| 2009 | A Chaos based Encryption Method using Dynamical Systems with Strange Attractors. S. Arash Sheikholeslam |
| 2009 | A New Analysis of RC4 - A Data Mining Approach (J48). Mohsen Hajsalehi Sichani, Ali Movaghar |
| 2009 | A New Image Encryption Algorithm using Cellular Automata. Mayank Varshney, Dipanwita Roy Chowdhury |
| 2009 | A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. Shiwei Chen, Chenhui Jin |
| 2009 | A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review. Andreas Wiesauer, Johannes Sametinger |
| 2009 | A Traffic Coherence Analysis Model for DDoS Attack Detection. Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
| 2009 | Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks. A. M. Hamad, Walid I. Khedr |
| 2009 | Adaptive Antennas in Wireless Communication Networks. Blagovest Shishkov |
| 2009 | Adding Expert Knowledge to TAN-based Intrusion Detection Systems. Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias |
| 2009 | An Alternative Approach for Formula Modelling in Security Metrics. Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes |
| 2009 | An Anomaly-based Web Application Firewall. Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
| 2009 | An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. Anton Romanov, Eiji Okamoto |
| 2009 | An Efficient Group Key Agreement Protocol for Heterogeneous Environment. Mounita Saha, Dipanwita Roy Chowdhury |
| 2009 | An Offline Peer-to-peer Broadcasting Scheme with Anonymity. Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin |
| 2009 | Assessment of Mobile Security Platforms. Germán Retamosa, Jorge E. López de Vergara |
| 2009 | Attack Graph Generation with Infused Fuzzy Clustering. Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh |
| 2009 | Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. Young-Jun Heo, Jintae Oh, Jongsoo Jang |
| 2009 | Certified Pseudonyms Colligated with Master Secret Key. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
| 2009 | Cloud Computing - Fundamental Architecture & Future Applications. Frank Leymann |
| 2009 | Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier |
| 2009 | Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos |
| 2009 | Efficient Traitor Tracing for Content Protection. Hongxia Jin |
| 2009 | Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN. Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes |
| 2009 | Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. Peng Yang, Yuanchen Ma, Satoshi Yoshizawa |
| 2009 | Finger Vein Verification Technology for Mobile Apparatus. Hideo Sato |
| 2009 | Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration. Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez, José Luis Redondo García |
| 2009 | ISEE: An Information Security Engineering Environment. Jingde Cheng, Yuichi Goto, Daisuke Horie |
| 2009 | Identifying Security Elements for Cooperative Information Systems. Nathalie Dagorn |
| 2009 | Implementing True Random Number Generators in FPGAs by Chip Filling. Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi |
| 2009 | Information-theoretically Secure Strong Verifiable Secret Sharing. Changlu Lin, Lein Harn, Dingfeng Ye |
| 2009 | Interactive Secret Share Management. Constantin Catalin Dragan |
| 2009 | Iterated Transformations and Quantitative Metrics for Software Protection. Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
| 2009 | Managing Security of Grid Architecture with a Grid Security Operation Center. Julien Bourgeois, Syed Raheel Hassan |
| 2009 | Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim |
| 2009 | Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. Tord Ingolf Reistad |
| 2009 | Network Stack Optimization for Improved IPsec Performance on Linux. Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos |
| 2009 | Nmix: An Ideal Candidate for Key Mixing. Jaydeb Bhaumik, Dipanwita Roy Chowdhury |
| 2009 | On the Need to Divide the Signature Creation Environment. Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
| 2009 | On the Security of Adding Confirmers into Designated Confirmer Signatures. Wataru Senga, Hiroshi Doi |
| 2009 | On the Security of Two Ring Signcryption Schemes. S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
| 2009 | One-touch Financial Transaction Authentication. Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar |
| 2009 | Phishpin: An Integrated, Identity-based Anti-phishing Approach. Hicham Tout |
| 2009 | Practical Traceable Anonymous Identification. Daniel Slamanig, Peter Schartner, Christian Stingl |
| 2009 | Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani |
| 2009 | Protecting Information Privacy in the Electronic Society. Pierangela Samarati |
| 2009 | Quantum Secure Direct Communication using Entanglement and Super Dense Coding. Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury |
| 2009 | RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. Michael Hutter |
| 2009 | Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management. Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini |
| 2009 | Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. Guanhan Chew, Aileen Zhang, Khoongming Khoo |
| 2009 | SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications Eduardo Fernández-Medina, Manu Malek, Javier Hernando |
| 2009 | Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks. Leonardo Ribeiro, Guerra Ruy |
| 2009 | Security Patterns, Towards a Further Level. Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano |
| 2009 | Service and Timeframe Dependent Unlinkable One-time Pseudonyms. Kristof Verslype, Bart De Decker |
| 2009 | Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica |
| 2009 | The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher. Magdy Saeb |
| 2009 | The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. Nicolas T. Courtois |
| 2009 | Throttling DDoS Attacks. Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais |
| 2009 | Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle |
| 2009 | Universal Authentication Framework - Requirements and Phase Design. Jan Hajny, Tomas Pelka, Petra Lambertova |
| 2009 | Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development. Mirad Zadic, Andrea Nowak |
| 2009 | Web 2.0: A Buzzword, a Serious Development, just Fun, or What? Gottfried Vossen |
| 2009 | e-Business Design - A Shift to Adaptability. David A. Marca |