| 2009 | A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz |
| 2009 | Algebraic Attacks on RFID Protocols. Ton van Deursen, Sasa Radomirovic |
| 2009 | Anti-counterfeiting Using Memory Spots. Helen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison |
| 2009 | Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich |
| 2009 | Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater |
| 2009 | Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. J. A. M. Naranjo, Juan Antonio López-Ramos, Leocadio G. Casado |
| 2009 | Measurement Analysis When Benchmarking Java Card Platforms. Pierre Paradinas, Julien Cordry, Samia Bouzefrane |
| 2009 | On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra |
| 2009 | On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. Olivier Heen, Gilles Guette, Thomas Genet |
| 2009 | PKIX Certificate Status in Hybrid MANETs. Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau |
| 2009 | Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. Hendrik Tews, Bart Jacobs |
| 2009 | Privacy-Aware Location Database Service for Granular Queries. Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima |
| 2009 | Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. Keith M. Martin, Maura B. Paterson |