SPAM -- Technological and Legal Aspects
Spam filter analysis
SPAM over Internet Telephony and how to deal with it
Specification and Verification of Side Channel Declassification
Specifying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects
Spectral Estimation Methods Comparison and Performance Analysis on a Steganalysis Application
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
SQL/JavaScript Hybrid Worms As Two-stage Quines
SSA-Caterpillar in Group Anonymity
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems
State Of The Art In Digital Steganography Focusing ASCII Text Documents
State Space Reduction in the Maude-NRL Protocol Analyzer
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
Stealth-MITM DoS Attacks on Secure Channels
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
Steganographic Codes -- a New Problem of Coding Theory
Steganographic Routing in Multi Agent System Environment
Steganography An Art of Hiding Data
Steganography and Steganalysis: Different Approaches
Steganography from weak cryptography