| 729 | -- | 730 | Dimitris Gritzalis, Tom Karygiannis. Editorial |
| 731 | -- | 742 | Amir Herzberg. DNS-based email sender authentication mechanisms: A critical review |
| 743 | -- | 753 | Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João W. Cangussu. Issues and challenges in securing VoIP |
| 754 | -- | 771 | Srdjan Pudar, G. Manimaran, Chen-Ching Liu. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures |
| 772 | -- | 784 | Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan García-Haro. Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths |
| 785 | -- | 794 | Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li. A study of on/off timing channel based on packet delay distribution |
| 795 | -- | 802 | Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee. Classification of web robots: An empirical study based on over one billion requests |
| 803 | -- | 815 | Yu-Lun Huang, P. H. Lu, J. Doug Tygar, A. D. Joseph. OSNP: Secure wireless authentication protocol using one-time key |
| 816 | -- | 826 | Hyeun-Suk Rhee, Cheong-Tag Kim, Young U. Ryu. Self-efficacy in information security: Its influence on end users' information security practice behavior |
| 827 | -- | 842 | Yong Tang, Bin Xiao, Xicheng Lu. Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms |
| 843 | -- | 856 | Jorge Fontenla González, Manuel Caeiro Rodríguez, Martín Llamas Nistal, Luis E. Anido-Rifón. Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems |