| 0 | -- | 0 | Stefano Salsano, Veltri, L., Papalilo, D.. SIP security issues: the SIP authentication procedure and its processing load |
| 6 | -- | 0 | Richard J. Lipton, S. Raj Rajagopalan, Dimitrios Serpanos. Network and service security |
| 8 | -- | 12 | Tim Gibson. Securing large-scale military networks: homogenous protection for disparate environments |
| 13 | -- | 21 | Anirban Chakrabarti, Govindarasu Manimaran. Internet infrastructure security: a taxonomy |
| 22 | -- | 27 | Christoph Rensing, Martin Karsten, Burkhard Stiller. AAA: a survey and a policy-based architecture and framework |
| 28 | -- | 37 | Christos Xenakis, Lazaros F. Merakos. On demand network-wide VPN deployment in GPRS |
| 38 | -- | 44 | Stefano Salsano, Luca Veltri, Donald Papalilo. SIP security issues: the SIP authentication procedure and its processing load |
| 46 | -- | 56 | Rudra Dutta, George N. Rouskas. Traffic grooming in WDM networks: past and future |