• Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life

  • Next generation communications and secure seamless handover

  • Design and implementation of a tunable encryption service for networked applications

  • Preventing theft of quality of service on open platforms

  • Vulnerabilities in SOHO VoIP gateways

  • Advanced authentication and authorization for quality of service signaling

  • Security analysis and solutions for deploying IP telephony in the critical infrastructure

  • Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records

  • Trusted Internet forensics: design of a network forensics appliance

  • Investigating real-time system forensics