|
||||
The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference. For the awarded papers, a digital award will be issued in the name of the authors. Awarded Papers On Tuning TCP for Superior Performance on High Speed Path Scenarios Dynamic Access Control Using Virtual Multicore Firewalls Electric Vehicle Charging Infrastructure – Security Considerations and Approaches
IHTIAP 2012 Awards
Application of Steganography for Anonymity through the Internet
The following papers have been selected on the basis of their contents, specificaly for lending themselves to an interesting extended work. The authors of these papers are receiving invitations to submit an extended article version to one of the IARIA Journals. Papers Invited for IARIA Journals A Robust Data Hiding Process Contributing to the Development of a Semantic Web Federation Between CLEVER Clouds Through SASL/Shibboleth Authentication |
||||
Copyright (c) 2006-2012, IARIA