18. ESORICS 2013: Egham, UK

Cryptography and Computation

Measurement and Evaluation

Applications of Cryptography

Code Analysis

Network Security

Formal Models and Methods

Protocol Analysis

Privacy Enhancing Models and Technologies

E-voting and Privacy

Malware Detection

Access Control

Attacks

Language-Based Protection

maintained by Schloss Dagstuhl LZI at University of Trier