Fine-Grained Authorization for Job Execution in the Grid: Design and Implementation
Fingerprint Recognition Using Minutia Score Matching
Fingerprint Verification based on Gabor Filter Enhancement
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Firewall Configuration Errors Revisited
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
Flexible Authentication in Vehicular Ad hoc Networks
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
Formal Analysis of UMTS Privacy
Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications
Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
Formal Verification of Differential Privacy for Interactive Systems
Formalization of malware through process calculi
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Software Requirements Specification Document
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document