The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions.
They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.