posted by organizer: schaefer || 1499 views || tracked by 6 users: [display]

CNS PhySec 2015 : 2nd Workshop on Physical-Layer Methods for Wireless Security


When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 10, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   information theory   wireless communications

Call For Papers

The main goal of this workshop is twofold. First, this workshop will serve as a means of dissemination of physical layer security results that are often confined to the information theory community to a wider audience that IEEE Conference on Communications and Network Security (CNS) enjoys, e.g., researchers from communications, signal processing and networking communities. Second, this workshop will stimulate interest for research in practical aspects of physical-layer security. This cross-fertilization will benefit not only the physical-layer security research, by attracting a more diverse group of researchers who will come with their rich body of new ideas, but also the CNS community, by presenting a new body of open problems with significant theoretical and practical impact on the design of future wireless communication networks.

Previously unpublished contributions in physical-layer security are solicited, including (but not limited to):

Secrecy capacity of wireless channels
Secure communication under adversarial attacks
Practical code design for physical layer security
Secure cross-layer design techniques
Secure communication with an uncertain physical layer
Information theoretic approaches for authentication
Jamming-assisted secure wireless transmission
Cooperative secure communications
Secret key generation and agreement
Secret key capacity of wireless channels
Practical and implementation issues

The workshop features two keynotes given by world leading researchers in the field:

Matthieu Bloch
Eduard Jorswieck

The workshop accepts only novel, previously unpublished papers. Submitted papers should be written in English and of sufficient length and detail for review by experts in the field. Final papers will be limited to 6 pages in length in the standard IEEE conference paper format (10-point font). Accepted papers will be published in IEEE Xplore. Deadline for submission is July 10 (extended).

Papers should be submitted for review through EDAS at

Related Resources

ICMWT 2017   4th International Conference on Mobile and Wireless Technology
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IEEE T-SIPN Special Issue 2017   IEEE T-SIPN Special Issue on Distributed Signal Processing for Security and Privacy in Networked Cyber-Physical Systems
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
BigCPS-Security 2017   Recent Advances in Big Data Analytics and Cyber-physical Systems Security
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
VNA 2016   Vehicular Networks Applications: From Physical Layer to Cloud
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine