| 105 | -- | 120 | Albert Levi, Can Berk Güder. Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach |
| 121 | -- | 129 | Dimitris Mitropoulos, Diomidis Spinellis. SDriver: Location-specific signatures prevent SQL injection attacks |
| 130 | -- | 137 | Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke. From desktop to mobile: Examining the security experience |
| 138 | -- | 143 | Jen-Ho Yang, Chin-Chen Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem |
| 144 | -- | 152 | Kuo-Fong Kao, I-En Liao, Yueh-Chia Li. Detecting rogue access points using client-side bottleneck bandwidth analysis |
| 153 | -- | 173 | Reza Sadoddin, Ali A. Ghorbani. An incremental frequent structure mining framework for real-time alert correlation |
| 174 | -- | 188 | Alessandro Basso, Stefano Sicco. Preventing massive automated access to web resources |
| 189 | -- | 198 | M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff. Information security: The moving target |
| 199 | -- | 214 | Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. Reliable and fully distributed trust model for mobile ad hoc networks |
| 215 | -- | 228 | Divakaran Liginlal, Inkook Sim, Lara Khansa. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management |
| 229 | -- | 241 | P. P. Deepthi, P. S. Sathidevi. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions |