Cybercrime and Digital Forensics Investigation.- Global E-Security.- How to Find Exculpatory and Inculpatory Evidence Using a Circular Digital Forensics Process Model.- Identity Theft: A Study in Contact Centres.- A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus.- Trends in Smartcard Fraud.- Tracking Online Trails.- Evaluation of Tools for Protection of Interest against Hacking and Cracking.- Voice and Video over Internet Protocols Security.- Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks.- Covert Channels in SIP for VoIP Signalling.- Secure Recognition of Voice-Less Commands Using Videos.- An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion.- Computer Security.- Experimental Results on Algebraic Analysis of Trivium and Tweaked Trivium.- Secure Repayable Storage System.- A Generalized Model of E-trading for GSR Fair Exchange Protocol.- Mobile-PKI Service Model for Ubiquitous Environment.- Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic.- Multisensor Message Exchange Mechanism.- Spam Filtering without Text Analysis.- Collaborative Approach to Network Behavior Analysis.- Making Concurrent Switching with Input-Output-Queued Switches Practical.- Security Architecture and Authorisations.- User Dynamics in Graphical Authentication Systems.- Improved Results on Algebraic Cryptanalysis of A5/2.- A Logic for Inclusion of Administrative Domains and Administrators in Multi-domain Authorization.- Quantum Key Distribution.- A Survey of User Authentication Based on Mouse Dynamics.- Decoding Algorithm of Low Density Parity Check Code.- LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP.- Secure Biometrically Based Authentication Protocol for a Public Network Environment.- Another Security Improvement over the Lin et al.’s E-voting Scheme.- IT Governance.- A Meta-process for Information Security Risk Management.- Security Issues in mGovernment.- Mobile Customer Relationship Management and Mobile Security.- E-Commerce and Security Governance in Developing Countries.- IT Governance Metrics, Measurements and Benchmarking.- Web Services Security – Implementation and Evaluation Issues.- LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP.