|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. A diploma will be issued in the name of the authors and mailed to the contact author. Awarded Papers Risk Management for Web and Distributed Software Development Projects Provable Security for the Fuzzy Fingerprint Vault Observations of UDP to TCP Ratio and Port Numbers Implementing Privacy with Erlang Active Objects Coalitional Game Theory for Security Risk Management |
||||
Copyright (c) 2006-2010, IARIA