The papers listed below have been selected as "Best Papers" based on the reviews of the original submission, the camera-ready version, and the presentation during the conference.
A diploma will be issued in the name of the authors and mailed to the contact author.
A Security Pattern for Untraceable Secret Handshakes
Secrecy for Bounded Security Protocols without Freshness Check
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs
Detecting Man-in-the-Middle Attacks by Precise Timing
Enforcement of Security Properties for Dynamic MAC Policies
Identification of Basic Measurable Security Components for a Distributed Messaging System
Survivability and Business Continuity Management System According to BS 25999
Suspicion-Driven Formal Analysis of Security Requirements
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach
Copyright (c) 2006-2010, IARIA