| 10 | -- | 15 | Theodosios Tsiakis, George Stephanides. The concept of security and trust in electronic payments |
| 16 | -- | 30 | Mariana Gerber, Rossouw von Solms. Management of risk in the information age |
| 31 | -- | 43 | Simon Hansman, Ray Hunt. A taxonomy of network and computer attacks |
| 44 | -- | 49 | Tianjie Cao, Dongdai Lin, Rui Xue. A randomized RSA-based partially blind signature scheme for electronic cash |
| 50 | -- | 56 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. An improvement of Hwang-Lee-Tang s simple remote user authentication scheme |
| 57 | -- | 68 | Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar. H::2::A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming |
| 69 | -- | 75 | Kerry-Lynn Thomson, Rossouw von Solms. Information security obedience: a definition |
| 76 | -- | 82 | Ruishan Zhang, Kefei Chen. Improvements on the WTLS protocol to avoid denial of service attacks |
| 83 | -- | 86 | Che Wun Chiou, Chiou-Yng Lee. Multiplexer-based double-exponentiation for normal basis of GF(2:::::::m:::::::) |