The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.