posted by organizer: schaefer || 3265 views || tracked by 6 users: [display]

CNS PhySec 2015 : 2nd Workshop on Physical-Layer Methods for Wireless Security

FacebookTwitterLinkedInGoogle

Link: http://www.princeton.edu/~rafaelfs/CNS2015/
 
When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 10, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   information theory   wireless communications
 

Call For Papers

The main goal of this workshop is twofold. First, this workshop will serve as a means of dissemination of physical layer security results that are often confined to the information theory community to a wider audience that IEEE Conference on Communications and Network Security (CNS) enjoys, e.g., researchers from communications, signal processing and networking communities. Second, this workshop will stimulate interest for research in practical aspects of physical-layer security. This cross-fertilization will benefit not only the physical-layer security research, by attracting a more diverse group of researchers who will come with their rich body of new ideas, but also the CNS community, by presenting a new body of open problems with significant theoretical and practical impact on the design of future wireless communication networks.

Previously unpublished contributions in physical-layer security are solicited, including (but not limited to):

Secrecy capacity of wireless channels
Secure communication under adversarial attacks
Practical code design for physical layer security
Secure cross-layer design techniques
Secure communication with an uncertain physical layer
Information theoretic approaches for authentication
Jamming-assisted secure wireless transmission
Cooperative secure communications
Secret key generation and agreement
Secret key capacity of wireless channels
Practical and implementation issues

The workshop features two keynotes given by world leading researchers in the field:

Matthieu Bloch
Eduard Jorswieck

The workshop accepts only novel, previously unpublished papers. Submitted papers should be written in English and of sufficient length and detail for review by experts in the field. Final papers will be limited to 6 pages in length in the standard IEEE conference paper format (10-point font). Accepted papers will be published in IEEE Xplore. Deadline for submission is July 10 (extended).

Papers should be submitted for review through EDAS at http://edas.info/N20501.

Related Resources

Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ACISP 2017   Australasian Conference on Information Security and Privacy
ICMWT 2017   4th iCatse Conference on Mobile and Wireless Technology
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
FGCT 2017   Sixth International Conference on Future Generation Communication Technologies
USENIX Security 2017   USENIX Security '17
EMNLP 2017   Conference on Empirical Methods in Natural Language Processing
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing
EuropeanSeC 2017   2017 European Security Conference
AEIJ 2017   Advanced Energy: An International Journal