9. CCS 2002: Washington, DC, USA

Cryptographic protocols

Key management and key exchange

Emerging applications

Cryptography

Network security

Authentication and authorization

Peer to peer networks

Analysis and verification

Intrusion detection