posted by organizer: schaefer || 3966 views || tracked by 6 users: [display]

CNS PhySec 2015 : 2nd Workshop on Physical-Layer Methods for Wireless Security


When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 10, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   information theory   wireless communications

Call For Papers

The main goal of this workshop is twofold. First, this workshop will serve as a means of dissemination of physical layer security results that are often confined to the information theory community to a wider audience that IEEE Conference on Communications and Network Security (CNS) enjoys, e.g., researchers from communications, signal processing and networking communities. Second, this workshop will stimulate interest for research in practical aspects of physical-layer security. This cross-fertilization will benefit not only the physical-layer security research, by attracting a more diverse group of researchers who will come with their rich body of new ideas, but also the CNS community, by presenting a new body of open problems with significant theoretical and practical impact on the design of future wireless communication networks.

Previously unpublished contributions in physical-layer security are solicited, including (but not limited to):

Secrecy capacity of wireless channels
Secure communication under adversarial attacks
Practical code design for physical layer security
Secure cross-layer design techniques
Secure communication with an uncertain physical layer
Information theoretic approaches for authentication
Jamming-assisted secure wireless transmission
Cooperative secure communications
Secret key generation and agreement
Secret key capacity of wireless channels
Practical and implementation issues

The workshop features two keynotes given by world leading researchers in the field:

Matthieu Bloch
Eduard Jorswieck

The workshop accepts only novel, previously unpublished papers. Submitted papers should be written in English and of sufficient length and detail for review by experts in the field. Final papers will be limited to 6 pages in length in the standard IEEE conference paper format (10-point font). Accepted papers will be published in IEEE Xplore. Deadline for submission is July 10 (extended).

Papers should be submitted for review through EDAS at

Related Resources

Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
VLSIA 2017   3rd International Conference on VLSI and Applications
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
IEEE WCNC 2018   IEEE Wireless Communications and Networking Conference
ICC 5G-Security 2018   The First IEEE Workshop on 5G Wireless Security - ICC 2018
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
UNet 2018   Fourth International Symposium on Ubiquitous Networking
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IEEE Globecom TCPLS 2017   5th IEEE GLOBECOM 2017 Workshop on Trusted Communications with Physical Layer Security