13. CCS 2006: Alexandria, VA, USA

Anonymity

Intrusion detection

Data protection

Access control

Privacy and authentication

Applied cryptography I

Attacks and cryptanalysis

Sensors and networking

Software and network exploits

Formal methods

Applied cryptography II