<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-1"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin-top:0cm;
        margin-right:0cm;
        margin-bottom:10.0pt;
        margin-left:0cm;
        line-height:115%;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
        {mso-style-priority:34;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:10.0pt;
        margin-left:36.0pt;
        mso-add-space:auto;
        line-height:115%;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpFirst, li.MsoListParagraphCxSpFirst, div.MsoListParagraphCxSpFirst
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:0cm;
        margin-left:36.0pt;
        margin-bottom:.0001pt;
        mso-add-space:auto;
        line-height:115%;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpMiddle, li.MsoListParagraphCxSpMiddle, div.MsoListParagraphCxSpMiddle
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:0cm;
        margin-left:36.0pt;
        margin-bottom:.0001pt;
        mso-add-space:auto;
        line-height:115%;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
p.MsoListParagraphCxSpLast, li.MsoListParagraphCxSpLast, div.MsoListParagraphCxSpLast
        {mso-style-priority:34;
        mso-style-type:export-only;
        margin-top:0cm;
        margin-right:0cm;
        margin-bottom:10.0pt;
        margin-left:36.0pt;
        mso-add-space:auto;
        line-height:115%;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:317613571;
        mso-list-type:hybrid;
        mso-list-template-ids:-1056139620 135659521 135659523 135659525 135659521 135659523 135659525 135659521 135659523 135659525;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l1
        {mso-list-id:775056614;
        mso-list-type:hybrid;
        mso-list-template-ids:-503269424 135659521 135659523 135659525 135659521 135659523 135659525 135659521 135659523 135659525;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l1:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l1:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l1:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l1:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l1:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l1:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l1:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l1:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l2
        {mso-list-id:1978291990;
        mso-list-type:hybrid;
        mso-list-template-ids:1961923018 135659521 135659523 135659525 135659521 135659523 135659525 135659521 135659523 135659525;}
@list l2:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l2:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l2:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l2:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l2:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l2:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
@list l2:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Symbol;}
@list l2:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:"Courier New";}
@list l2:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        font-family:Wingdings;}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=PT link=blue vlink=purple><div class=WordSection1><p class=MsoNormal align=center style='text-align:center'><b><span lang=EN-US>CALL FOR PAPERS<o:p></o:p></span></b></p><p class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:center;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>1<sup>st</sup> International Conference on Information Systems Security and Privacy</span><span lang=EN-US> </span><span lang=EN-US style='font-size:9.0pt'>– ICISSP 2015</span><b><span lang=EN-US style='font-size:8.0pt;color:#F79646'><o:p></o:p></span></b></p><p class=MsoNormal align=center style='margin-top:12.0pt;text-align:center'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Website:</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%'> <a href="http://www.icissp.org">www.icissp.org</a><u><span style='color:blue'><o:p></o:p></span></u></span></p><p class=MsoNormal align=center style='text-align:center'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>February 9 – 11, 2015<o:p></o:p></span></p><p class=MsoNormal align=center style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:center;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>ESEO, Angers, Loire Valley, France<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Regular Papers<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Paper Submission: <b>September 9, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Authors Notification: <b>November 25, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Camera Ready and Registration: <b>December 10, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Position Papers<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Paper Submission: <b>October 28, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Authors Notification: <b>November 28, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Camera Ready and Registration: <b>December 10, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Workshops<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Workshop Proposal: <b>September 9, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Doctoral Consortium<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Paper Submission: <b>November 27, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Authors Notification: <b>December 11, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Camera Ready and Registration: <b>December 23, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Special Sessions<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Special Session Proposal: <b>September 19, 2014</b><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Tutorials, Demos and Panel Proposals<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>November 27, 2014</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Sponsored by:<o:p></o:p></span></b></p><p class=MsoNormal><span lang=EN-US style='font-size:9.0pt;line-height:115%'>INSTICC – Institute for Systems and Technologies of Information, Control and Communication<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Co-organized by:<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>Groupe ESEO – Graduate School of Engineering<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%'>INSTICC is Member of:<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>WfMC – Workflow Management Coalition<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%'>OMG – Object Management Group<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><b><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><b><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Logistics Partner:<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>SCITEVENTS – Science and Technology Events<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><b><span lang=EN-US style='font-size:9.0pt'><o:p> </o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:8.0pt;margin-right:0cm;margin-bottom:0cm;margin-left:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on. Cloud computing, big data, and other IT advances raise added security and privacy concerns to organizations and individuals, thus creating new research opportunities. <o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:8.0pt;margin-right:0cm;margin-bottom:0cm;margin-left:0cm;margin-bottom:.0001pt;line-height:150%'><b><span lang=EN-US style='font-size:9.0pt;line-height:150%;mso-fareast-language:PT'>KEYNOTE SPEAKERS<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>ICISSP 2015 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>PUBLICATIONS<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>SCITEPRESS is a member of CrossRef (<a href="http://www.crossref.org/">http://www.crossref.org/</a>) and every paper is given a DOI (Digital Object Identifier).<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify;line-height:normal'><span lang=EN-US style='font-size:9.0pt'>The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus. <o:p></o:p></span></p><p class=MsoNormal><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AWARDS<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>The awards will be announced and bestowed at the conference closing session.<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;text-align:justify'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Please check the website for further information: <a href="http://www.icissp.org/BestPaperAward.aspx">www.icissp.org/BestPaperAward.aspx</a><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><b><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><b><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>ICISSP CONFERENCE CHAIR<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Olivier Camp, ESEO, MODESTE, France<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><a name="program_co-chairs"></a><b><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>PROGRAM CO-CHAIRS <o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Edgar Weippl, Secure Business Austria - Vienn University of Technology, Austria<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Christophe Bidan, SUPELEC, France<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Esma Aïmeur, Université De Montréal, Canada</span><span lang=EN-US style='font-size:9.0pt'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:8.0pt;margin-right:0cm;margin-bottom:0cm;margin-left:0cm;margin-bottom:.0001pt;line-height:150%'><b><span lang=EN-US style='font-size:9.0pt;line-height:150%'>CONFERENCE AREAS:<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>1.</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'> DATA AND SOFTWARE SECURITY<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>2.</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'> TRUST<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>3.</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'> PRIVACY AND CONFIDENTIALITY<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>4.</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'> MOBILE SYSTEMS SECURITY<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>5.</span></b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'> BIOMETRIC AUTHENTICATION<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AREA 1: DATA AND SOFTWARE SECURITY<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Security Frameworks, Architectures and Protocols<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Cryptographic Algorithms<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Artificial Intelligence and Security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Information Hiding and Anonymity<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Vulnerability Analysis and Countermeasures<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Data Integrity<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Database Security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Content Protection and Digital Rights Management<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Data Mining<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Software Security Assurance<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Security Architecture and Design Analysis<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Security Testing<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Middleware Security<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Data Fraud and Data Fabrication<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AREA 2: TRUST<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Computational Models of Trust<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Risk and Reputation Management<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Phishing<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Security and Trust in Pervasive Information Systems<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>E-Commerce and Contract Management Tools<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Trusted Platforms<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>P2P Transactions and Scenarios<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Common Practice, Legal and Regulatory Issues<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Trust in Social Networks<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Identity and Trust Management<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Intrusion Detection<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Smartcard Technology<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Trustworthy Embedded Devices<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Electronic Payment Fraud<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AREA 3: PRIVACY AND CONFIDENTIALITY<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy-Enhancing Models and Technologies<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Network Deployment and Management<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Web Applications and Services<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy In Cloud and Pervasive Computing<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Authentication, Privacy and Security Models<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy Compliance in Organizations<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Social Media Privacy<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>User Profiling in E-Commerce Systems<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>E-Voting and Privacy<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy Metrics and Control<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Malware Detection<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Electronic Abuse Protection<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l1 level1 lfo1'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Ethics<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AREA 4: MOBILE SYSTEMS SECURITY<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Location-based Services<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>GPS-based security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Mobile Sensing and Sensor Networks<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Bluetooth and RFID Security<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy in Wireless Communications<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Mobile Applications Control<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy-Preserving Protocols<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Vehicular Systems and Networks<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Secure Routing<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Software Vulnerabilities<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Access Control<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l2 level1 lfo2'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Threat Awareness<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>AREA 5: BIOMETRIC AUTHENTICATION<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></p><p class=MsoListParagraphCxSpFirst style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Identification and Access Control<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Feature Detection, Selection and Extraction<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Biosignals in Biometrics<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Physiological Signal Processing<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Fingerprint, Face or Iris Recognition<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Hand Geometry<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Gait Analysis<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Speaker Recognition and Voice Analysis<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Behavioral Patterns<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Keystroke Dynamics<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Surveillance<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Privacy Concerns with Biometrics<o:p></o:p></span></p><p class=MsoListParagraphCxSpMiddle style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Multimodal Biometrics Systems<o:p></o:p></span></p><p class=MsoListParagraphCxSpLast style='margin-bottom:0cm;margin-bottom:.0001pt;mso-add-space:auto;text-indent:-18.0pt;mso-list:l0 level1 lfo3'><![if !supportLists]><span lang=EN-US style='font-size:9.0pt;line-height:115%;font-family:Symbol;mso-fareast-language:PT'><span style='mso-list:Ignore'>·<span style='font:7.0pt "Times New Roman"'>         </span></span></span><![endif]><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>Knowledge Discovery in Biometric Databases<o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'><o:p> </o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><b><span lang=EN-US style='font-size:9.0pt;line-height:115%;mso-fareast-language:PT'>PROGRAM COMMITTEE<o:p></o:p></span></b></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span class=MsoHyperlink><span lang=EN-US style='font-size:9.0pt;line-height:115%;color:windowtext;text-decoration:none'><a href="http://www.icissp.org/ProgramCommittee.aspx">http://www.icissp.org/ProgramCommittee.aspx</a></span></span><span class=MsoHyperlink><span lang=EN-US style='color:windowtext;text-decoration:none'><o:p></o:p></span></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span class=MsoHyperlink><span lang=EN-US style='font-size:9.0pt;line-height:115%;color:windowtext;text-decoration:none'><o:p> </o:p></span></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt;line-height:normal'><span lang=EN-US style='font-size:9.0pt;mso-fareast-language:PT'>Please check further details at the conference website <a href="http://www.icissp.org">http://www.icissp.org</a></span><span lang=EN-US style='mso-fareast-language:PT'><o:p></o:p></span></p><p class=MsoNormal style='margin-bottom:0cm;margin-bottom:.0001pt'><span class=MsoHyperlink><span lang=EN-US><o:p><span style='text-decoration:none'> </span></o:p></span></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p><p class=MsoNormal><span lang=EN-US><o:p> </o:p></span></p></div></body></html>