Steganography in Handling Oversized IP Packets
Steganography: a class of secure and robust algorithms
Stegobot: construction of an unobservable communication network leveraging social behavior
Stimulating Cooperation in Self-Organized Vehicular Networks
Stochastic Games for Security in Networks with Interdependent Nodes
STor: Social Network based Anonymous Communication in Tor
STP/HAMPI and Computer Security
Stream cipher based on quasigroup string transformations in $Z_p^*$
Stream Control Transmission Protocol Steganography
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
Stronger Enforcement of Security Using AOP and Spring AOP
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks
Strongly secure ramp secret sharing schemes for general access structures
Studying and Classification of the Most Significant Malicious Software
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
Successful attack on PPM-based neural cryptography
Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
Symbian `vulnerability' and Mobile Threats