This year CNS will feature four exciting workshops. Find more details by clicking the links below:


The 2nd Workshop on Physical-layer Methods for Wireless Security

The 2nd Workshop on Physical-layer Methods for Wireless Security will take place during IEEE CNS 2015 in Florence, Italy, on September 30, 2015. The main goal of this workshop is twofold. First, this workshop will serve as a means of dissemination of physical layer security results that are often confined to the information theory community to a wider audience that IEEE Conference on Communications and Network Security (CNS) enjoys, e.g., researchers from communications, signal processing and networking communities. Second, this workshop will stimulate interest for research in practical aspects of physical-layer security. This cross-fertilization will benefit not only the physical-layer security research, by attracting a more diverse group of researchers who will come with their rich body of new ideas, but also the CNS community, by presenting a new body of open problems with significant theoretical and practical impact on the design of future wireless communication networks.

Workshop Co-chairs: Rafael F. Schaefer, H. Vincent Poor, Holger Boche

Submission Deadline:  July 3rd, 2015 July 10, 2015

Workshop Website:


The 1st Workshop on Security and Privacy in the Cloud

Cloud computing is today the reference paradigm for large-scale data storage and processing due to the convenient and efficient network access to configurable resources that can be easily adjusted according to the users' needs. Although the benefits of cloud computing are tremendous, security and privacy concerns have still a detrimental impact on the adoption and acceptability of cloud services. In fact, users as well as companies that rely on cloud storage and computation services lose the direct control over the systems managing their data and applications, thus putting the confidentiality, integrity, and availability of the data at risk. The goal of this workshop is to bring together researchers and practitioners who are interested in discussing the security, privacy, and data protection issues emerging in cloud scenarios, and possible solutions to them.

Workshop Co-chairs: Elli Androulaki, Sara Foresti

Submission Deadline: July 3rd, 2015 July 9, 2015

Workshop Website:


The 1st Workshop on Security and Privacy in Cybermatics

In the modern age Cybermatics is differentiating itself by designing the physical and social places into the cyber space to accomplish the union of three spaces: (i) Physical Cyberworld, (ii) Social Cyberworld, and (iii) Thinking Cyberworld. In the cyber space, everywhere cyber-nodes are significantly independent from the space-time limitations that exist in the physical space. Along with the development of intelligent systems, Cybermatics has brought a wide area of open issues during the cyber interaction, physical perception, social correlation, and cognitive thinking. Currently, Cybermatics is still in its initial stage, and it is expected that Cybermatics will lead industrialization and IT applications to a new level and will significantly change the way of producing, living, and even thinking of the mankind. Cybermatics will transform how we interact with and control the physical world around us, just in the same way as the Internet transformed how we interact and communicate with one another and revolutionized how and where we access information.

Cyber-physical systems are subject to threats stemming from increasing dependence on computer and communication technologies. Cyber security threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation's security, economy, public safety, and health at risk. This workshop aims to represent an opportunity for cyber security researchers, practitioners, policy makers, and users to exchange ideas, research findings, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of Cybermatics security issues.

Capturing security and privacy requirements in the early stages of system development is essential for creating sufficient public confidence in order to facilitate the adoption of novel systems of Cybermatics such as cyber-physical-social (CPS) systems, cyber-physical-social-thinking (CPST) systems, and cyber-physical-thinking (CPT) systems. However, security and privacy requirements are often not handled properly due to their wide variety of facets and aspects which make them difficult to formulate.

Workshop Co-chairs: Hong Liu, Ruggero Donida Labati

Submission Deadline: July 3rd, 2015 July 9, 2015

Workshop Website:


Catastrophic events related to CRYPTography and security with their possible solutions

Many cryptographic protocols are only based on the security of one cryptographic algorithm (e.g. RSA) and  we don't know the exact RSA security (including Ron Rivest). What if somebody finds a  clever and fast factoring algorithm? Well, it is indeed an hypothesis but we know several  instances of possible progress. A new fast algorithm is a possible catastroph if not handled  properly. And there are other problems with hash functions, elliptic curves, aso. Think also about the recent Heartbleed bug (April 2014, see the discovery was very late and we were close to a catastrophic situation.

So we are thinking about a regular workshop, the name is cataCRYPT, about these possible problems and their solutions. It includes problems with cryptographic algorithms, protocols, PKI, DRM, TLS-SSL, smart cards, RSA dongles, MIFARE, aso. Quantum computing, resilience and agility are also on the program.

The workshop aims at bringing together researchers and practitioners working in cryptography and security, from academia and industry. A large committee including many founders of the main concepts of public-key cryptography is pushing this important topic.

Workshop Chair: Jean-Jacques Quisquater

Submission Deadline: July 3, 2015

Workshop Website: