| 2009 | A Novel Architecture for Secure and Scalable Multicast over IP Network. Yawen Wei, Zhen Yu, Yong Guan |
| 2009 | Aggregated Authentication (AMAC) Using Universal Hash Functions. Wassim Znaidi, Marine Minier, Cédric Lauradoux |
| 2009 | An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures. Yi Yang, Sencun Zhu, Guohong Cao, Thomas La Porta |
| 2009 | An Eavesdropping Game with SINR as an Objective Function. Andrey Garnaev, Wade Trappe |
| 2009 | Automated Classification of Network Traffic Anomalies. Guilherme Fernandes, Philippe Owezarski |
| 2009 | Baiting Inside Attackers Using Decoy Documents. Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo |
| 2009 | Breaking and Building of Group Inside Signature. S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, C. Pandu Rangan |
| 2009 | Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games. William Kozma, Loukas Lazos |
| 2009 | Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. Shucheng Yu, Kui Ren, Wenjing Lou, Jin Li |
| 2009 | Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. Mansoor Alicherry, Angelos D. Keromytis, Angelos Stavrou |
| 2009 | Ensemble: Community-Based Anomaly Detection for Popular Applications. Feng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash |
| 2009 | FIJI: Fighting Implicit Jamming in 802.11 WLANs. Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Leandros Tassiulas |
| 2009 | Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets. Magdalena Payeras-Capellà, Macià Mut Puigserver, Andreu-Pere Isern-Deyà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
| 2009 | Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao |
| 2009 | MULAN: Multi-Level Adaptive Network Filter. Shimrit Tzur-David, Danny Dolev, Tal Anker |
| 2009 | Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages. Liang Cai, Gabriel Maganis, Hui Zang, Hao Chen |
| 2009 | Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks. Toni Perkovic, Ivo Stancic, Luka Malisa, Mario Cagalj |
| 2009 | On the Security of Bottleneck Bandwidth Estimation Techniques. Ghassan Karame, David Gubler, Srdjan Capkun |
| 2009 | Reliable Resource Searching in P2P Networks. Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, Nikos Triandopoulos |
| 2009 | Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. Aravind Venkataraman, Raheem A. Beyah |
| 2009 | Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN. Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, Luigi V. Mancini |
| 2009 | Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers Yan Chen, Tassos Dimitriou, Jianying Zhou |
| 2009 | Self-organized Anonymous Authentication in Mobile Ad Hoc Networks. Julien Freudiger, Maxim Raya, Jean-Pierre Hubaux |
| 2009 | The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim |
| 2009 | Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. Thanassis Tiropanis, Tassos Dimitriou |
| 2009 | User-Centric Identity Using Martijn Oostdijk, Dirk-Jan van Dijk, Maarten Wegdam |
| 2009 | Using Failure Information Analysis to Detect Enterprise Zombies. Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen |