12. ISC 2009: Pisa, Italy

Analysis Techniques

Hash Functions

Database Security and Biometrics

Algebraic Attacks and Proxy Re-Encryption

Distributed System Security

Identity Management and Authentication

Applied Cryptography

Access Control

MAC and Nonces

P2P and Web Services