Preface. Conference Committees. Web Security. What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification; K. Scheibelhofer. XML Electronic Signatures; G. Karlinger. An integrated secure Web architecture for protected Mobile code distribution; M. Jalali-Sohi, et al. Secure and anonymous multicast framework; N. Weiler, B. Plattner. Vulnerabilities and Security Limitations of current IP Telephony Systems; R. Ackermann, et al. Watermarking I. Quantization Watermarking in the JPEG2000 Coding Pipeline; P. Meerwald. Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences; S. Tsekeridou, et al. Scalable Detection of Perceptual Watermarks in JPEG2000 Images; D. Simitopoulos, et al. Cryptographic Algorithms. Collecting randomness from the net; B. Bencsath, I. Vajda. Encryption System Based on Neutral Network; C.-K. Chan, et al. A Modified Chaotic Cryptographic Method; W. Wong, et al. An Elliptic Curve Random Number Generator; I. Lee, K. Wong. Watermarking II. Conditional and User Specific Access to Services and Resources Using Annotation Watermarks; J. Dittmann, et al. Large Scale distributed watermarking of multicast media through encryption; R. Parviainen, P. Parnes. Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept; S. Craver, S. Katzenbeisser. Fingerprints for Copyright Protection; S. Encheva. System Security. Software Security Assessment through Specification Mutations and Fault Injection; R. Kaksonen, et al. Asynchronous Large-Scale Certification Based on Certificate Verification Trees; J. Domingo-Ferrer, et al. ACLA: A Framework for Access Control List (ACL) Analysis and Optimization; J. Qian, et al. Transparent Access to Encrypted Data Using Operating System Network Stack Extensions; E. Rademer, S.D. Wolthusen. A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System; M. Markovic, et al. Watermarking III. Optimization of Watermarking Performances Using Error Correcting Codes and Repetition; S. Zinger, et al. Using Raw Speech as a Watermark, does it work? P. Nintanavongsa, T. Amornraksa. Multiple Security Aspects. Transferability in Coin Systems with Observers; C. Fremdt, H. Neumann. Secure iLearning; F. Graf. Tree-based Multicast Key Agreement; J. Schwenk, et al. Security for the core network of third generation mobile systems; G. Horn, et al. Secure Internet Phone; P. Horster, et al. Posters. Secure Meeting Scheduling with AgenTa; T. Herlea, et al. Virtual Hidden Network; N. Shin. Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval; R. Puertpan, et al. A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks; A. Eskicioglu. Secure Service Centered Networking for Nomadic Usage; M. Hollick. Last Minute Papers. A Secure Authentication Infrastructure for Mobile Communication Services over the Internet; I. Dupre la Tour, et al. Blind Compressed-Domain Watermarking for MPEG-encoded Videos; C.-L. Wu, et al. Index of Contributors.