Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)
Failure of A Mix Network
Fair Exchange in Strand Spaces
Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks
FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities
Faked states attack and quantum cryptography protocols
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Fast, parallel and secure cryptography algorithm using Lorenz's attractor
Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable
Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
FauxCrypt - A Method of Text Obfuscation
Fighting Online Click-Fraud Using Bluff Ads
Final Architecture Specification of security, privacy, and incentive mechanisms
Finding low-weight polynomial multiples using discrete logarithm
Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations
Finding passwords by random walks: How long does it take?
Finding Traitors in Secure Networks Using Byzantine Agreements
Fine-Grain Authorization for Resource Management in the Grid Environment