16. CCS 2009: Chicago, Illinois, USA

Attacks I


Formal techniques

Applied cryptography

Anonymization networks

Cloud security

Security of mobile services

Software security using behavior

Systems and networks


Anonymization techniques

Embedded and mobile devices

Technique for ensuring software security

Designing secure systems

Attacks II

System security


Malware and bots

maintained by Schloss Dagstuhl LZI at University of Trier