| 1 | -- | 0 | Stephen D. Wolthusen. Editorial |
| 2 | -- | 7 | Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff. Building access control models with attribute exploration |
| 8 | -- | 17 | Travis D. Breaux, Annie I. Antón, Eugene H. Spafford. A distributed requirements management framework for legal compliance and accountability |
| 18 | -- | 28 | Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo, Gabriel Maciá-Fernández, E. Vázquez. Anomaly-based network intrusion detection: Techniques, systems and challenges |
| 29 | -- | 39 | Xiaozhuo Gu, Jianzu Yang, Julong Lan, Zhenhuan Cao. Huffman-based join-exit-tree scheme for contributory key management |
| 40 | -- | 46 | Javad Akbari Torkestani, Mohammad Reza Meybodi. RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems |
| 47 | -- | 62 | Catherine S. Weir, Gary Douglas, Martin Carruthers, Mervyn A. Jack. User perceptions of security, convenience and usability for ebanking authentication tokens |
| 63 | -- | 71 | Amir Herzberg. Why Johnny can t surf (safely)? Attacks and defenses for web users |
| 72 | -- | 76 | Hongxin Zhang, Yuewang Huang, Jianxin Wang, Yinghua Lu, Jinling Zhang. Recognition of electro-magnetic leakage information from computer radiation with SVM |
| 77 | -- | 84 | K. Vimal Kumar. Securing communication using function extraction technology for malicious code behavior analysis |
| 85 | -- | 93 | Seongseob Hwang, Sungzoon Cho, Sunghoon Park. Keystroke dynamics-based authentication for mobile devices |
| 94 | -- | 99 | Jasim A. Ghaeb, J. Chebil. An oblique-matrix technique for data integrity assurance |
| 100 | -- | 104 | Song Lin, Biao Wang, Zhoujun Li. Digital multisignature on the generalized conic curve over Z::n:: |