BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20170312T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20171105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20171001T025125Z
UID:4085571A-E65D-11E6-A7C6-0050568D7F66
DTSTART;TZID=US/Eastern:20170505T133000
DTEND;TZID=US/Eastern:20170505T150000
DESCRIPTION:The prevalence of wireless technologies in our daily life is dr
 iven by our desire to communicate from anywhere at anytime. However\, due 
 to the broadcast nature of the wireless channel wireless communications ar
 e easily accessible to intruders. Ensuring the secrecy of confidential tra
 nsactions conducted over wireless networks is a pressing need. Conventiona
 lly\, wireless communications are secured using cryptographic protocols\, 
 which were mainly developed for wireline networks and as such have several
  flaws when applied to wireless networks. The talk discusses approaches to
  establish a confidential channel between a source and the legitimate dest
 ination in the presence of one of more eavesdroppers. The confidential cha
 nnel is created through the use of multiple antennas at the source\, or vi
 a node cooperation\, whereby nodes reinforce each others&#39; communications a
 nd/or also cooperatively jam the eavesdroppers. Thus\, the legitimate dest
 inations will reliably receive the communicated information\, but eavesdro
 ppers will not be able to decode the communication signal even if they kne
 w the encoding/decoding schemes and encryption-decryption keys used by the
  transmitter/receiver.\n\nSpeaker(s): Distinguished Lecturer: Dr. Athina P
 . Petropulu \, \n\nAgenda: \n1:40 pm - 1:45pm Introduction\n\n1:45pm - 3:0
 0pm Dr. Petropulu&#39;s Lecture\n\n3:00pm - 3:15pm Questions and Answers\n\nRo
 om: Multi-Purpose Room Exhibits Area – T3 – 1 \, Bldg: Roosevelt Hall\
 , SUNY College at Farmingdale\, Farmingdale\, New York\, United States
LOCATION:Room: Multi-Purpose Room Exhibits Area – T3 – 1 \, Bldg: Roose
 velt Hall\, SUNY College at Farmingdale\, Farmingdale\, New York\, United 
 States
ORGANIZER:Signal@ieee.li
SEQUENCE:13
SUMMARY:Cooperative Approaches for Ensuring Secret Wireless Communications
URL;VALUE=URI:https://events.vtools.ieee.org/m/43479
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;The prevalence of wireless technologies in
  our daily life is driven by our desire to communicate from anywhere at an
 ytime. However\, due to the broadcast nature of the wireless channel wirel
 ess communications are easily accessible to intruders. Ensuring the secrec
 y of confidential transactions conducted over wireless networks is a press
 ing need. Conventionally\, wireless communications are secured using crypt
 ographic protocols\, which were mainly developed for wireline networks and
  as such have several flaws when applied to wireless networks. The talk di
 scusses approaches to establish a confidential channel between a source an
 d the legitimate destination in the presence of one of more eavesdroppers.
  The confidential channel is created through the use of multiple antennas 
 at the source\, or via node cooperation\, whereby nodes reinforce each oth
 ers&#39; communications and/or also cooperatively jam the eavesdroppers. Thus\
 , the legitimate destinations will reliably receive the communicated infor
 mation\, but eavesdroppers will not be able to decode the communication si
 gnal even if they knew the encoding/decoding schemes and encryption-decryp
 tion keys used by the transmitter/receiver.&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;
 p&gt;1:40 pm - 1:45pm Introduction&lt;/p&gt;\n&lt;p&gt;1:45pm - 3:00pm Dr. Petropulu&#39;s Le
 cture&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;3:00pm - 3:15pm Questions and Answers&lt;/p&gt;
END:VEVENT
END:VCALENDAR

