• Achieving weighted fairness between uplink and downlink in IEEE 802.11 DCF-based WLANs

  • Self-regulating network utilization in mobile ad-hoc wireless LANs

  • Voice capacity analysis of WLAN with unbalanced traffic

  • Performance analysis of UMTS handover with the help of WLAN

  • Load balancing routing in multi-channel hybrid wireless networks with single network interface

  • Enhancing the IEEE 802.11e in QoS support: analysis and mechanisms

  • TCP streaming for low-delay wireless video

  • Link scheduling with power control for throughput enhancement in multihop wireless networks

  • Power allocation and scheduling for MAC layer design in UWB networks

  • Provisioning link layer proportional service differentiation in wireless networks with smart antennas

  • Opportunistic multichannel Aloha for clustered OFDM wireless networks

  • Maintaining reliability through activity management in 802.15.4 sensor networks

  • Distributed source coding in wireless sensor networks

  • On Maintaining Multimedia Session’s Quality in CDMA Cellular Networks Using a Rate Adaptive Framework

  • Retransmission strategies for wireless connections with resource-limited devices

  • A denial-of-service resistant quality-of-service signaling protocol for mobile ad hoc networks

  • Architecture for 3G and 802.16 wireless networks integration with QoS support

  • Admission control with load balancing in IEEE 802.11-based ESS mesh networks

  • Energy-Efficient Data Aggregation Hierarchy for Wireless Sensor Networks

  • On base station selection for anycast flow routing in energy-constrained wireless sensor networks

  • QoS mechanisms for the MAC protocol of IEEE 802.11 WLANs

  • Uplink QoS-aware admission control in WCDMA networks with class-based power sharing

  • Computational complexity of one reputation metric

  • A comprehensive reputation-based trust model for distributed systems

  • Performance evaluation of a self-evolving trust building framework

  • Social approaches to trust-building in Web technologies

  • Reasoning about trust groups to coordinate mobile ad-hoc systems

  • Tailored trustworthiness estimations in peer-to-peer networks

  • Trust, the "wisdom of crowds", and societal norms: the creation, maintenance, and reasoning about trust in peer networks

  • A context-aware trust-based security system for ad hoc networks

  • Caching alternatives for a MANET-oriented OCSP scheme

  • Full agreement in BAN kerberos

  • A policy-based approach to wireless LAN security management

  • A security framework with trust management for sensor networks

  • Towards evidence-based trust brokering

  • Privacy in distributed reputation management

  • Advanced authentication and authorization for quality of service signaling

  • Security analysis and solutions for deploying IP telephony in the critical infrastructure

  • Vulnerabilities in SOHO VoIP gateways

  • Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records

  • Preventing theft of quality of service on open platforms

  • Investigating real-time system forensics

  • Trusted Internet forensics: design of a network forensics appliance

  • Design and implementation of a tunable encryption service for networked applications

  • Leakage of classified information by e-mail: a case study

  • Cyberprofiling: offender profiling and geographic profiling of crime on the Internet

  • Next generation communications and secure seamless handover

  • Towards ubiquitous cooperative security

  • Demonstration of security through collaboration in the digital business ecosystem

  • Network forensics: towards a classification of traceback mechanisms