| 8 | -- | 16 | Philip Attfield, Ming-Yuh Huang. Real-World Access control Systematic Failures; Reality or Virtual Reality? |
| 17 | -- | 25 | Vlasti Broucek, Paul Turner. Considerations for E-Forensics: Insights into Implications of uncoordinated Technical, organisational and Legal responses to Illegal or Inappropriate on-Line Behaviours |
| 26 | -- | 35 | Dan Cvrcek, Václav Matyás Jr., Marek Kumpost. On Privacy Classification in Ubiquitous Computing Systems |
| 36 | -- | 45 | Nicolas Prigent, Christophe Bidan. Securing Devices Communities in spontaneous Networks |
| 46 | -- | 53 | Viktor Lokazyuk, Oksana Pomorova. The Problems of Information Defence in Diagnosis Intelligent Systems of Microprocessor Devices |
| 54 | -- | 60 | Anastasios Fragopoulos, Dimitrios N. Serpanos. Sources of Randomness for Use in Random number Generation |
| 61 | -- | 68 | Georgy Loutsky, Valerij Shyrotchin, Vadim Mukhin. Integrated Systems of Information Security in Computer Networks |
| 69 | -- | 76 | Andriy Horpenyuk. Fast Algorithms and Computing means of cryptological Functions |
| 77 | -- | 94 | Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal. Validation of a survivable Publish-Subscribe System |
| 95 | -- | 104 | Andrian Piskozub. Modern Approaches of Securing Computer Networks from Denial of Service Attacks |
| 105 | -- | 112 | Akio Shiibashi, Kinji Mori. Autonomous Decentralized Data Consistency for High-Assurance Embedded System |
| 113 | -- | 123 | Igor V. Kotenko, Alexander Ulanov. Agent-based simulation of DDoS Attacks and Defense Mechanisms |
| 124 | -- | 132 | Zdravko Karakehayov, Ivan Radev. A Scalable Security Service for Geographic Ad-Hoc Routing |