Self-Organized Authentication Architecture for Mobile Ad-hoc Networks
Self-Organized Authentication in Mobile Ad-hoc Networks
Self-Partial and Dynamic Reconfiguration Implementation for AES using FPGA
Selling train tickets by SMS
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices
Sending Hidden Data via Google Suggest
Service Oriented Architecture in Network Security - a novel Organisation in Security Systems
Shannon Entropy based Randomness Measurement and Test for Image Encryption
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
Sharing Graphs
Sharing secret color images using cellular automata with memory
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
Short collusion-secure fingerprint codes against three pirates
Shoulder Surfing attack in graphical password authentication
Show Me Your Cookie And I Will Tell You Who You Are
Side-channel attack on labeling CAPTCHAs
Side-Channel Oscilloscope
Signcryption scheme based on schnorr digital signature
Simple and Efficient Contract Signing Protocol
Simple Cellular Automata-Based Linear Models for the Shrinking Generator