Call for Posters & Demos

Posters & Demos Paper Submission

50% discount on the second paper
Important dates

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

Conference dates

Late Track

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

EAI SecureComm 2026 invites Poster and Demo submissions that address innovative and important topics related to all areas of secure communications and networking.

The objective of this track is to provide PhD students with a platform to share their ideas and research work while receiving feedback and suggestions from an international audience. We encourage authors to use the Posters & Demos track as an opportunity to engage with the scientific community, discuss their early-stage research, and refine their work for future publication and innovation. This track is designed to showcase ongoing research progress and insights from recent and current projects.

SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 22nd SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass all areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

  • Security and privacy in computer networks
    (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  • Security and privacy in systems with strong secure communication and networking element
    (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
  • Security and privacy in Web3.0 and metaverse
  • Distributed ledger technologies
    (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
  • Security protocols at all network layers and for different applications
    (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  • Physical layer security
    (e.g., jamming, GPS spoofing)
  • Network attacks and forensics
    (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion
    detection and prevention, firewalls, packet filters, moving target defence)
  • Applications of cryptography
    (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic
    protocols with real-world applications)
  • Security analysis
    (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
  • Data-driven security and measurement studies
    (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
  • Cybercrime investigation and attribution
  • Cyber threat intelligence and cyber incident responses
  • Anonymous and privacy-aware communications
    (e.g., Tor, darknet)
  • Internet censorship and circumvention
  • Secure communication and networking applications
    (e.g., industry 4.0, energy, transportation, smart cities)
  • Quantum key distribution and other quantum-based secure communications
  • Visualization of secure communications and networking
  • Privacy-preserving computing in secure communication and networking

    (e.g., privacy-preserving machine learning)

  • The resilience of computer networks and critical infrastructures

  • Web and mobile security and privacy

  • Defending false information online
    (e.g., mis-, dis- and mal-information)

  • Socio-technical aspects of secure communications and networking
    (e.g., usability, human behaviors, legal issues, cybercrime, economics)

  • Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking

Posters & PhD Track Chair

Yuan Lu, Institute of Software, Chinese Academy of Sciences, China

Demos Chair

Wenjuan Yu, Lancaster University, UK

Accepted, registered and presented posters and demos will be submitted for publication by Springer and made available through SpringerLink Digital Library. Posters and Demos will be published as a part of the EAI SecureComm 2026 Conference Proceedings in a non-indexed Annex section.

More about the publication, click HERE.

Posters and Demos should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

  • Poster papers should be from 1 to 4 pages in length. 
  • Demo papers should be from 1 to 4 pages in length. 

Poster and demo submissions should be a maximum of 4 pages including references, figures, tables, and appendix.

Please note that a shorter version of already published work is not suitable for this session. Authors willing to present a poster or a demo will submit a short paper, maximum of 4 pages in total (including references, figures, tables, appendixes etc.) describing their poster or demo. We expect most works to include a short introduction, a description of the employed methods and, if applicable, results.

Paper submission

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section below).

How to Submit a Paper in Confy:
  1. Go to Confy+ website.
  2. Log in or sign up as a new user.
  3. Select your desired track.
  4. Click the ‘Submit Paper’ link within the track and follow the instructions.

Alternatively, go to the Confy+ homepage and click on “Open Conferences.”

Submission Guidelines:

  • Papers must be written in English.
  • Submitted PDFs should be anonymized.

  • Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
  • The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
  • Authors are required to adhere to the Publication Ethics and Malpractice Statement.
  • Submission closes at 23:59 UTC (Coordinated Universal Time) on the day of the Submission Deadline.

  • As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)

HOW TO WRITE GOOD ALT TEXT

For full information, click HERE.

AI Authorship Policy

Large Language Models (LLMs), such as ChatGPT, do not currently satisfy our authorship criteria. Notably an attribution of authorship carries with it accountability for the work, which cannot be effectively applied to LLMs. We thus ask that the use of an LLM be properly documented in the Acknowledgements, or in the Introduction or Preface of the manuscript.

The use of an LLM (or other AI-tool) for “AI assisted copy editing” purposes does not need to be declared. In this context, we define the term “AI assisted copy editing” as AI-assisted improvements to human-generated texts for readability and style, and to ensure that the texts are free of errors in grammar, spelling, punctuation and tone. These AI-assisted improvements may include wording and formatting changes to the texts, but do not include generative editorial work and autonomous content creation. In all cases, there must be human accountability for the final version of the text and agreement from the authors that the edits reflect their original work. This reflects a similar stance taken on the AI generative figures policy, where it was acknowledged that there are cases where AI can be used to generate a figure without being concerned about copyright e.g. to generate a graph based on data provided by the author. 

AI Authorship Guidance

Authors should familiarise themselves with the current known risks of using AI models before using them in their manuscript. AI models have been known to plagiarise content and to create false content. As such, authors should carry out due diligence to ensure that any AI-generated content in their book is correct, appropriately referenced, and follow the standards as laid out in our Book Authors’ Code of Conduct.

AI-generated Images Policy

The fast-moving area of generative AI image creation has resulted in novel legal copyright and research integrity issues. As publishers, we strictly follow existing copyright law and best practices regarding publication ethics. While legal issues relating to AI-generated images and videos remain broadly unresolved, Springer Nature journals and books are unable to permit its use for publication.

Exceptions:

  • Images/art obtained from agencies that we have contractual relationships with that have created images in a legally acceptable manner.
  • Images and videos that are directly referenced in a piece that is specifically about AI and such cases will be reviewed on a case-by-case basis.
  • The use of generative AI tools developed with specific sets of underlying scientific data that can be attributed, checked and verified for accuracy, provided that ethics, copyright and terms of use restrictions are adhered to.

* All exceptions must be labelled clearly as generated by AI within the image field.
As we expect things to develop rapidly in this field in the near future, we will review this policy regularly and adapt if necessary.Note: Examples of image types covered by this policy include: video and animation, including video stills; photography; illustration such as scientific diagrams, photo-illustrations and other collages, and editorial illustrations such as drawings, cartoons or other 2D or 3D visual representations. Not included in this policy are text-based and numerical display items, such as: tables, flow charts and other simple graphs that do not contain images. Please note that not all AI tools are generative. The use of non-generative machine learning tools to manipulate, combine or enhance existing images or figures should be disclosed in the relevant caption upon submission to allow a case-by-case review.

AI-generated Images Guidance

For more information on the inclusion of third party content (i.e. any work that you have not created yourself and which you have reproduced or adapted from other sources) please see Rights, Permissions, Third Party Distribution.

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:

  • a PDF copy of your paper formatted according to the above templates, and
  • an archive file (e.g. zip, tar.gz) containing both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
Scroll to Top