| 393 | -- | 394 | E. Eugene Schultz. Microsoft is back in the hot seat |
| 405 | -- | 407 | Danny Bradbury. Microsoft s new window on security |
| 408 | -- | 412 | Rossouw von Solms, Sebastiaan H. von Solms. Information Security Governance: A model based on the Direct-Control Cycle |
| 413 | -- | 419 | Bilge Karabacak, Ibrahim Sogukpinar. A quantitative method for ISO 17799 gap analysis |
| 420 | -- | 425 | Kumar Mangipudi, Rajendra S. Katti. A Secure Identification and Key agreement protocol with user Anonymity (SIKA) |
| 426 | -- | 434 | Hamida Seba. FTKM: A fault-tolerant key management protocol for multicast communications |
| 435 | -- | 444 | Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng. A secure extension of the Kwak-Moon group signcryption scheme |
| 445 | -- | 451 | A. A. Abimbola, Jose Munoz, William J. Buchanan. NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data |
| 452 | -- | 458 | Emrah Tomur, Y. Murat Erten. Application of temporal and spatial role based access control in 802.11 wireless networks |
| 459 | -- | 468 | Morteza Amini, Rasool Jalili, Hamid Reza Shahriari. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks |
| 469 | -- | 473 | Zhi-hong Zuo, Qing-Xin Zhu, Ming-Tian Zhou. Infection, imitation and a hierarchy of computer viruses |