Call for Posters & Demos
Notification deadline
- 30 March 2026
Camera-ready deadline
- 20 April 2026
Conference dates
- 22 - 24 July, 2026
- Lancaster, UK
- Hybrid Conference
Notification deadline
- 1st August 2024
Camera-ready deadline
- 20th August 2024
Scope & Objectives
EAI SecureComm 2026 invites Poster and Demo submissions that address innovative and important topics related to all areas of secure communications and networking.
The objective of this track is to provide PhD students with a platform to share their ideas and research work while receiving feedback and suggestions from an international audience. We encourage authors to use the Posters & Demos track as an opportunity to engage with the scientific community, discuss their early-stage research, and refine their work for future publication and innovation. This track is designed to showcase ongoing research progress and insights from recent and current projects.
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 22nd SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass all areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.
Topics
- Security and privacy in computer networks
(e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks) - Security and privacy in systems with strong secure communication and networking element
(e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing) - Security and privacy in Web3.0 and metaverse
- Distributed ledger technologies
(e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi) - Security protocols at all network layers and for different applications
(e.g., for secure routing, naming/addressing, network management, remote authentication and attestation) - Physical layer security
(e.g., jamming, GPS spoofing) - Network attacks and forensics
(e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion
detection and prevention, firewalls, packet filters, moving target defence) - Applications of cryptography
(e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic
protocols with real-world applications) - Security analysis
(e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis) - Data-driven security and measurement studies
(e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security) - Cybercrime investigation and attribution
- Cyber threat intelligence and cyber incident responses
- Anonymous and privacy-aware communications
(e.g., Tor, darknet) - Internet censorship and circumvention
- Secure communication and networking applications
(e.g., industry 4.0, energy, transportation, smart cities) - Quantum key distribution and other quantum-based secure communications
- Visualization of secure communications and networking
- Privacy-preserving computing in secure communication and networking
(e.g., privacy-preserving machine learning)
The resilience of computer networks and critical infrastructures
Web and mobile security and privacy
Defending false information online
(e.g., mis-, dis- and mal-information)Socio-technical aspects of secure communications and networking
(e.g., usability, human behaviors, legal issues, cybercrime, economics)Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking
Posters & Demos Track Chair
Posters & PhD Track Chair
Yuan Lu, Institute of Software, Chinese Academy of Sciences, China
Demos Chair
Wenjuan Yu, Lancaster University, UK
Publication
Accepted, registered and presented posters and demos will be submitted for publication by Springer and made available through SpringerLink Digital Library. Posters and Demos will be published as a part of the EAI SecureComm 2026 Conference Proceedings in a non-indexed Annex section.
More about the publication, click HERE.
Paper Length
Posters and Demos should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).
- Poster papers should be from 1 to 4 pages in length.
- Demo papers should be from 1 to 4 pages in length.
Poster and demo submissions should be a maximum of 4 pages including references, figures, tables, and appendix.
Submission Guidelines
Paper submission
Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section below).
- Go to Confy+ website.
- Log in or sign up as a new user.
- Select your desired track.
- Click the ‘Submit Paper’ link within the track and follow the instructions.
Alternatively, go to the Confy+ homepage and click on “Open Conferences.”
Submission Guidelines:
- Papers must be written in English.
Submitted PDFs should be anonymized.
- Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
- The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
- Authors are required to adhere to the Publication Ethics and Malpractice Statement.
Submission closes at 23:59 UTC (Coordinated Universal Time) on the day of the Submission Deadline.
- As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)
Springer AI Policies and Guidance
For full information, click HERE.
AI Authorship Policy
Large Language Models (LLMs), such as ChatGPT, do not currently satisfy our authorship criteria. Notably an attribution of authorship carries with it accountability for the work, which cannot be effectively applied to LLMs. We thus ask that the use of an LLM be properly documented in the Acknowledgements, or in the Introduction or Preface of the manuscript.
The use of an LLM (or other AI-tool) for “AI assisted copy editing” purposes does not need to be declared. In this context, we define the term “AI assisted copy editing” as AI-assisted improvements to human-generated texts for readability and style, and to ensure that the texts are free of errors in grammar, spelling, punctuation and tone. These AI-assisted improvements may include wording and formatting changes to the texts, but do not include generative editorial work and autonomous content creation. In all cases, there must be human accountability for the final version of the text and agreement from the authors that the edits reflect their original work. This reflects a similar stance taken on the AI generative figures policy, where it was acknowledged that there are cases where AI can be used to generate a figure without being concerned about copyright e.g. to generate a graph based on data provided by the author.
AI Authorship Guidance
Authors should familiarise themselves with the current known risks of using AI models before using them in their manuscript. AI models have been known to plagiarise content and to create false content. As such, authors should carry out due diligence to ensure that any AI-generated content in their book is correct, appropriately referenced, and follow the standards as laid out in our Book Authors’ Code of Conduct.
AI-generated Images Policy
The fast-moving area of generative AI image creation has resulted in novel legal copyright and research integrity issues. As publishers, we strictly follow existing copyright law and best practices regarding publication ethics. While legal issues relating to AI-generated images and videos remain broadly unresolved, Springer Nature journals and books are unable to permit its use for publication.
Exceptions:
- Images/art obtained from agencies that we have contractual relationships with that have created images in a legally acceptable manner.
- Images and videos that are directly referenced in a piece that is specifically about AI and such cases will be reviewed on a case-by-case basis.
- The use of generative AI tools developed with specific sets of underlying scientific data that can be attributed, checked and verified for accuracy, provided that ethics, copyright and terms of use restrictions are adhered to.
* All exceptions must be labelled clearly as generated by AI within the image field.
As we expect things to develop rapidly in this field in the near future, we will review this policy regularly and adapt if necessary.
Note: Examples of image types covered by this policy include: video and animation, including video stills; photography; illustration such as scientific diagrams, photo-illustrations and other collages, and editorial illustrations such as drawings, cartoons or other 2D or 3D visual representations. Not included in this policy are text-based and numerical display items, such as: tables, flow charts and other simple graphs that do not contain images. Please note that not all AI tools are generative. The use of non-generative machine learning tools to manipulate, combine or enhance existing images or figures should be disclosed in the relevant caption upon submission to allow a case-by-case review.
AI-generated Images Guidance
For more information on the inclusion of third party content (i.e. any work that you have not created yourself and which you have reproduced or adapted from other sources) please see Rights, Permissions, Third Party Distribution.
Author’s kit – Instructions and Templates
Papers must be formatted using the Springer LNICST Authors’ Kit.
Instructions and templates are available from Springer’s LNICST homepage:
Please make sure that your paper adheres to the format as specified in the instructions and templates.
When uploading the camera-ready copy of your paper, please be sure to upload both:
- a PDF copy of your paper formatted according to the above templates, and
- an archive file (e.g. zip, tar.gz) containing both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
