| 2009 | A Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh |
| 2009 | A Calculus to Detect Guessing Attacks. Bogdan Groza, Marius Minea |
| 2009 | A New Approach to Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
| 2009 | A New Construction of Boolean Functions with Maximum Algebraic Immunity. Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li |
| 2009 | A Storage Efficient Redactable Signature in the Standard Model. Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi |
| 2009 | Adding Trust to P2P Distribution of Paid Content. Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein |
| 2009 | An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. Gildas Avoine, Aslan Tchamkerten |
| 2009 | Analysis and Optimization of Cryptographically Generated Addresses. Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux |
| 2009 | Automated Spyware Collection and Analysis. Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
| 2009 | Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl |
| 2009 | Combining Consistency and Confidentiality Requirements in First-Order Databases. Joachim Biskup, Lena Wiese |
| 2009 | Detection of Database Intrusion Using a Two-Stage Fuzzy System. Suvasini Panigrahi, Shamik Sural |
| 2009 | Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao |
| 2009 | F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. Matthew Burnside, Angelos D. Keromytis |
| 2009 | Fair E-Cash: Be Compact, Spend Faster. Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud |
| 2009 | Generic Construction of Stateful Identity Based Encryption. Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai |
| 2009 | HMAC without the "Second" Key. Kan Yasuda |
| 2009 | Hardware-Assisted Application-Level Access Control. Yu-Yuan Chen, Ruby B. Lee |
| 2009 | Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna |
| 2009 | Iris Recognition in Nonideal Situations. Kaushik Roy, Prabir Bhattacharya |
| 2009 | MAC Precomputation with Applications to Secure Memory. Juan A. Garay, Vladimir Kolesnikov, Rae McLellan |
| 2009 | Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Yu Sasaki |
| 2009 | Nonce Generators and the Nonce Reset Problem. Erik Zenner |
| 2009 | On Free-Start Collisions and Collisions for TIB3. Florian Mendel, Martin Schläffer |
| 2009 | On the Security of Identity Based Ring Signcryption Schemes. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
| 2009 | Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. Mirco Marchetti, Michele Messori, Michele Colajanni |
| 2009 | Practical Algebraic Attacks on the Hitag2 Stream Cipher. Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
| 2009 | Privacy-Aware Attribute-Based Encryption with User Accountability. Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan |
| 2009 | Risks of the CardSpace Protocol. Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan |
| 2009 | Robust Authentication Using Physically Unclonable Functions. Keith B. Frikken, Marina Blanton, Mikhail J. Atallah |
| 2009 | SISR - A New Model for Epidemic Spreading of Electronic Threats. Boris Rozenberg, Ehud Gudes, Yuval Elovici |
| 2009 | Secure Interoperation in Multidomain Environments Employing UCON Policies. Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
| 2009 | Security Analysis of the PACE Key-Agreement Protocol. Jens Bender, Marc Fischlin, Dennis Kügler |
| 2009 | Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
| 2009 | Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Mario Lamberger, Florian Mendel |
| 2009 | Towards Security Notions for White-Box Cryptography. Amitabh Saxena, Brecht Wyseur, Bart Preneel |
| 2009 | Towards Trustworthy Delegation in Role-Based Access Control Model. Manachai Toahchoodee, Xing Xie, Indrakshi Ray |
| 2009 | Towards Unifying Vulnerability Information for Attack Graph Construction. Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel |
| 2009 | Traitor Tracing without A Priori Bound on the Coalition Size. Hongxia Jin, Serdar Pehlivanoglu |