Copyright page (PDF)
Table of contents (PDF)
Message from the general chair and program chairs (PDF)
Committees (PDF)
L3A: a protocol for layer three accounting (Abstract)
Mitigating DoS attack through selective bin verification (Abstract)
On design tradeoffs between security and performance in wireless group communicating systems (Abstract)
Detecting and filtering instant messaging spam - a global and personalized approach (Abstract)
Analysis of IPSec overheads for VPN servers (Abstract)
Practical security for disconnected nodes (Abstract)
Achieving K-anonymity in mobile ad hoc networks (Abstract)
Phyllo: a peer-to-peer overlay security framework (Abstract)
Identity theft protection in structured overlays (Abstract)
An effective intrusion detection approach for OLSR MANET protocol (Abstract)
Policy segmentation for intelligent firewall testing (Abstract)
A distributed reputation approach to cooperative Internet routing protection (Abstract)
Author index (PDF)