| 857 | -- | 858 | Gene Spafford. Editorial |
| 859 | -- | 869 | Ying Qian, Yulin Fang, Jose J. Gonzalez. Managing information security risks during new technology adoption |
| 870 | -- | 885 | Jie Shi, Yingjiu Li, Robert H. Deng. A secure and efficient discovery service system in EPCglobal network |
| 886 | -- | 896 | Yu-Lun Huang, Hsin-Yi Tsai. A framework for quantitative evaluation of parallel control-flow obfuscation |
| 897 | -- | 911 | Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou. Access control for online social networks third party applications |
| 912 | -- | 924 | Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen. Optimal mining on security labels for decentralized information flow control |
| 925 | -- | 939 | Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Arnau Vives-Guasch, Jordi Castellà-Roca. A survey of electronic ticketing applied to transport |
| 940 | -- | 955 | Theis Solberg Hjorth, Rune Torbensen. Trusted Domain: A security platform for home automation |
| 956 | -- | 966 | Cristina Alcaraz, Javier Lopez, Rodrigo Roman, Hsiao-Hwa Chen. Selecting key management schemes for WSN applications |
| 967 | -- | 982 | Slim Rekhis, Noureddine Boudriga. A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks |
| 983 | -- | 988 | Steven Furnell, Nathan L. Clarke. Power to the people? The evolving recognition of human aspects of security |
| 989 | -- | 1010 | Roger Jardí-Cedó, Jordi Pujol Ahulló, Jordi Castellà-Roca, Alexandre Viejo. Study on poll-site voting and verification systems |
| 1011 | -- | 1012 | Jennifer L. Bayuk. Wishful thinking |
| 1013 | -- | 0 | Katina Michael. Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges |