11. CCS 2004: Washington, DC, USA

Network intrusions

Access control

Applied cryptography

Network security

Credentials

Information flow

Privacy

Puzzles and users

Applications of formal methods

Operating systems security

Cryptographic tools