| 556 | -- | 558 | E. Eugene Schultz. Patching Pandemonium |
| 570 | -- | 576 | Stephen Hinde. Nimbyism, dominoes and creaking infrastructure |
| 577 | -- | 579 | Hank Wolfe. Forensic evidence testimony - some thoughts |
| 580 | -- | 584 | Rolf Moulton, Robert S. Coles. Applying information security governance |
| 585 | -- | 588 | Nicolas Sklavos, Odysseas G. Koufopavlou. Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance |
| 591 | -- | 595 | Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang. Security enhancement for the timestamp-based password authentication scheme using smart cards |
| 596 | -- | 612 | Sang Hyun Oh, Won Suk Lee. An anomaly intrusion detection method by clustering normal user behavior |
| 613 | -- | 623 | Sang-Jun Han, Sung-Bae Cho. Detecting intrusion with rule-based integration of multiple models |
| 624 | -- | 642 | Harold W. Thimbleby. The reduced Enigma |
| 643 | -- | 645 | Bin Wang, Jian-hua Li, Zhi-Peng Tong. Cryptanalysis of an enhanced timestamp-based password authentication scheme |