| 2009 | A chipset level network backdoor: bypassing host-based firewall & IDS. Sherri Sparks, Shawn Embleton, Cliff Changchun Zou |
| 2009 | A conceptual framework for Group-Centric secure information sharing. Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough |
| 2009 | A generic construction of useful client puzzles. Rui Zhang, Goichiro Hanaoka, Hideki Imai |
| 2009 | A new hash family obtained by modifying the SHA-2 family. Somitra Kumar Sanadhya, Palash Sarkar |
| 2009 | A note on Cook's elastic block cipher. Liting Zhang, Wenling Wu, Lei Zhang, Yanjun Li |
| 2009 | An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. Hai Huang, Zhenfu Cao |
| 2009 | An integrated approach to detection of fast and slow scanning worms. Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis |
| 2009 | Anonymous user communication for privacy protection in wireless metropolitan mesh networks. Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu |
| 2009 | Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. Bhavani Thuraisingham |
| 2009 | Attribute based proxy re-encryption with delegating capabilities. Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao |
| 2009 | Authenticated wireless roaming via tunnels: making mobile guests feel at home. Mark Manulis, Damien Leroy, François Koeune, Olivier Bonaventure, Jean-Jacques Quisquater |
| 2009 | Automatic discovery of botnet communities on large-scale communication networks. Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani |
| 2009 | Automating analysis of large-scale botnet probing events. Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson |
| 2009 | Conditional proxy re-encryption secure against chosen-ciphertext attack. Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
| 2009 | Confidentiality-preserving distributed proofs of conjunctive queries. Adam J. Lee, Kazuhiro Minami, Nikita Borisov |
| 2009 | D-algebra for composing access control policy decisions. Qun Ni, Elisa Bertino, Jorge Lobo |
| 2009 | Delegate predicate encryption and its application to anonymous authentication. Ribao Wei, Dingfeng Ye |
| 2009 | Efficient IRM enforcement of history-based access control policies. Fei Yan, Philip W. L. Fong |
| 2009 | Efficient zero-knowledge identification schemes which respect privacy. Julien Bringer, Hervé Chabanne, Thomas Icart |
| 2009 | Expressive policy analysis with enhanced system dynamicity. Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara |
| 2009 | Flexible muTPMs through disembedding. Klaus Kursawe, Dries Schellekens |
| 2009 | Formalizing information security knowledge. Stefan Fenz, Andreas Ekelhart |
| 2009 | Hidden credential retrieval from a reusable password. Xavier Boyen |
| 2009 | Improved searchable public key encryption with designated tester. Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee |
| 2009 | Intrusion response cost assessment methodology. Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong |
| 2009 | Lightweight self-protecting JavaScript. Phu H. Phung, David Sands, Andrey Chudnov |
| 2009 | Logging key assurance indicators in business processes. Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin |
| 2009 | On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
| 2009 | On-board credentials with open provisioning. Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala |
| 2009 | PBES: a policy based encryption system with application to data sharing in the power grid. Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf |
| 2009 | Partnership in key exchange protocols. Kazukuni Kobara, SeongHan Shin, Mario Strefler |
| 2009 | Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan |
| 2009 | Provably secure and efficient bounded ciphertext policy attribute based encryption. Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing |
| 2009 | Quantifying maximal loss of anonymity in protocols. Han Chen, Pasquale Malacaria |
| 2009 | Securing virtual machine monitors: what is needed? Paul A. Karger |
| 2009 | Semantic context aware security policy deployment. Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby |
| 2009 | The union-split algorithm and cluster-based anonymization of social networks. Brian Thompson, Danfeng Yao |
| 2009 | TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. Khalid Elbadawi, Ehab Al-Shaer |
| 2009 | Toward practical analysis for trust management policy. Mark Reith, Jianwei Niu, William H. Winsborough |
| 2009 | Towards complete node enumeration in a peer-to-peer botnet. Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
| 2009 | Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary. Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
| 2009 | Universal forgery of the identity-based sequential aggregate signature scheme. Jung Yeon Hwang, Dong Hoon Lee, Moti Yung |
| 2009 | Universally composable contributory group key exchange. M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |