A Fast Image Encryption Scheme based on Chaotic Standard Map
A Fault Analytic Method against HB+
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards
A formal definition and a new security mechanism of physical unclonable functions
A Formal Foundation for XrML
A formal methodology for integral security design and verification of network protocols
A framework for compositional verification of security protocols
A Frequency Domain Steganography using Z Transform (FDSZT)
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
A Fuzzy Commitment Scheme
A General Approach for Securely Querying and Updating XML Data
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
A generic attack to ciphers
A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks
A Graphical Password Based System for Small Mobile Devices
A Group Signature Based Electronic Toll Pricing System
A Hash of Hash Functions
A Holistic Approach to Securing Web Applications
A Key Distribution Scheme for Sensor Networks Using Structured Graphs
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge