| 521 | -- | 522 | Dimitris Gritzalis, Javier Lopez. Editorial |
| 523 | -- | 532 | Herbert Leitold, Reinhard Posch, Thomas Rössler. Reconstruction of electronic signatures from eDocument printouts |
| 533 | -- | 547 | Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Managing key hierarchies for access control enforcement: Heuristic approaches |
| 548 | -- | 564 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. Taming role mining complexity in RBAC |
| 565 | -- | 579 | Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson. On a taxonomy of delegation |
| 580 | -- | 591 | Jan Kolter, Thomas Kernchen, Günther Pernul. Collaborative privacy management |
| 592 | -- | 602 | Ryan Farley, Xinyuan Wang. Roving bugnet: Distributed surveillance threat and mitigation |
| 603 | -- | 618 | Yannis Soupionis, Dimitris Gritzalis. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony |
| 619 | -- | 627 | Alessandro Sorniotti, Refik Molva. A provably secure secret handshake with dynamic controlled matching |
| 628 | -- | 635 | Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo. A note about the identifier parent property in Reed-Solomon codes |