1. K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In the Tenth International Conference on Information and Knowledge Management, 2001.
2. R. Anderson. Trusted computing FAQ. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html , 2003.
3. D. Anius. Enhancing innovation within a regional wireless grid. In The Inter-national Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.
4. F. Baker, B. Foster, and C. Sharp. Cisco architecture for lawful intercept in IP networks, Internet Draft (Informational). Technical report, IETF, 2003.
5. P. A. Branch. Lawful interception of the internet. Technical report, Centre for Advanced Internet Architectures, 2003.