-driving car? Challenges from a V2X solution provider's point of view - Jozsef Kovacs: Brooklyn 5G Summit 2017
IEEE Green Energy Summit 2015: Closing Remarks
IEEE Green Energy Summit 2015: Keynote & Opening Remarks
The Evolution of Secure Things - Alex Gantman, 2017 IEEE VIC Summit
Building IoT Projects Faster - Ed Hemphill at Fog World Congress 2018
AuthorLab: Video Featuring a Discussion of the Author Gateway
Philippe Wolf: Designing Secure and Private Complex Data Systems - WF-IoT 2015
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
Low-Power and Secure Lightweight Cryptography Via TFET-Based Energy Recovery Circuits: IEEE Rebooting Computing 2017
Quantum Technologies in Europe: The Quantum Flagship Initiative - Applied Superconductivity Conference 2018
IEEE ComSoc Achieves 50,000 Members Mark
IEEE Green Energy Summit 2015: Program Overview
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
IEEE Future Directions: Green Information and Communications Technology: An Overview

IEEE-USA E-Books

  • The IEE Seminar on Quantum Cryptography: Secure Communications for Business? - Title

    The following topics were dealt with: free space quantum cryptography; PKI; business-to-business security; space systems; quantum key distribution; optical fibre networks; quantum communication; mid-infrared single photon source; and quantum information processing.

  • Pulse sequence optimization in time-modulated arrays for secure communications

    The sideband radiations (SR) generated in time-modulated linear arrays (TMLAs) because of the periodicity of the modulating pulse sequence are exploited for secure communication purposes. The pulse sequence controlling the on/off status of the array elements is optimized by means of a binary Genetic Algorithm (GA) in order to maximize the distortion of the signal transmitted by the array along undesired directions while keeping it unaltered along the angular region of interest.

  • Secure communications in local multipoint distribution service (LMDS) networks

    The transmission of confidential information over LMDS networks is investigated in the present paper from an information-theoretic standpoint. The major factor impairing the link performance at these networks is rain attenuation, a physical phenomenon exhibiting both spatial and temporal variation. Based on an accurate channel modeling, analytical expressions of the probability of non-zero secrecy capacity and the outage probability for this type of networks are provided, giving for the first time an information- theoretic approach of the problem of secure transmission for LMDS networks. Useful conclusions are drawn through extended numerical results suggesting the increase of operational frequency and the use of more directional antennas to improve security in transmission of confidential messages for this type of networks.

  • Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels

    In this paper, we consider the problem of jointly designing transmit precoding (TPC) matrix and receive filter matrix subject to both secrecy and per- transmitter power constraints in the multiple-input multiple-output (MIMO) interference channel, where K legitimate transmitter-receiver pairs communicate in the presence of an external eavesdropper. Explicitly, we jointly design the TPC and receive filter matrices based on the minimum total mean-squared error (MSE) criterion under a given and feasible information- theoretic degrees of freedom. More specifically, we formulate this problem by minimizing the total MSEs of the signals communicated between the legitimate transmitter-receiver pairs, while ensuring that the MSE of the signals decoded by the eavesdropper remains higher than a certain threshold. We demonstrate that the joint design of the TPC and receive filter matrices subject to both secrecy and transmit power constraints can be accomplished by an efficient iterative distributed algorithm. The convergence of the proposed iterative algorithm is characterized as well. Furthermore, the performance of the proposed algorithm, including both its secrecy rate and MSE, is characterized with the aid of numerical results. We demonstrate that the proposed algorithm outperforms the traditional interference alignment algorithm in terms of both the achievable secrecy rate and the MSE. As a benefit, secure communications can be guaranteed by the proposed algorithm for the MIMO interference channel even in the presence of a sophisticated/strong eavesdropper, whose number of antennas is much higher than that of each legitimate transmitter and receiver.

  • Performance of Secure Communications Over Correlated Fading Channels

    We study the performance of secure communications over correlated fading channels in the presence of an eavesdropper, where the main and eavesdropper channels are correlated. We derive exact expressions for both the average secrecy capacity and the outage probability in the form of infinite series. Moreover, the truncated error of the infinite series representations involved in the analytical results is also investigated. The accuracy of our performance analysis is verified by simulation results.

  • Wireless network security architecture

    Cellular bandits have exploited security limitations of analog technology from its infancy. First-generation analog system security has been primarily left up to system manufacturers and service providers. With the advent of digital technology (second generation [2G]), the standards organizations aggressively developed techniques and cryptographic methods to protect the service provider from fraudulent use of network resources and to provide user privacy. Third- generation (3G) digital wireless systems offer significant improvement of security techniques that address all known 2G deficiencies and allow strong service protection for many years to come. This paper discusses in detail the wireless security architecture evolution (voice and data) with special emphasis on the latest standards developed for 3G wireless systems, including 2G/3G interoperability issues. Both the Universal Mobile Telecommunications System (developed by the 3rd Generation Partnership Project [3GPP]) and CDMA2000∗(developed by the 3rd Generation Partnership Project 2 [3GPP2]) architectures are addressed.

  • Synchronization of chaotic oscillations in semiconductor lasers and its application to secure communications

    Chaos synchronization is an important issue in practical applications, since it can be used as secure communications with chaotic carrier. In the secure communications, the receiver system only reproduces chaotic oscillations by all optical injection from the transmitter even if the signal from the transmitter includes a chaotic carrier together with a small message to be sent. In this review, synchronization of chaotic oscillations in semiconductor laser systems is investigated and the possibility for secure communications based on the chaos synchronization is discussed.

  • Secure Communications and Protected Data for a Internet of Things Smart Toy Platform

    The growth of the Internet of Things (IoT) has favored the emergence of new applications and services. Consequently, new challenges in data security and protection have arisen because many IoT systems collect sensitive data that could be the target of attacks and intrusion attempts. Such is the case of smart toy platforms, where the loss of personal data is particularly serious because it involves children and therefore user privacy requires special protection. In this paper, we propose a series of security mechanisms to protect an IoT smart toy platform designed to help child development professionals in the early detection of psychomotor delays. Protecting information is crucially important in this environment, as a successful attack could be used to extract personal and health-related information. We have designed and built specific security mechanisms for the system by identifying the main threats in each submodule of the system, and then neutralizing or minimizing them. Due to the smart toys’ hardware restrictions, a specific encryption and authentication mechanism is proposed and presented here. All the mechanisms have been validated on the platform, and have proved to be a feasible and secure solution for this sensitive environment.

  • Image Encryption Based on Logistic Chaotic Map for Secure Communications

    In this work, we propose a color image encryption of variable sizes using logistic chaotic map. We considered a process of permutation, followed by a diffusion algorithm. To evaluate this encryption method's performance, we applied a statistical analysis, and developed histograms of the original and encrypted images. For the correlation analysis, we evaluate the behavior of two adjacent pixels on horizontal, vertical and diagonal directions. We also analyzed the behavior of the algorithm to the most common cryptographic attacks. Numerical simulations and graphic results are presented for image encryption and decryption using MatLab software.

  • Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications

    Considering worst-case channel uncertainties, we investigate the robust secure beamforming design problem in multiple-input-single-output (MISO) full-duplex, two-way secure communications. Our objective is to maximize worst-case sum secrecy rate under weak secrecy conditions and individual transmit power constraints. Since the objective function of the optimization problem includes both convex and concave terms, we propose to transform convex terms into linear terms. We decouple the problem into four optimization problems and employ the alternating optimization algorithm to obtain the locally optimal solution. Simulation results demonstrate that our proposed robust secure beamforming scheme outperforms the nonrobust one. It is also found that when the regions of channel uncertainties and the individual transmit power constraints are sufficiently large, because of self-interference, the proposed two-way robust secure communication is proactively degraded to one-way communication.



Standards related to Secure Communications

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...


Standard for Local and metropolitan area networks - Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by 802 LANs, this standard : a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AE MAC Security c) Facilitates the use of industry standard authentication and ...