Call for Posters & Demos
Notification deadline
- 30 March 2026
Camera-ready deadline
- 20 April 2026
Conference dates
- 22 - 24 July, 2026
- Lancaster, UK
- Hybrid Conference
Notification deadline
- 1st August 2024
Camera-ready deadline
- 20th August 2024
Scope & Objectives
EAI SecureComm 2026 invites Poster and Demo submissions that address innovative and important topics related to all areas of secure communications and networking.
The objective of this track is to provide PhD students with a platform to share their ideas and research work while receiving feedback and suggestions from an international audience. We encourage authors to use the Posters & Demos track as an opportunity to engage with the scientific community, discuss their early-stage research, and refine their work for future publication and innovation. This track is designed to showcase ongoing research progress and insights from recent and current projects.
SecureComm is a conference in EAI core conference portfolio focusing on cybersecurity. The aim of SecureComm is to bring together researchers and practitioners in academic, industry, and government in security, networking, communication and other related communities to explore important research directions in the field. The 22nd SecureComm conference seeks submissions of high-quality research contributions. Topics of interest encompass all areas of secure communications and networking. Topics in less related areas will be considered if a clear connection to secure communication and networking is demonstrated. Topics addressing interdisciplinary challenges in different application domains are welcome.
Topics
- Security and privacy in computer networks
(e.g., wired, wireless, mobile, hybrid, sensor, vehicular, satellite, 5G, 6G, ad hoc, peer-to-peer, and software-defined networks) - Security and privacy in systems with strong secure communication and networking element
(e.g., security in the cloud, IoT, cyber-physical systems, edge and fog computing, and teleconferencing) - Security and privacy in Web3.0 and metaverse
- Distributed ledger technologies
(e.g., blockchain, smart contracts, and cryptocurrencies) and decentralized applications (e.g., DeFi) - Security protocols at all network layers and for different applications
(e.g., for secure routing, naming/addressing, network management, remote authentication and attestation) - Physical layer security
(e.g., jamming, GPS spoofing) - Network attacks and forensics
(e.g., DDoS, MitM, malware, botnets, side-channel attacks, phishing/pharming, cybersquatting), defenses (e.g., network intrusion
detection and prevention, firewalls, packet filters, moving target defence) - Applications of cryptography
(e.g., Analysis of deployed cryptography and cryptographic protocols, Cryptographic implementation analysis, New cryptographic
protocols with real-world applications) - Security analysis
(e.g., Malware analysis, Automated security analysis of source code and binaries, Program analysis) - Data-driven security and measurement studies
(e.g., Measurements of fraud, malware or spam; Measurements of human behavior and security) - Cybercrime investigation and attribution
- Cyber threat intelligence and cyber incident responses
- Anonymous and privacy-aware communications
(e.g., Tor, darknet) - Internet censorship and circumvention
- Secure communication and networking applications
(e.g., industry 4.0, energy, transportation, smart cities) - Quantum key distribution and other quantum-based secure communications
- Visualization of secure communications and networking
- Privacy-preserving computing in secure communication and networking
(e.g., privacy-preserving machine learning)
The resilience of computer networks and critical infrastructures
Web and mobile security and privacy
Defending false information online
(e.g., mis-, dis- and mal-information)Socio-technical aspects of secure communications and networking
(e.g., usability, human behaviors, legal issues, cybercrime, economics)Security and privacy of contact tracing and other COVID-19 related digital interventions with a core element on telecommunications or networking
Posters & Demos Track Chair
Posters & PhD Track Chair
Yuan Lu, Institute of Software, Chinese Academy of Sciences, China
Demos Chair
Wenjuan Yu, Lancaster University, UK
Publication
Accepted, registered and presented posters and demos will be submitted for publication by Springer and made available through SpringerLink Digital Library. Posters and Demos will be published as a part of the EAI SecureComm 2026 Conference Proceedings in a non-indexed Annex section.
More about the publication, click HERE.
Paper Length
Posters and Demos should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).
- Poster papers should be from 1 to 4 pages in length.
- Demo papers should be from 1 to 4 pages in length.
Poster and demo submissions should be a maximum of 4 pages including references, figures, tables, and appendix.
Submission Guidelines
Paper submission
Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section below).
- Go to Confy+ website.
- Log in or sign up as a new user.
- Select your desired track.
- Click the ‘Submit Paper’ link within the track and follow the instructions.
Alternatively, go to the Confy+ homepage and click on “Open Conferences.”
Submission Guidelines:
- Papers must be written in English.
-
Submitted PDFs should be anonymized.
- Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
- The paper submissions must follow the Springer formatting guidelines (see Author’s kit section below).
- Authors are required to adhere to the Publication Ethics and Malpractice Statement.
-
Submission closes at 23:59 UTC (Coordinated Universal Time) on the day of the Submission Deadline.
- As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)
Author’s kit – Instructions and Templates
Papers must be formatted using the Springer LNICST Authors’ Kit.
Instructions and templates are available from Springer’s LNICST homepage:
Please make sure that your paper adheres to the format as specified in the instructions and templates.
When uploading the camera-ready copy of your paper, please be sure to upload both:
- a PDF copy of your paper formatted according to the above templates, and
- an archive file (e.g. zip, tar.gz) containing both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
