| 2009 | A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi |
| 2009 | A Framework for Authenticated Key Exchange in the Standard Model. Shuhua Wu, Yuefei Zhu |
| 2009 | A Hybrid E-Voting Scheme. Kun Peng |
| 2009 | A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization. Shaomin Zhu, Jianming Liu |
| 2009 | Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu |
| 2009 | An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang |
| 2009 | An Extended Authentication and Key Agreement Protocol of UMTS. Farshid Farhat, Somayeh Salimi, Ahmad Salahi |
| 2009 | Analysing Protocol Implementations. Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven |
| 2009 | Certificateless Hybrid Signcryption. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
| 2009 | Defending against the Pirate Evolution Attack. Hongxia Jin, Jeffrey B. Lotspiech |
| 2009 | Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. Guifang Huang, Dongdai Lin, Yanshuo Zhang |
| 2009 | Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker |
| 2009 | Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng |
| 2009 | Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. Hongbo Yu, Xiaoyun Wang |
| 2009 | Hash-Based Key Management Schemes for MPEG4-FGS. Mohamed Karroumi, Ayoub Massoudi |
| 2009 | Implementing IDS Management on Lock-Keeper. Feng Cheng, Sebastian Roschke, Christoph Meinel |
| 2009 | Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings Feng Bao, Hui Li, Guilin Wang |
| 2009 | Measuring Anonymity. Xiaojuan Cai, Yonggen Gu |
| 2009 | Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. Ewan Fleischmann, Michael Gorski, Stefan Lucks |
| 2009 | Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. Ewan Fleischmann, Michael Gorski, Stefan Lucks |
| 2009 | New Constructions for Reusable, Non-erasure and Universally Composable Commitments. Huafei Zhu |
| 2009 | On Non-representable Secret Sharing Matroids. Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu |
| 2009 | On the Correctness of an Approach against Side-Channel Attacks. Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang |
| 2009 | On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. Jianhong Zhang |
| 2009 | Preimage Attack on Hash Function RIPEMD. Gaoli Wang, Shaohui Wang |
| 2009 | RSA-Based Certificateless Public Key Encryption. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou |
| 2009 | Ranking Attack Graphs with Graph Neural Networks. Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi |
| 2009 | Reconstructing a Packed DLL Binary for Static Analysis. Xianggen Wang, Dengguo Feng, Purui Su |
| 2009 | Secret Handshake: Strong Anonymity Definition and Construction. Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta |
| 2009 | Security Specification for Conversion Technologies of Heterogeneous DRM Systems. Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won |
| 2009 | Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su |
| 2009 | Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang |
| 2009 | Strongly Unforgeable ID-Based Signatures without Random Oracles. Chifumi Sato, Takeshi Okamoto, Eiji Okamoto |
| 2009 | Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy |
| 2009 | Twister- A Framework for Secure and Fast Hash Functions. Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks |