3. Lijuan Zheng, Zhen Han, Rui Zhang. Provably Secure Access Authentication Protocol under Universal Network. The 2nd International Symposium on Knowledge Acquisition and Modeling, Nov.29-Dec.2, 2009. pp.371-374.ISBN:978-0-7695-2348-X。
4. PENG Shuanghe , HAN Zhen, Design and Implementation of Portable TPM Device Driver based on Extensible Firmware Interface, 2009 International Conference on Multimedia Information Networking and Security, pp342-345, 2009,11. Conference Date: Nov.18-20, 2009, Wuhan,China.
5. Lijuan Zheng, Zhen Han, Rui Zhang. Authenticated Key Distribution Protocol in Universal Network. First International Conference on Future Information Networks, Oct.15-17,2009.pp.201 -208.ISBN:978-4244-5160-9
7. Yanfang Fan, Zhen Han, Yong Zhao, Jiqiang Liu. A Mandatory Access Control Model with Enhanced Flexibility. The 2009 International Conference on Multimedia Information Networking and Security. ISBN:978-0-7695-3843-3.17 – 20 November 2009,Wuhan, China.Page:120-124.
8. Lei Han, Jiqiang Liu, Dawei Zhang, Zhen Han, and Xueye Wei, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI,PP140-143, International Conference on Multimedia Information Networking and Security, PP140-143,2009 .11
9. Yao Qi, Liu Ji-Qiang, Han Zhen, Shen Chang-Xiang, Research on Linux network packet buffer recycling toward multi-core processor, Vol.30, No.9, PP102-108,2009.9(EI:20094512433348)
11. Yongzhong He, Zhen Han, User Authentication with Provable Security against Online Dictionary Attacks, Journal of Networks ,pp 200-207, 2009-5
12. Yongzhong He, Zhen Han,Usage Control in Conditional Access System with Malicious Set-Top Box,The 2009 International Conference on Security and Management,2009,201-205。