Call for Posters

EAI SecureComm 2024 invites Poster submissions that address innovative and important topics 
related to security, privacy, networking, communication, and cybersecurity.

Poster Track Deadlines

Submission Deadline is extended last time to 15 July 2024!

15 July 2024

Full Paper Submission deadline

15 August 2024

Notification deadline

20 September 2024

Camera-ready deadline


The objective of this track is to provide the PhD students with a platform to share their ideas and research works and get comments suggestions from the international audience. We encourage the authors to use the Posters venue as a way to open up discussions with the scientific community about their early work in progress and develop the work for future publication and innovation. Posters aim at reporting on the progress of ongoing research and insights into the lessons learned from the most recent and current projects.

Authors whose posters are accepted will be requested to submit their poster as a PDF by the camera-ready deadline. Additionally, authors of accepted posters must bring a printed copy of their poster to be displayed during the poster session at the conference.

The 2024 conference is scheduled to be an in-person event, and poster presentations will take place at the physical conference venue. For each accepted poster, at least one author is mandated to register for the conference and participate in the poster session in person.

  1. Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  2. Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
  3. Security and privacy in Web3.0 and metaverse
  4. Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
  5. Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  6. Physical layer security (e.g., jamming, GPS spoofing)
  7. Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence) and forensics
  8. Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications)
  9. Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
  10. Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
  11. Cybercrime investigation and attribution
  12. Cyber threat intelligence and cyber incident responses
  13. Anonymous and privacy-aware communications (e.g., Tor, darknet)
  14. Internet censorship and circumvention
  15. Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
  16. Quantum key distribution and other quantum-based secure communications
  17. Visualization of secure communications and networking
  18. Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
  19. The resilience of computer networks and critical infrastructures
  20. Web and mobile security and privacy
  21. Defending false information online (e.g., mis-, dis- and mal-information)
  22. Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)

Posters and PhD Track Chairs

Joaquin Garcia-Alfaro
Telecom SudParis, France

Tian Wang
Beijing Normal University, China

Charalambos Konstantinou

Mohammad Mehedy Masud
UAE University 

Paper Lenght

Poster submissions should be:

 Short Papers – a minimum of 6 to a maximum of 11 pages including references, figures, tables, and an appendix. Note that submissions are accepted only in PDF format. Please note that a shorter version of already published work will be rejected. Short Papers will be included in the conference proceedings. (Regular Author Fee) 


All registered papers will be submitted for publishing by Springer – LNICST series and made available through SpringerLink Digital Library.

Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, IO-Port, MatchSciNet, Inspec and Zentralblatt MATH.

Available journals

Authors of selected papers will be invited to submit an extended version to:
Wireless Networks (WINET) Journal [IF: 3.0 (2022)]

All accepted authors are eligible to submit an extended version in a fast track of:
EAI Endorsed Transactions on Scalable Information Systems (ESCI-WoS, Scopus, Compendex)
EAI Endorsed Transactions on Security and Safety

Additional publication opportunities:
EAI Transactions series (Open Access)
EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)

Presentations & Awards

Accepted posters will be allocated 15 minutes for an interactive poster presentation at the conference. The posters will be assessed based on technical merit and presentation quality. There will be dedicated poster presentation sessions throughout the week to showcase the accepted posters. The exact number of sessions will depend on the total number of accepted posters and available space. Authors are required to have one or more representatives present at their poster during the session, engaging in discussions with fellow attendees about their work. Additional information regarding the poster sessions will be provided to the authors of accepted posters shortly after the notification of the results.

The Best Poster Award aims to acknowledge the most exceptional contributions in poster presentations. Evaluation criteria include (1) the significance of the research contributions outlined in the provided poster absract and (2) the clarity, creativity, and design of the poster itself. Recipients of the award will be highlighted in the program and will receive a signed certificate during the presentation ceremony.

Review Criteria

The poster will be peer-reviewed and rated for acceptance using the following criteria:

– Relevance to conference vision/topics and attendees
– Applicability of the project in real-world scenarios
– Potential to bring in participants to the conference from different audiences
– The overall quality of the contribution
– Provides a hands-on, collaborative, and/or active learning environment for attendees


Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see below Author’s kit section).

Paper submission

Papers should be submitted through EAI Confy+ system, and have to comply with the Springer format (see Author’s kit section below).

How do I submit a paper in Confy?

  1. Go to Confy+ website
  2. Login or sign up as new user
  3. Select your desired Track
  4. Click the ‘Submit Paper’ link within the track and follow the instructions

Alternatively, go to home page of Confy+ and click on “Open conferences”.

Submission guidelines

– Papers should be in English.
– Single-Blind Review.
– Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal.
   Such papers will be rejected without review.

– The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
– Authors are required to adhere to the Publication Ethics and Malpractice Statement.

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:
LaTeX2e Proceedings Templates (zip)
– Microsoft Word Proceedings Templates (zip)

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:
– a PDF copy of your paper formatted according to the above templates, and
– an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.