АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Fail-stop signature schemeFailure to acquireFair blind signature schemeFalse accept rateFalse match rateFalse negativeFalse non-match rateFalse positiveFalse reject rateFalse-negative identification rate, FNIR; FNIR (N, R, T)False-positive identification rate, FPIR; FPIR (N, T)Faulttolerant systemFeed forward neural network (FFNN)Feistel schemeFile integrity monitoringFiltering functionFirewallForgeryFork bombFormat preserving encryption (FPE)Forward secrecy with respect to both entity A and entity B individuallyForward secrecy with respect to both entity A and entity B individuallyForward secrecy with respect to entity AFraud management system (FMS)FrequencyFrequency cryptanalysisFrequency testFull disk encryptionFunction with interdictionsFunction-to-function distanceFunctional objectFuzzing, fuzz testing