EAI banner

Call for Papers

EAI is actively monitoring the COVID-19 situation to ensure the safety, comfort and quality of experience
for attendees 
and a successful course of the event.

EAI is committed to holding the conference in 2021 and Accepted Authors who are unable to attend the event in person will be given
an option to present their submission online. In case the situation prevents the event from taking place in its original location,
it will be held fully in an interactive, live online setting. Find out what EAI conference live streams look like and discover unique benefits
that online participation brings you: Learn more
Accepted Authors will be notified about the final decision regarding the conference setting before the Camera-ready deadline.

Scope

SecureComm 2021 is calling for high-quality research contributions in ALL areas of secure communications and networking, including those addressing interdisciplinary challenges in different application domains. Topics in less related areas will be considered only if a clear connection to secure communication/networking is demonstrated in the title or the abstract.

Submit paper

Welcome to the EAI Community

Let the EAI Community help you build your career with collaborative research, objective evaluation, and fair recognition:

  • Get more visibility for your paper and receive a fair review with Community Review,
  • Earn credits regardless of your paper’s acceptance and increase your EAI Index for new membership ranks and global recognition,
  • Find out if your research resonates – get real-time evaluation of your presentation on-site via EAI Compass.

Topics

Topics of interest include, but are not limited to the following:

  • Network security and privacy (for all types of networks such as wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  • Attacks on telecommunications and networking (e.g., malware, botnets, DoS, MitM, relay attacks, side channel attacks, phishing/pharming, DNS poisoning/hijacking, address spoofing, cybersquatting)
  • Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  • Physical layer security (e.g., jamming, GPS spoofing)
  • Systems security with a strong secure communication and networking element (e.g., security in cloud, edge and fog computing, IoT, RFID, cyber-physical sysytems, teleconferencing)
  • Network intrusion detection and prevention, firewalls, packet filters
  • Web and mobile security & privacy
  • Anonymous communications and other forms of privacy-enhancing or privacy-aware communications (e.g., Tor, darknet)
  • Distributed ledger technologies (blockchain and cryptocurrencies)
  • Internet censorship and countermeasures
  • Resilience of computer networks and critical infrastructures
  • Visualisation of secure communications and networking
  • Cyber (both offensive and defensive) deception related to secure communications and networking (e.g., honeypots / honeytokens, cyber fraud)
  • False information online including mis-, dis- and mal-information
  • Moving target defence
  • Information hiding (steganography, steganalysis, and digital watermarking)
  • Privacy-preserving computing in secure communication and networking
  • Cryptographic systems for secure communications and networking (e.g., key management, multi-party computing, broadcast encryption, sectre sharing schemes)
  • Quantum key distribution and other quantum-based secure communications
  • Network, internet and cloud forensics
  • Cyber threat intelligence and cyber incident responses
  • Cybercrime investigation and attribution
  • Data leakage/loss prevention/protection (DLP)
  • Secure communication and networking applications (e.g., industry 4.0, energy, smart cities, transportation, water, logistics, waste)
  • Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking
  • Socio-technical aspects of secure communications and networking (e.g., usability, human behaviours, legal issues, cybercrime, economics)

Publication

All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library: SecureComm Conference Proceedings.

SecureComm proceedings are indexed in leading indexing services, including Ei Compendex, ISI Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).

Authors of selected papers will be invited to submit an extended version to:

All accepted authors are eligible to submit an extended version in a fast track of:

Additional publication opportunities:

Community Review

Community Review is a service offered to Program Committees and submitting Authors of all EAI conferences designed to improve the speed and the quality of the review process.

Abstracts of all authors who opt in to Community Review during submission will be published and available for Bidding here.

Learn more about the Community Review process

Paper submission

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

Important dates

Loading important dates.
EAI Institutional Members