| 79 | -- | 80 | E. Eugene Schultz. About Unofficial patches |
| 89 | -- | 90 | Danny Bradbury. The metamorphosis of malware writers |
| 91 | -- | 96 | Vicki Miller Luoma. Computer forensics and electronic discovery: The new management challenge |
| 97 | -- | 105 | Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff. Uncovering identities: A study into VPN tunnel fingerprinting |
| 106 | -- | 113 | Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang. Provably secure authenticated key exchange protocols for low power computing clients |
| 114 | -- | 120 | Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal. A new protocol to counter online dictionary attacks |
| 121 | -- | 130 | Nikos Komninos, Dimitris Vergados, Christos Douligeris. Layered security design for mobile ad hoc networks |
| 131 | -- | 136 | Raphael Chung-Wei Phan, David Wagner. Security considerations for incremental hash functions based on pair block chaining |
| 137 | -- | 153 | Krishna Sampigethaya, Radha Poovendran. A framework and taxonomy for comparison of electronic voting schemes |