Cryptography: design and analysis of cryptographic algorithms, applied cryptography, cryptographic protocols and functions; Specification, validation design of security  and dependability: security and trust models, semantics and computational models for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certification, multi-level security specification;  Vulnerabilities, attacks and risks: methods of detection, analysis, prevention, intrusion detection, tolerance, response and prevention, attacks and prevention of on-line fraud, denial of services attacks and prevention methods; Access Control:  authentication and non-repudiation, accounting and audit, anonymity and pseudonymity; identity and trust management, biometric methods;  Anti-malware techniques: detection, analysis, prevention; Cyber-crime response: anti-phishing, anti-spam, anti-fraud methods