| 2009 | A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]. Gunmeet Singh, Sarbjeet Singh |
| 2009 | A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. Zhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang |
| 2009 | A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach. Mitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref |
| 2009 | A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. Yi-Ruei Chen, Wen-Guey Tzeng |
| 2009 | A User Trust-Based Collaborative Filtering Recommendation Algorithm. Fuzhi Zhang, Long Bai, Feng Gao |
| 2009 | A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. Wenbo Mao |
| 2009 | Adaptive and Composable Oblivious Transfer Protocols (Short Paper). Huafei Zhu, Feng Bao |
| 2009 | An Image Sanitizing Scheme Using Digital Watermarking. Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai |
| 2009 | Architecture- and OS-Independent Binary-Level Dynamic Test Generation. Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang |
| 2009 | Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence. Tomas Olsson |
| 2009 | Biometric-Based Non-transferable Anonymous Credentials. Marina Blanton, William M. P. Hudelson |
| 2009 | Bring Efficient Connotation Expressible Policies to Trust Management. Yan Zhang, Zhengde Zhai, Dengguo Feng |
| 2009 | Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining. Xin-Jing Ge, Jianming Zhu |
| 2009 | Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao |
| 2009 | Denial-of-Service Attacks on Host-Based Generic Unpackers. Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia |
| 2009 | Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi |
| 2009 | Deterministic Finite Automata Characterization for Memory-Based Pattern Matching. Lucas Vespa, Ning Weng |
| 2009 | Digital Audio Watermarking Technique Using Pseudo-Zernike Moments. Xiangyang Wang, Tianxiao Ma, Panpan Niu |
| 2009 | Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang |
| 2009 | Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng |
| 2009 | Fingerprinting Attack on the Tor Anonymity System. Yi Shi, Kanta Matsuura |
| 2009 | GUC-Secure Join Operator in Distributed Relational Database. Yuan Tian, Hao Zhang |
| 2009 | Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger |
| 2009 | How to Steal a Botnet and What Can Happen When You Do. Richard A. Kemmerer |
| 2009 | Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings Sihan Qing, Chris J. Mitchell, Guilin Wang |
| 2009 | IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. Ping Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie |
| 2009 | Measuring Information Flow in Reactive Processes. Chunyan Mu |
| 2009 | Online/Offline Ring Signature Scheme. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou |
| 2009 | Policy-Controlled Signatures. Pairat Thorncharoensri, Willy Susilo, Yi Mu |
| 2009 | Predictive Pattern Matching for Scalable Network Intrusion Detection. Lucas Vespa, Mini Mathew, Ning Weng |
| 2009 | Proactive Verifiable Linear Integer Secret Sharing Scheme. Chuangui Ma, Xiaofei Ding |
| 2009 | Public Key Encryption without Random Oracle Made Truly Practical. Puwen Wei, Xiaoyun Wang, Yuliang Zheng |
| 2009 | Secure Remote Execution of Sequential Computations. Ghassan Karame, Mario Strasser, Srdjan Capkun |
| 2009 | Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang |
| 2009 | Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. Yang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta |
| 2009 | TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao |
| 2009 | The rakaposhi Stream Cipher. Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara |
| 2009 | Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen |
| 2009 | User-Assisted Host-Based Detection of Outbound Malware Traffic. Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, Danfeng Yao |
| 2009 | Using the (Open) Solaris Service Management Facility as a Building Block for System Security. Christoph L. Schuba |