|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. A diploma will be issued in the name of the authors and mailed to the contact author. Awarded Papers An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS Strategies for Managed Software Integrity Protection Shifting the Paradigm: Training Undergraduate Students in Software Security Exploiting the x86 Architecture to Derive Virtual Machine State Information Detection Methods Improving Reliability of Automatic Human Tracking System Protection of a Shared HPC Cluster Universal Bluetooth Access Control and Security System for e-Keys Enviroments Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System |
||||
Copyright (c) 2006-2010, IARIA