- Smart Cards and Trusted Devices Security
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- New Applications for Secure RFID Systems
- RFID Systems Security
- Smart Card Security
- Smart Card Applications
- Ad Hoc and Mobile Networks Security
- Ad Hoc Networks Security
- Delay-Tolerant Network Security
- Domestic Network Security
- Mobile Codes Security
- Mobile Devices Security
- Security Issues in Mobile and Ubiquitous Networks
- Security of GSM/GPRS/UMTS Systems
- Sensor Networks Security
- Vehicular Network Security
- Wireless Communication Security (WiFi, WiMAX, WiMedia, others)
- Ubiquitous Computing Systems Security
- Distributed Systems Security
- Grid Computing Security
- Intrusion Detection and Information Filtering
- Peer-to-Peer Networks Security
- Security Protocols, Policies and Management for Mobility
- Critical Infrastructure (e.g. for Medical or Military Applications) Security</small>
- Digital Rights Management (DRM)
- Industrial and Multimedia Applications
- Information Assurance
- Localization Systems Security (Tracking of People and Goods)
- New Applications of Secure Systems
- Public Administration and Governmental Services
- Security Models and Architecture
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity)
- Security Measurements
- Trust Management