SEC 2009: Pafos, Cyprus

Identification and Authentication I

Threats and Attacks

Identification and Authentication II

Applications of Cryptography and Information Hiding

Trusted Computing

Security Policies

Validation, Verification, Evaluation

Privacy Protection - Security Assessment

Role Mining and Content Protection

Security Protocols

Access Control

Internet and Web Applications Security