12. CCS 2005: Alexandria, VA, USA

Keynote address

Formal analysis of crypto protocols

Trust management

Privacy and anonymity

Authentication

Access control

Key management, key exchange, & pseudo-random generation

Intrusion detection and prevention

Security for diffuse computing

Cryptography

Automated analysis

Attacking passwords and bringing down the network

Industry track invited talks

maintained by Schloss Dagstuhl LZI at University of Trier