Security Mitigations for Return-Oriented Programming Attacks
Security Notions for Information Theoretically Secure Encryptions
Security of a biometric identity-based encryption scheme
Security of mobile agents: a new concept of the integrity protection
Security of public key cryptosystems based on Chebyshev Polynomials
Security of the Cao-Li Public Key Cryptosystem
Security Policy Enforcement Through Refinement Process
Security Policy Specification Using a Graphical Approach
Security Problems with Improper Implementations of Improved FEA-M
Security properties in an open peer-to-peer network
Security Risks and Modern Cyber Security Technologies for Corporate Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Survey of Internet Browsers Data Managers
Security Theorems via Model Theory
Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption
Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing
Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Seeing Beyond the Surface, Understanding and Tracking Fraudulent Cyber Activities
Selection of Model in Developing Information Security Criteria for Smart Grid Security System
Self Managed Security Cell, a security model for the Internet of Things and Services