Topics (not limited)



  • Access control
  • Ad hoc networks security
  • Anonymity
  • Biometrics, national ID cards
  • Data and application security and privacy
  • Data protection
  • Delay-tolerant network security
  • Digital rights management (DRM) in pervasive environments
  • Domestic network security
  • Embedded systems security and TPMs
  • Human and psychological aspects of security
  • Human-computer interaction and human behavior impact for security
  • Identity management
  • Information assurance and trust management
  • Interplay of TPMs and smart cards
  • Intrusion detection and information filtering
  • Mobile codes security
  • Mobile commerce security
  • Mobile devices security
  • New applications for secure RFID systems
  • Peer-to-peer security
  • Privacy enhancing technologies
  • RFID and NFC systems security
  • Secure self-organization and self-configuration
  • Security in location services
  • Security issues in mobile and ubiquitous networks
  • Security metrics
  • Security models and architecture
  • Security of GSM/GPRS/UMTS systems
  • Security policies
  • Security protocols
  • Sensor networks security
  • Smart card security
  • Smart devices applications
  • Vehicular network security
  • Wireless communication security
  • Wireless sensor node security