Formal security analysis of registration protocols for interactive systems: a methodology and a case of study
Formal Verification of Differential Privacy for Interactive Systems
Formalization of malware through process calculi
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Software Requirements Specification Document
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document
Full Restoration of Visual Encrypted Color Images
Fully Countering Trusting Trust through Diverse Double-Compiling
Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with State Security
Functional Programming and Security
Further Results on the Distinctness of Decimations of l-sequences
Fusion Discrete Logarithm Problems
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Fuzzy Private Matching (Extended Abstract)
Gaming security by obscurity