13. ESORICS 2008: Málaga, Spain

Intrusion Detection and Network Vulnerability Analysis

Network Security

Smart Cards and Identity Management

Data and Applications Security

Privacy Enhancing Technologies

Anonymity and RFID Privacy

Access Control and Trust Negotiation

Information Flow and Non-transferability

Secure Electronic Voting and Web Applications Security

VoIP Security, Malware, and DRM

Formal Models and Cryptographic Protocols

Language-Based and Hardware Security