|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. A diploma will be issued in the name of the authors and mailed to the contact author. Papers A Security Pattern for Untraceable Secret Handshakes Secrecy for Bounded Security Protocols without Freshness Check A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs Detecting Man-in-the-Middle Attacks by Precise Timing Enforcement of Security Properties for Dynamic MAC Policies Identification of Basic Measurable Security Components for a Distributed Messaging System Survivability and Business Continuity Management System According to BS 25999 Suspicion-Driven Formal Analysis of Security Requirements Forward Secure ID-Based Group Key Agreement Protocol with Anonymity Detection of Security and Dependability Threats: A Belief Based Reasoning Approach |
||||
Copyright (c) 2006-2010, IARIA