Theory of trusted computing, trustworthy software.- Infrastructure of trusted computing, application and evaluation of trusted computing.- Network security and communication security.- Theory and technology of cryptographic techniques.- Information content security.- System security for mobile network and IoT systems, industrial control and embedded systems.- Security for Cloud computing, virtualization systems and big data.