Call for Posters & Demos

Posters & Demos Paper Submission

50% discount on the second paper
Important dates

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

Conference dates

Late Track

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

EAI SecureComm 2026 invites Poster and Demo submissions that address innovative and important topics related to all areas of secure communications and networking.

The objective of this track is to provide PhD students with a platform to share their ideas and research work while receiving feedback and suggestions from an international audience. We encourage authors to use the Posters & Demos track as an opportunity to engage with the scientific community, discuss their early-stage research, and refine their work for future publication and innovation. This track is designed to showcase ongoing research progress and insights from recent and current projects.

SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 22nd SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass all areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.

  • Security and privacy in computer networks
    (e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks)
  • Security and privacy in systems with strong secure communication and networking element
    (e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing)
  • Security and privacy in Web3.0 and metaverse
  • Distributed ledger technologies
    (e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi)
  • Security protocols at all network layers and for different applications
    (e.g., for secure routing, naming/addressing, network management, remote authentication and attestation)
  • Physical layer security
    (e.g., jamming, GPS spoofing)
  • Network attacks and forensics
    (e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion
    detection and prevention, firewalls, packet filters, moving target defence)
  • Applications of cryptography
    (e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic
    protocols with real-world applications)
  • Security analysis
    (e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis)
  • Data-driven security and measurement studies
    (e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security)
  • Cybercrime investigation and attribution
  • Cyber threat intelligence and cyber incident responses
  • Anonymous and privacy-aware communications
    (e.g., Tor, darknet)
  • Internet censorship and circumvention
  • Secure communication and networking applications
    (e.g., industry 4.0, energy, transportation, smart cities)
  • Quantum key distribution and other quantum-based secure communications
  • Visualization of secure communications and networking
  • Privacy-preserving computing in secure communication and networking

    (e.g., privacy-preserving machine learning)

  • The resilience of computer networks and critical infrastructures

  • Web and mobile security and privacy

  • Defending false information online
    (e.g., mis-, dis- and mal-information)

  • Socio-technical aspects of secure communications and networking
    (e.g., usability, human behaviors, legal issues, cybercrime, economics)

  • Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking

Posters & PhD Track Chair

Yuan Lu, Institute of Software, Chinese Academy of Sciences, China

Demos Chair

Wenjuan Yu, Lancaster University, UK

Accepted, registered and presented posters and demos will be submitted for publication by Springer and made available through SpringerLink Digital Library. Posters and Demos will be published as a part of the EAI SecureComm 2026 Conference Proceedings in a non-indexed Annex section.

More about the publication, click HERE.

Posters and Demos should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

  • Poster papers should be from 1 to 4 pages in length. 
  • Demo papers should be from 1 to 4 pages in length. 

Poster and demo submissions should be a maximum of 4 pages including references, figures, tables, and appendix.

Please note that a shorter version of already published work is not suitable for this session. Authors willing to present a poster or a demo will submit a short paper, maximum of 4 pages in total (including references, figures, tables, appendixes etc.) describing their poster or demo. We expect most works to include a short introduction, a description of the employed methods and, if applicable, results.

Paper submission

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section below).

How to Submit a Paper in Confy:
  1. Go to Confy+ website.
  2. Log in or sign up as a new user.
  3. Select your desired track.
  4. Click the ‘Submit Paper’ link within the track and follow the instructions.

Alternatively, go to the Confy+ homepage and click on “Open Conferences.”

Submission Guidelines:

  • Papers must be written in English.
  • Submitted PDFs should be anonymized.

  • Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
  • The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
  • Authors are required to adhere to the Publication Ethics and Malpractice Statement.
  • Submission closes at 23:59 UTC (Coordinated Universal Time) on the day of the Submission Deadline.

  • As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)

HOW TO WRITE GOOD ALT TEXT

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:

  • a PDF copy of your paper formatted according to the above templates, and
  • an archive file (e.g. zip, tar.gz) containing both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
Scroll to Top