11. CCS 2004: Washington, DC, USA

Network intrusions

Access control

Applied cryptography

Network security

Credentials

Information flow

Privacy

Puzzles and users

Applications of formal methods

Operating systems security

Cryptographic tools

maintained by Schloss Dagstuhl LZI at University of Trier