Shannon Entropy based Randomness Measurement and Test for Image Encryption
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
Sharing Graphs
Sharing secret color images using cellular automata with memory
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
Short collusion-secure fingerprint codes against three pirates
Shoulder Surfing attack in graphical password authentication
Show Me Your Cookie And I Will Tell You Who You Are
Side-channel attack on labeling CAPTCHAs
Side-Channel Oscilloscope
Signcryption scheme based on schnorr digital signature
Simple and Efficient Contract Signing Protocol
Simple Cellular Automata-Based Linear Models for the Shrinking Generator
Simulating Cyber-Attacks for Fun and Profit
Simulation of Computer Network Attacks
Small Private Circuits
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
SOA-based security governance middleware
SocialFilter: Collaborative Spam Mitigation using Social Networks
Soft Computing - A step towards building Secure Cognitive WLAN