9. CCS 2002: Washington, DC, USA

Cryptographic protocols

Key management and key exchange

Emerging applications

Cryptography

Network security

Authentication and authorization

Peer to peer networks

Analysis and verification

Intrusion detection

maintained by Schloss Dagstuhl LZI at University of Trier