The relevant topics for this conference include, but are not limited to: Access control, Authentication, Cryptographic Protocols and Applications, Digital Signatures, Disaster Protocols, Hash Functions, Warning Systems Computer/Network Disaster Recovery, Global Security Architectures and Infrastructures, Hacking and Intrusion Detection, Secure Deletion, Secure Email, Spam, Viruses and Worms, Web Security, WiFi Spying/Sniffing, Wireless Privacy, Wireless Security, Virtual Private Networks Biometrics, Digital Rights Management, Digitally Embedded Signatures, DNA, Fingerprint, Iris, and Retina Scanning, Identify Theft, Information Hiding, Legal and Regulatory Issues in Communication, Operating System Security, Plagiarism, Privacy and Confidentiality, Software Security, Spyware, Standards, Watermarking