Topics (not limited)



  • Smart Devices
    • Biometrics, National ID cards
    • Embedded Systems Security and TPMs
    • Interplay of TPMs and Smart Cards
    • Mobile Codes Security
    • Mobile Devices Security
    • New Applications for Secure RFID Systems
    • RFID Systems Security
    • Smart Card Security
    • Smart Devices Applications
    • Wireless Sensor Node Security

  • Convergence: Security Architectures, Protocols, Policies and Management for Mobility
    • Critical Infrastructure (e.g. for Medical or Military Applications) Security
    • Digital Rights Management (DRM)
    • Distributed Systems and Grid Computing Security
    • Industrial and Multimedia Applications
    • Information Assurance and Trust Management
    • Intrusion Detection and Information Filtering
    • Localization Systems Security (Tracking of People and Goods)
    • M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human) Security 
    • Mobile Commerce Security
    • Public Administration and Governmental Services
    • Privacy Enhancing Technologies
    • Security Models and Architecture
    • Security Policies (Human-Computer Interaction and Human Behavior Impact)
    • Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity)
    • Security Measurements

  • Next Generation Networks
    • Ad Hoc Networks Security
    • Delay-Tolerant Network Security
    • Domestic Network Security
    • Peer-to-Peer Networks Security
    • Security Issues in Mobile and Ubiquitous Networks
    • Security of GSM/GPRS/UMTS Systems
    • Sensor Networks Security
    • Vehicular Network Security
    • Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others