| 2009 | A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. Keita Emura, Atsuko Miyaji, Kazumasa Omote |
| 2009 | A Criteria-Based Evaluation Framework for Authentication Schemes in IMS. Charlott Eliasson, Markus Fiedler, Ivar Jørstad |
| 2009 | A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. Keita Emura, Atsuko Miyaji, Kazumasa Omote |
| 2009 | A First Step towards Characterizing Stealthy Botnets. Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
| 2009 | A Framework for Understanding Botnets. Justin Leonard, Shouhuai Xu, Ravi S. Sandhu |
| 2009 | A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali |
| 2009 | A Knowledge Management Approach to Support a Secure Software Development. Francisco José Barreto Nunes, Arnaldo Dias Belchior, Adriano Bessa Albuquerque |
| 2009 | A Micro-FT-UART for Safety-Critical SoC-Based Applications. Mohammad-Hamed Razmkhah, Seyed Ghassem Miremadi, Alireza Ejlali |
| 2009 | A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes |
| 2009 | A New Approach for Implementing the MPL Method toward Higher SPA Resistance. Masami Izumi, Kazuo Sakiyama, Kazuo Ohta |
| 2009 | A New Approach for the Construction of Fault Trees from System Simulink. Gholamreza Latif Shabgahi, F. Tajarrod |
| 2009 | A New Watermarking Attack Using Long-Range Correlation Image Restoration. Amirhossein Taherinia, Mehran Fotouhi, Mansour Jamzad |
| 2009 | A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. Mourad Elhadef |
| 2009 | A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto |
| 2009 | A Policy Framework for Data Management in Services Marketplaces. Jun Li, Bryan Stephenson, Sharad Singhal |
| 2009 | A Post-Mortem Incident Modeling Method. Shanai Ardi, Nahid Shahmehri |
| 2009 | A Practical Framework for the Dataflow Pointcut in AspectJ. Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi |
| 2009 | A Reconfigurable-Permutation Algorithm for M_S-Box. Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka |
| 2009 | A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. S. Hamid Amiri, Mansour Jamzad |
| 2009 | A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. Amirhossein Taherinia, Mansour Jamzad |
| 2009 | A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. George Poulopoulos, Konstantinos Markantonakis, Keith Mayes |
| 2009 | A Security Management Assurance Model to Holistically Assess the Information Security Posture. Igli Tashi, Solange Ghernaouti-Helie |
| 2009 | A Signature Scheme Associated with Universal Re-signcryption. Kohei Tatara, Kouichi Sakurai |
| 2009 | A Standard MIDI File Steganography Based on Fluctuation of Duration. Kotaro Yamamoto, Munetoshi Iwakiri |
| 2009 | A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. Marcin Gorawski, Szymon Panfil |
| 2009 | A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso |
| 2009 | A-COLD: Access Control of Web OLAP over Multi-data Warehouse. Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
| 2009 | AVISPA in the Validation of Ambient Intelligence Scenarios. Antonio Muñoz, Antonio Maña, Daniel Serrano |
| 2009 | Accuracy: The Fundamental Requirement for Voting Systems. Tim Storer, Russell Lock |
| 2009 | Advanced Flooding Attack on a SIP Server. Xianglin Deng, Malcolm Shore |
| 2009 | Algebraic Properties in Alice and Bob Notation. Sebastian Mödersheim |
| 2009 | An Analysis of Fault Effects and Propagations in AVR Microcontroller ATmega103(L). Alireza Rohani, Hamid R. Zarandi |
| 2009 | An Architectural Foundation for Security Model Sharing and Reuse. Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel |
| 2009 | An Authentication Watermark Algorithm for JPEG images. Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing |
| 2009 | An Automatic Privacy Policy Agreement Checker for E-services. George O. M. Yee |
| 2009 | An Efficient Measurement of Object Oriented Design Vulnerability. Alka Agrawal, Shalini Chandra, Raees Ahmad Khan |
| 2009 | An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. Frank Innerhofer-Oberperfler, Ruth Breu |
| 2009 | An Experimental System for Studying the Tradeoff between Usability and Security. Noam Ben-Asher, Joachim Meyer, Sebastian Möller, Roman Englert |
| 2009 | An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. Genta Iha, Hiroshi Doi |
| 2009 | An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. Marko Hölbl, Tatjana Welzer |
| 2009 | An Improvement of REM: A Replication Oriented Event-Based Middleware. Youcheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng |
| 2009 | An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. Yoshio Kakizaki, Yoshiaki Yoshida, Hidekazu Tsuji |
| 2009 | An Inclusive Information Society Needs a Global Approach of Information Security. Solange Ghernaouti-Helie |
| 2009 | An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. Ya-Fen Chang, Yen-Cheng Lai |
| 2009 | Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini |
| 2009 | Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. Omar Khadeer Hussain, Tharam S. Dillon |
| 2009 | Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. Frédéric Majorczyk, Jonathan-Christofer Demay |
| 2009 | Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini |
| 2009 | BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. Ping Chen, Yi Wang, Zhi Xin, Bing Mao, Li Xie |
| 2009 | Blue Gene/L Log Analysis and Time to Interrupt Estimation. Narate Taerat, Nichamon Naksinehaboon, Clayton Chandler, James Elliott, Chokchai Leangsuksun, George Ostrouchov, Stephen L. Scott, Christian Engelmann |
| 2009 | Building a Responsibility Model Including Accountability, Capability and Commitment. Christophe Feltus, Michaël Petit |
| 2009 | Capturing Information Flow with Concatenated Dynamic Taint Analysis. Hyung Chan Kim, Angelos D. Keromytis, Michael Covington, Ravi Sahita |
| 2009 | Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. Nurdan Buz Saran, Ali Doganaksoy |
| 2009 | Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. Amril Syalim, Yoshiaki Hori, Kouichi Sakurai |
| 2009 | Computer Forensics in Japan: A Preliminary Study. Jigang Liu, Tetsutaro Uehara |
| 2009 | Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. Wolfgang Boehmer |
| 2009 | Deconvolving Protected Signals. Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache |
| 2009 | Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring. Junghwan Rhee, Ryan D. Riley, Dongyan Xu, Xuxian Jiang |
| 2009 | Deploying Security Policy in Intra and Inter Workflow Management Systems. Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2009 | Detecting Image Tampering Using Feature Fusion. Pin Zhang, Xiangwei Kong |
| 2009 | Detecting Stepping-Stone Connection Using Association Rule Mining. Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
| 2009 | Different Approaches to In-House Identity Management - Justification of an Assumption. Ludwig Fuchs, Christian Broser, Günther Pernul |
| 2009 | Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. Matthew Simon, Jill Slay |
| 2009 | Enhancing Automated Detection of Vulnerabilities in Java Components. Pierre Parrend |
| 2009 | Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. Grant Osborne, Benjamin P. Turnbull |
| 2009 | Enhancing Control of Service Compositions in Service-Oriented Architectures. Christian A. Schneider, Frederic Stumpf, Claudia Eckert |
| 2009 | Enterprise-Oriented Digital Rights Management Mechanism: eDRM. Chia-Chen Lin, Shih-Chi Wu, Po-Hsuan Chiang, Chang-Chi Chen |
| 2009 | Estimating ToE Risk Level Using CVSS. Siv Hilde Houmb, Virginia N. L. Franqueira |
| 2009 | FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. Kenichi Yajima, Shoichi Morimoto, Daisuke Horie, Noor Sheila Azreen, Yuichi Goto, Jingde Cheng |
| 2009 | Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi |
| 2009 | Finding Preimages of Multiple Passwords Secured with VSH. Kimmo Halunen, Pauli Rikula, Juha Röning |
| 2009 | Formal Analyses of Usage Control Policies. Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter |
| 2009 | Generalized Robust Combiners for Oblivious Transfer. Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan |
| 2009 | Generating AMF Configurations from Software Vendor Constraints and User Requirements. Ali Kanso, Maria Toeroe, Abdelwahab Hamou-Lhadj, Ferhat Khendek |
| 2009 | Generating User-Understandable Privacy Preferences. Jan Paul Kolter, Günther Pernul |
| 2009 | Generation of Prototypes for Masking Sequences of Events. Aïda Valls, Cristina Gómez-Alonso, Vicenç Torra |
| 2009 | Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. Juhani Anttila, Jorma Kajava |
| 2009 | Identifying and Resolving Least Privilege Violations in Software Architectures. Koen Buyens, Bart De Win, Wouter Joosen |
| 2009 | Identity-Based Hybrid Signcryption. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
| 2009 | Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. Jooyoung Lee, Sungkyung Un, Dowon Hong |
| 2009 | Improving Reliability for Multi-home Inbound Traffic: MHLB/I Packet-Level Inter-domain Load-Balancing. Hiroshi Fujinoki |
| 2009 | Including Security Rules Support in an MDA Approach for Secure DWs. Carlos Blanco, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini |
| 2009 | Information Security Optimization: From Theory to Practice. David John Simms |
| 2009 | Intrusion Process Modeling for Security Quantification. Jaafar Almasizadeh, Mohammad Abdollahi Azgomi |
| 2009 | Investigating the Implications of Virtual Machine Introspection for Digital Forensics. Kara L. Nance, Brian Hay, Matt Bishop |
| 2009 | Linking Privacy Solutions to Developer Goals. Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen |
| 2009 | Making Use of Human Visual Capability to Improve Information Security. Masakatsu Nishigaki, Takumi Yamamoto |
| 2009 | Managing Rights and Value of Digital Media. Filippo Chiariglione, Giacomo Cosenza, Sergio Matone |
| 2009 | Measuring Peer-to-Peer Botnets Using Control Flow Stability. Binbin Wang, Zhitang Li, Hao Tu, Jie Ma |
| 2009 | Measuring Voter-Controlled Privacy. Hugo L. Jonker, Sjouke Mauw, Jun Pang |
| 2009 | Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests. Marcelo Masera, Igor Nai Fovino |
| 2009 | Methodology to Align Business and IT Policies: Use Case from an IT Company. Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy |
| 2009 | MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. Thomas Butter, Markus Aleksy |
| 2009 | Modeling Misuse Patterns. Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki |
| 2009 | Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics. Sebastian Sowa, Roland Gabriel |
| 2009 | Novel Algorithms for Subgroup Detection in Terrorist Networks |
| 2009 | On Equilibrium Distribution Properties in Software Reliability Modeling. Xiao Xiao, Tadashi Dohi |
| 2009 | On Privacy Preserving Convex Hull. Sandeep Hans, Sarat C. Addepalli, Anuj Gupta, Kannan Srinathan |
| 2009 | On the Higher Order Nonlinearities of Boolean Functions and S-boxes. Claude Carlet |
| 2009 | On the Security of Untrusted Memory. Jörn-Marc Schmidt, Stefan Tillich |
| 2009 | P2F: A User-Centric Privacy Protection Framework. Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas |
| 2009 | Package-Role Based Authorization Control Model for Wireless Network Services. Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson |
| 2009 | Patient-Administered Access Control: A Usability Study. Lillian Røstad, Ole Andreas Alsos |
| 2009 | Patterns to Support the Development of Privacy Policies. Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo |
| 2009 | Perfect Failure Detection in the Partitioned Synchronous Distributed System Model. Raimundo José de Araújo Macêdo, Sérgio Gorender |
| 2009 | Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai |
| 2009 | Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer |
| 2009 | Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. Vincent Alimi, Marc Pasquet |
| 2009 | Prioritisation and Selection of Software Security Activities. David Byers, Nahid Shahmehri |
| 2009 | Privacy-Preserving Collaborative Filtering Schemes. Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada |
| 2009 | Proactive Resource Management for Failure Resilient High Performance Computing Clusters. Song Fu, Cheng-Zhong Xu |
| 2009 | Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan |
| 2009 | Protecting Global and Static Variables from Buffer Overflow Attacks. Yves Younan, Frank Piessens, Wouter Joosen |
| 2009 | QR-TAN: Secure Mobile Transaction Authentication. Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka |
| 2009 | Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. Chunyan Mu, David Clark |
| 2009 | Rank Swapping for Partial Orders and Continuous Variables. Vicenç Torra |
| 2009 | Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument. Kotaro Yamamoto, Munetoshi Iwakiri |
| 2009 | Reducing the Cost of Session Key Establishment. Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya |
| 2009 | Regulatory Compliance and Information Security Assurance. Igli Tashi |
| 2009 | Retaining Data Control to the Client in Infrastructure Clouds. Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer |
| 2009 | Reusable Security Requirements for Healthcare Applications. Jostein Jensen, Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland, Herbjørn Andresen |
| 2009 | Revealing the Calling History of SIP VoIP Systems by Timing Attacks. Ge Zhang, Simone Fischer-Hübner, Leonardo A. Martucci, Sven Ehlert |
| 2009 | Risk-Driven Architectural Decomposition. Thomas Heyman, Riccardo Scandariato, Wouter Joosen |
| 2009 | Routing Protocol Security Using Symmetric Key Based Techniques. Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya |
| 2009 | Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu |
| 2009 | SecMiLiA: An Approach in the Agent Protection. Antonio Muñoz, Antonio Maña, Daniel Serrano |
| 2009 | Secrecy Capacity of Wireless LAN. Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai |
| 2009 | SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif |
| 2009 | Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna |
| 2009 | Security Analysis for P2P Routing Protocols. Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai |
| 2009 | Security Credential Mapping in Grids. Mehran Ahsant, Esteban Talavera Gonzalez, Jim Basney |
| 2009 | Security Evaluation of an Intrusion Tolerant System with MRSPNs. Ryutaro Fujimoto, Hiroyuki Okamura, Tadashi Dohi |
| 2009 | Security Requirements Specification in Service-Oriented Business Process Management. Michael Menzel, Ivonne Thomas, Christoph Meinel |
| 2009 | Security in Quantum Networks as an Optimization Problem. Stefan Rass, Peter Schartner |
| 2009 | Server-Side Prediction of Source IP Addresses Using Density Estimation. Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel |
| 2009 | Software Inspections Using Guided Checklists to Ensure Security Goals. Frank Elberzhager, Alexander Klaus, Marek Jawurek |
| 2009 | Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula |
| 2009 | Standards-Based Cyber Exercises. Ronald C. Dodge, Brian Hay, Kara L. Nance |
| 2009 | State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. Sopheak Cheang, Sinawong Sang |
| 2009 | Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? Dejan Baca, Kai Petersen, Bengt Carlsson, Lars Lundberg |
| 2009 | Statistical Failure Analysis of a Web Server System. Toshiya Fujii, Tadashi Dohi |
| 2009 | The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. Meiko Jensen, Jörg Schwenk |
| 2009 | The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data. Benjamin P. Turnbull, Robert Taylor, Barry Blundell |
| 2009 | The Case for a Simpler Security Model in Grid Computing. Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager |
| 2009 | The User-Centric Vision Matches Credentials Exchanges. Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
| 2009 | Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu |
| 2009 | Towards Evaluation of Security Assurance during the Software Development Lifecycle. Ilkka Uusitalo, Kaarina Karppinen, Pasi Ahonen, Heimo Pentikäinen |
| 2009 | Towards Intrusion Detection for Encrypted Networks. Vik Tor Goh, Jacob Zimmermann, Mark Looi |
| 2009 | Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. Yi Wang, Ping Chen, Yi Ge, Bing Mao, Li Xie |
| 2009 | Truly Anonymous Paper Submission and Review Scheme. Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen |
| 2009 | Trusting User Defined Context in MANETs: Experience from the MIDAS Approach. Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert W. M. Wienhofen |
| 2009 | Using Hybrid Trust Model for Handling Inaccurate Resource. Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi |
| 2009 | Using XACML for Embedded and Fine-Grained Access Control Policy. George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel |
| 2009 | Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. Javier Jiménez, Vicenç Torra |
| 2009 | Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. Collin Mulliner |
| 2009 | Web Service Trust: Towards a Dynamic Assessment Framework. George Spanoudakis, Stephane LoPresti |
| 2009 | Workflows in Dynamic and Restricted Delegation. Mehran Ahsant, Jim Basney |
| 2009 | Yet Another Sanitizable Signature from Bilinear Maps. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
| 2009 | hACMEgame: A Tool for Teaching Software Security. Øyvind Nerbråten, Lillian Røstad |