| 279 | -- | 0 | Brian Neil Levine, Clay Shields. Internet security |
| 280 | -- | 290 | John W. Byers, Jeffrey Considine, Gene Itkis, Mei Chin Cheng, Alex Yeung. Securing bulk content almost for free |
| 291 | -- | 305 | T. Perlines Hormann, Konrad Wrona, S. Holtmanns. Evaluation of certificate validation mechanisms |
| 306 | -- | 324 | Dogan Kesdogan, Charles Palmer. Technical challenges of network anonymity |
| 325 | -- | 336 | Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos. Secure distributed intelligent networks |
| 337 | -- | 357 | Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali. Target access router selection in advanced mobility scenarios |
| 358 | -- | 371 | Shiann-Tsong Sheu, Yun-Yen Shih, Yue-Ru Chuang. An ACK-based polling strategy for supporting high performance and QoS in IEEE 802.11 wireless networks |
| 372 | -- | 391 | Athanasios Drigas, S. Kouremenos, Y. Bakopoulos, Vassilis Loumos. A study of H.263 traffic modeling in multipoint videoconference sessions over IP networks |
| 392 | -- | 401 | Gang Cheng, Nirwan Ansari. Finding a least hop(s) path subject to multiple additive constraints |
| 402 | -- | 408 | Ajay Pal Singh Virk, Raouf Boutaba. Economical protection in MPLS networks |