Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable
Faults and Improvements of an Enhanced Remote User Authentication Scheme Using Smart Cards
FauxCrypt - A Method of Text Obfuscation
Fighting Online Click-Fraud Using Bluff Ads
Final Architecture Specification of security, privacy, and incentive mechanisms
Finding low-weight polynomial multiples using discrete logarithm
Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations
Finding passwords by random walks: How long does it take?
Finding Traitors in Secure Networks Using Byzantine Agreements
Fine-Grain Authorization for Resource Management in the Grid Environment
Fine-Grained Authorization for Job Execution in the Grid: Design and Implementation
Fingerprint Recognition Using Minutia Score Matching
Fingerprint Verification based on Gabor Filter Enhancement
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Firewall Configuration Errors Revisited
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
Flexible Authentication in Vehicular Ad hoc Networks
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
Formal Analysis of UMTS Privacy
Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications