| 171 | -- | 0 | Eugene H. Spafford. Editorial |
| 172 | -- | 177 | Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau. Universally composable and customizable post-processing for practical quantum key distribution |
| 178 | -- | 193 | Travis D. Breaux, David L. Baumer. Legally reasonable security requirements: A 10-year FTC retrospective |
| 194 | -- | 207 | Hugues Chabot, Raphael Khoury, Nadia Tawbi. Extending the enforcement power of truncation monitors using static analysis |
| 208 | -- | 220 | Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn A. Jack. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking |
| 221 | -- | 241 | Davide Ariu, Roberto Tronci, Giorgio Giacinto. HMMPayl: An intrusion detection system based on Hidden Markov Models |
| 242 | -- | 256 | Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer. Modeling the behavior of users who are confronted with security mechanisms |
| 257 | -- | 272 | Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros. Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach |
| 273 | -- | 287 | Dong-Her Shih, David C. Yen, Chih-Hung Cheng, Ming-Hung Shih. A secure multi-item e-auction mechanism with bid privacy |