| 87 | -- | 88 | E. Eugene Schultz. Incident response teams need to change |
| 97 | -- | 103 | Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Non-PKI methods for public key distribution |
| 107 | -- | 119 | Horng-Twu Liaw. A secure electronic voting protocol for general elections |
| 120 | -- | 125 | Tzong-Sun Wu, Chien-Lung Hsu. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks |
| 126 | -- | 136 | Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration |
| 137 | -- | 153 | Theodore Stergiou, Mark S. Leeson, Roger J. Green. An alternative architectural framework to the OSI security model |
| 154 | -- | 166 | Allister Cournane, Ray Hunt. An analysis of the tools used for the generation and prevention of spam |
| 167 | -- | 173 | Wen-Shenq Juang. Efficient password authenticated key agreement using smart cards |
| 174 | -- | 178 | Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang. An improvement of nonrepudiable threshold proxy signature scheme with known signers |