| 381 | -- | 382 | Dimitris Gritzalis, Pierangela Samarati. Editorial |
| 383 | -- | 392 | Egon Hilgenstieler, Elias Procópio Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori. Extensions to the source path isolation engine for precise and efficient log-based IP traceback |
| 393 | -- | 409 | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff, Derrick G. Kourie. A security privacy aware architecture and protocol for a single smart card used for multiple services |
| 410 | -- | 418 | Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon. Stability analysis of a SEIQV epidemic model for rapid spreading worms |
| 419 | -- | 431 | Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU |
| 432 | -- | 445 | Eirik Albrechtsen, Jan Hovden. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study |
| 446 | -- | 459 | Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh. Hybrid spam filtering for mobile communication |
| 460 | -- | 475 | Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis. A generic mechanism for efficient authentication in B3G networks |
| 476 | -- | 486 | Johan Van Niekerk, Rossouw von Solms. Information security culture: A management perspective |
| 487 | -- | 500 | Todd Mander, Richard Cheung, Farhad Nabhani. Power system DNP3 data object security using data sets |
| 501 | -- | 514 | Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez Mendoza, Javier Lopez, José A. Montenegro, Marc Lacoste, Daniel Diaz. Pervasive authentication and authorization infrastructures for mobile users |