- Applied cryptography
- Automated security analysis
- Biometric security/privacy
- Cloud security/privacy
- Complex systems security
- Critical infrastructure security
- Cryptanalysis
- Cryptographic primitives
- Cryptographic protocols
- Data protection
- Database/system security
- Digital rights management
- Distributed security and consensus protocols
- Email, app and web security
- Future Internet security
- Human factors in security
- Identity management
- IP protection
- Internet fraud, cybercrime
- Internet-of-Things (IoT) security
- Intrusion detection
- Key management
- Malware
- Mobile/wireless/5G security
- Network security protocols
- Post-quantum cryptography
- Privacy/anonymity, PETs
- Security/privacy metrics
- Side-channel analysis and physical attacks
- Trust management
- Ubiquitous security/privacy
- Usable security/privacy