1 | -- | 17 | David Crowe, Wasim A. Al-Hamdani. Retained-Key Encryption |
18 | -- | 31 | Guillermo A. Francia III, Kihyun Kim, Byungoh Ahn, Sen-xin Zhou. A Formal Framework for Patch Management |
32 | -- | 42 | Herbert J. Mattord, Yair Levy, Steven Furnell. An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index |
43 | -- | 50 | Michael E. Whitman, Humayun Zafar. URL Manipulation and the Slippery Slope: The Case of the Harvard 119 Revisited |
51 | -- | 65 | Scott Musman, Michael R. Grimaila. Mission Assurance Challenges within the Military Environment |
66 | -- | 82 | Eralda Caushaj, Huirong Fu, Ishwar Sethi, Haissam Badih, Dion Watson, Ye Zhu, Supeng Leng. Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications |
83 | -- | 95 | George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu, George E. Corser. Knowing the Enemy at the Gates: Measuring Attacker Motivation |