Security Policy Specification Using a Graphical Approach
Security Problems with Improper Implementations of Improved FEA-M
Security properties in an open peer-to-peer network
Security Risks and Modern Cyber Security Technologies for Corporate Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Survey of Internet Browsers Data Managers
Security Theorems via Model Theory
Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Seeing Beyond the Surface, Understanding and Tracking Fraudulent Cyber Activities
Selection of Model in Developing Information Security Criteria for Smart Grid Security System
Self Managed Security Cell, a security model for the Internet of Things and Services
Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
Self-Organized Authentication in Mobile Ad-hoc Networks
Self-Partial and Dynamic Reconfiguration Implementation for AES using FPGA
Selling train tickets by SMS
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices
Sending Hidden Data via Google Suggest
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems