Soft Computing Models for Network Intrusion Detection Systems
Soft Constraint Programming to Analysing Security Protocols
Solutions to the GSM Security Weaknesses
Solving the LPN problem in cube-root time
Some A Priori Torah Decryption Principles
Some Applications of Directed Signature Scheme
Some Aspects of Quantum Cryptography and Network Security
Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks
Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
SOSEMANUK: a fast software-oriented stream cipher
Space Efficient Secret Sharing
Space Efficient Secret Sharing: A Recursive Approach
SPAM -- Technological and Legal Aspects
Spam filter analysis
SPAM over Internet Telephony and how to deal with it
Specification and Verification of Side Channel Declassification
Specifying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects
Spectral Estimation Methods Comparison and Performance Analysis on a Steganalysis Application
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher