posted by organizer: schaefer || 7336 views || tracked by 6 users: [display]

CNS PhySec 2015 : 2nd Workshop on Physical-Layer Methods for Wireless Security

FacebookTwitterLinkedInGoogle

Link: http://www.princeton.edu/~rafaelfs/CNS2015/
 
When Sep 30, 2015 - Sep 30, 2015
Where Florence, Italy
Submission Deadline Jul 10, 2015
Notification Due Aug 3, 2015
Final Version Due Aug 10, 2015
Categories    security   information theory   wireless communications
 

Call For Papers

The main goal of this workshop is twofold. First, this workshop will serve as a means of dissemination of physical layer security results that are often confined to the information theory community to a wider audience that IEEE Conference on Communications and Network Security (CNS) enjoys, e.g., researchers from communications, signal processing and networking communities. Second, this workshop will stimulate interest for research in practical aspects of physical-layer security. This cross-fertilization will benefit not only the physical-layer security research, by attracting a more diverse group of researchers who will come with their rich body of new ideas, but also the CNS community, by presenting a new body of open problems with significant theoretical and practical impact on the design of future wireless communication networks.

Previously unpublished contributions in physical-layer security are solicited, including (but not limited to):

Secrecy capacity of wireless channels
Secure communication under adversarial attacks
Practical code design for physical layer security
Secure cross-layer design techniques
Secure communication with an uncertain physical layer
Information theoretic approaches for authentication
Jamming-assisted secure wireless transmission
Cooperative secure communications
Secret key generation and agreement
Secret key capacity of wireless channels
Practical and implementation issues

The workshop features two keynotes given by world leading researchers in the field:

Matthieu Bloch
Eduard Jorswieck

The workshop accepts only novel, previously unpublished papers. Submitted papers should be written in English and of sufficient length and detail for review by experts in the field. Final papers will be limited to 6 pages in length in the standard IEEE conference paper format (10-point font). Accepted papers will be published in IEEE Xplore. Deadline for submission is July 10 (extended).

Papers should be submitted for review through EDAS at http://edas.info/N20501.

Related Resources

ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE MENACOMM 2025   2025 5th IEEE Middle East & North Africa Communications Conference
BDBS 2025   6th International Conference on Big Data, Blockchain and Security
ICICN 2025   2025 IEEE 13th International Conference on Information and Communication Networks (ICICN 2025)
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ICICSE 2025   IEEE--2025 the 5th International Conference on Information Communication and Software Engineering (ICICSE 2025)