Topics (not limited)



  • Smart Cards and Trusted Devices Security
    • Biometrics, National ID cards
    • Embedded Systems Security and TPMs
    • Interplay of TPMs and Smart Cards
    • New Applications for Secure RFID Systems
    • RFID Systems Security
    • Smart Card Security
    • Smart Card Applications
  • Ad Hoc and Mobile Networks Security
    • Ad Hoc Networks Security
    • Delay-Tolerant Network Security
    • Domestic Network Security
    • Mobile Codes Security
    • Mobile Devices Security
    • Security Issues in Mobile and Ubiquitous Networks
    • Security of GSM/GPRS/UMTS Systems
    • Sensor Networks Security
    • Vehicular Network Security
    • Wireless Communication Security (WiFi, WiMAX, WiMedia, others)
  • Ubiquitous Computing Systems Security
    • Distributed Systems Security
    • Grid Computing Security
    • Intrusion Detection and Information Filtering
    • Peer-to-Peer Networks Security
  • Security Protocols, Policies and Management for Mobility
    • Critical Infrastructure (e.g. for Medical or Military Applications) Security</small>
    • Digital Rights Management (DRM)
    • Industrial and Multimedia  Applications
    • Information Assurance
    • Localization Systems Security (Tracking of People and Goods)
    • New Applications of Secure Systems
    • Public Administration and Governmental Services
    • Security Models and Architecture
    • Security Policies (Human-Computer Interaction and Human Behavior Impact)
    • Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity)
    • Security Measurements
    • Trust Management