|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. A diploma will be issued in the name of the authors and mailed to the contact author. Awarded Papers Detecting & Defeating Split Personality Malware Protecting Remote Component Authentication Migration towards a more secure authentication in the Session Initiation Protocol A Scalable Architecture for Countering Network-Centric Insider Threats Access Control in BitTorrent P2P Networks Using the Enhanced Closed Swarms Protocol Application of Scenario-driven Role Engineering to the MinaBASE Process Knowledge Database |
||||
Copyright (c) 2006-2011, IARIA