- Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- New Applications for Secure RFID Systems
- RFID Systems Security
- Smart Card Security
- Smart Devices Applications
- Wireless Sensor Node Security
- Convergence: Security Architectures, Protocols, Policies and Management for Mobility
- Critical Infrastructure (e.g. for Medical or Military Applications) Security
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing Security
- Industrial and Multimedia Applications
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Localization Systems Security (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human) Security
- Mobile Commerce Security
- Public Administration and Governmental Services
- Privacy Enhancing Technologies
- Security Models and Architecture
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity)
- Security Measurements
- Next Generation Networks
- Ad Hoc Networks Security
- Delay-Tolerant Network Security
- Domestic Network Security
- Peer-to-Peer Networks Security
- Security Issues in Mobile and Ubiquitous Networks
- Security of GSM/GPRS/UMTS Systems
- Sensor Networks Security
- Vehicular Network Security
- Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others