A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
A Dynamic ID-based Remote User Authentication Scheme
A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span
A fast algorithm for determining the linear complexity of periodic sequences
A Fast Image Encryption Scheme based on Chaotic Standard Map
A Fault Analytic Method against HB+
A Flexible and Secure Remote Systems Authentication Scheme Using Smart Cards
A formal definition and a new security mechanism of physical unclonable functions
A Formal Foundation for XrML
A formal methodology for integral security design and verification of network protocols
A framework for compositional verification of security protocols
A Frequency Domain Steganography using Z Transform (FDSZT)
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
A Fuzzy Commitment Scheme
A General Approach for Securely Querying and Updating XML Data
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
A generic attack to ciphers
A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks