Experimenting with the Novel Approaches in Text Steganography
Explicit formulas for efficient multiplication in F_{3^{6m}}
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Exploring Linkablility of Community Reviewing
Expressing Security Properties Using Selective Interleaving Functions
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing
Extending the Trusted Path in Client-Server Interaction
Extending WS-Security to Implement Security Protocols for Web Services
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)
Failure of A Mix Network
Fair Exchange in Strand Spaces
Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks
FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities
Faked states attack and quantum cryptography protocols
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions
Fast generators for the Diffie-Hellman key agreement protocol and malicious standards
Fast, parallel and secure cryptography algorithm using Lorenz's attractor