• Social approaches to trust-building in Web technologies

  • Reasoning about trust groups to coordinate mobile ad-hoc systems

  • Tailored trustworthiness estimations in peer-to-peer networks

  • Trust, the "wisdom of crowds", and societal norms: the creation, maintenance, and reasoning about trust in peer networks

  • A context-aware trust-based security system for ad hoc networks

  • Caching alternatives for a MANET-oriented OCSP scheme

  • Full agreement in BAN kerberos

  • A policy-based approach to wireless LAN security management

  • A security framework with trust management for sensor networks

  • Towards evidence-based trust brokering

  • Privacy in distributed reputation management

  • Advanced authentication and authorization for quality of service signaling

  • Security analysis and solutions for deploying IP telephony in the critical infrastructure

  • Vulnerabilities in SOHO VoIP gateways

  • Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records

  • Preventing theft of quality of service on open platforms

  • Investigating real-time system forensics

  • Trusted Internet forensics: design of a network forensics appliance

  • Design and implementation of a tunable encryption service for networked applications

  • Leakage of classified information by e-mail: a case study

  • Cyberprofiling: offender profiling and geographic profiling of crime on the Internet

  • Next generation communications and secure seamless handover

  • Towards ubiquitous cooperative security

  • Demonstration of security through collaboration in the digital business ecosystem

  • Network forensics: towards a classification of traceback mechanisms