|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. Awarded Papers Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels Formal Treatment of Distributed Trust in Electronic Voting Process Discovery and Guidance Applications of Manually Generated Logs Firewall Analysis by Symbolic Simulation
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals Improving Attack Aggregation Methods Using Distributed Hash Tables Engineering Security Protocols with Modelchecking - Radius-SHA256 and Secured Simple Protocol |
||||
Copyright (c) 2006-2012, IARIA