Simulating Cyber-Attacks for Fun and Profit
Simulation of Computer Network Attacks
Small Private Circuits
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
SOA-based security governance middleware
SocialFilter: Collaborative Spam Mitigation using Social Networks
Soft Computing - A step towards building Secure Cognitive WLAN
Soft Computing Models for Network Intrusion Detection Systems
Soft Constraint Programming to Analysing Security Protocols
Solutions to the GSM Security Weaknesses
Solving the LPN problem in cube-root time
Some A Priori Torah Decryption Principles
Some Applications of Directed Signature Scheme
Some Aspects of Quantum Cryptography and Network Security
Some Important Aspects of Source Location Protection in Globally Attacked Sensor Networks
Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
SOSEMANUK: a fast software-oriented stream cipher
Space Efficient Secret Sharing
Space Efficient Secret Sharing: A Recursive Approach