Stream cipher based on quasigroup string transformations in $Z_p^*$
Stream Control Transmission Protocol Steganography
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
Stronger Enforcement of Security Using AOP and Spring AOP
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks
Strongly secure ramp secret sharing schemes for general access structures
Studying and Classification of the Most Significant Malicious Software
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
Successful attack on PPM-based neural cryptography
Suggested Rules for Designing Secure Communication Systems Utilizing Chaotic Lasers: A Survey
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
Symbian `vulnerability' and Mobile Threats
Symbolic Protocol Analysis for Diffie-Hellman
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
Synthesis of Binary k-Stage Machines
Synthesis of Parallel Binary Machines