Calls for Papers IEEE Internet Computing is seeking papers for the a theme issue on Security for P2P and Ad Hoc Networks for the November/December 2005 publication. All submissions must be original manuscripts of less than 5,000 words, and must focus on Internet technologies and implementations. All manuscripts accepted for publication must pass peer review. Articles should be written for a readership consisting primarily of professional system and software designers and engineers (75% working in industry). To submit an article to one of our departments, see our department guidelines at http://www.computer.org/internet/call4ppr.htm Security for P2P and Ad Hoc Networks November/December 2005 Guest editors: Shiuhpyng Shieh (National Chiao Tung University) and Dan Wallach (Rice University) Submissions due 1 April 2005 As the number of individual computing devices and the demand for mobility continue to grow, peer-to-peer (P2P) systems and ad hoc networks will become increasingly popular. Indeed, they are likely to become integral to the future computing and networking infrastructure. P2P systems create application-level virtual networks with their own routing mechanisms; they enable large numbers of computers to share information and resources directly, without dedicated central servers. Ad hoc networks allow mobile hosts, mobile devices, and sensor nodes to communicate when no fixed infrastructure is available. Although P2P systems and ad hoc networks make communication and resource sharing more convenient, however, they also introduce new security challenges due to inherent aspects such as dynamic topologies and membership, unreliability, severe resource constrains, and the absence of a trusted infrastructure. To explore these issues, IC invites contributions for a special issue on security for P2P and ad hoc networks. Appropriate topics include, but are not limited to: a.. key management, b.. authentication, c.. access control, d.. privacy and anonymity, e.. secure routing, f.. secure MAC protocols, g.. performance and security trade-offs, h.. intrusion detection and tolerance, and i.. denial of service.