| 165 | -- | 166 | Dimitris Gritzalis, Sabrina De Capitani di Vimercati. Editorial |
| 167 | -- | 179 | Josep Lluis Ferrer-Gomilla, Jose Antonio Onieva, Magdalena Payeras, Javier Lopez. Certified electronic mail: Properties revisited |
| 180 | -- | 195 | Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider |
| 196 | -- | 207 | A. Da Veiga, Jan H. P. Eloff. A framework and assessment instrument for information security culture |
| 208 | -- | 224 | Ming-Yang Su. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks |
| 225 | -- | 243 | Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz. Survey of network security systems to counter SIP-based denial-of-service attacks |
| 244 | -- | 252 | Marko Hölbl, Tatjana Welzer, Bostjan Brumen. Two proposed identity-based three-party authenticated key agreement protocols from pairings |
| 253 | -- | 268 | Natalia Stakhanova, Samik Basu, Johnny Wong. On the symbiosis of specification-based and anomaly-based detection |
| 269 | -- | 277 | Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh. An efficient and fair buyer-seller fingerprinting scheme for large scale networks |
| 278 | -- | 290 | Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. PKI-based trust management in inter-domain scenarios |