Paper Submission

Last Minute Track is open!

5 August 2024

Full Paper Submission deadline

31 August 2024

Notification deadline

25 September 2024

Camera-ready deadline

Late Track

15 July 2024

Full Paper Submission deadline

31 August 2024

Notification deadline

25 September 2024

Camera-ready deadline

Main Track

10 May 2024

Full Paper Submission deadline

25 July 2024

Notification deadline

25 September 2024

Camera-ready deadline

Scope

SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field.

The 20th SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass all areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

  1. Security and privacy in computer networks (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  2. Security and privacy in systems with strong secure communication and networking element (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
  3. Security and privacy in Web3.0 and metaverse
  4. Distributed ledger technologies (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
  5. Security protocols at all network layers and for different applications (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  6. Physical layer security (e.g., jamming, GPS spoofing)
  7. Network attacks (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion detection and prevention, firewalls, packet filters, moving target defence) and forensics
  8. Applications of cryptography (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic protocols with real-world applications)
  9. Security analysis (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
  10. Data-driven security and measurement studies (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
  11. Cybercrime investigation and attribution
  12. Cyber threat intelligence and cyber incident responses
  13. Anonymous and privacy-aware communications (e.g., Tor, darknet)
  14. Internet censorship and circumvention
  15. Secure communication and networking applications (e.g., industry 4.0, energy, transportation, smart cities)
  16. Quantum key distribution and other quantum-based secure communications
  17. Visualization of secure communications and networking
  18. Privacy-preserving computing in secure communication and networking (e.g., privacy-preserving machine learning)
  19. The resilience of computer networks and critical infrastructures
  20. Web and mobile security and privacy
  21. Defending false information online (e.g., mis-, dis- and mal-information)
  22. Socio-technical aspects of secure communications and networking (e.g., usability, human behaviors, legal issues, cybercrime, economics)

Publication

All registered papers will be submitted for publishing by Springer – LNICST series and made available through SpringerLink Digital Library.

Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, Compendex, Scopus, DBLP, EU Digital Library, IO-Port, MatchSciNet, Inspec and Zentralblatt MATH.

Available journals

Authors of selected papers will be invited to submit an extended version to:
Wireless Networks (WINET) Journal [IF: 3.0 (2022)]

All accepted authors are eligible to submit an extended version in a fast track of:
EAI Endorsed Transactions on Scalable Information Systems (ESCI-WoS & Ei Compendex)
EAI Endorsed Transactions on Security and Safety

Additional publication opportunities:
EAI Transactions series (Open Access)
EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)

Paper submission

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

– Full/ Regular papers should be up 12-20 pages content in length. (excluding appendices, references, appreciation,…)
– Short papers should be 6-11 pages content in length. (excluding appendices, references, appreciation,…)

All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.

Paper submission

Papers should be submitted through EAI Confy+ system, and have to comply with the Springer format (see Author’s kit section below).

How do I submit a paper in Confy?

  1. Go to Confy+ website
  2. Login or sign up as new user
  3. Select your desired Track
  4. Click the ‘Submit Paper’ link within the track and follow the instructions

Alternatively, go to home page of Confy+ and click on “Open conferences”.

Submission guidelines

– Papers should be in English.
– Single-Blind Review.
– Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal.
   Such papers will be rejected without review.

– The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
– Authors are required to adhere to the Publication Ethics and Malpractice Statement.

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:
LaTeX2e Proceedings Templates (zip)
– Microsoft Word Proceedings Templates (zip)

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:
– a PDF copy of your paper formatted according to the above templates, and
– an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.