1. On the choice of the appropriate AES data encryption method for ZigBee nodes. Issue 2 (7th December 2010) Authors: Ottoy, G.; Hamelinckx, T.; Preneel, B.; De Strycker, L.; Goemaere, J.‐P. Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 87 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. On providing sink anonymity for wireless sensor networks. Issue 2 (3rd December 2010) Authors: Ngai, Edith C.‐H. Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 77 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Secure Arithmetic Coding with Error Detection Capability. (19th September 2010) Authors: Sinaie, Mahnaz; Vakili, Vahid Tabataba Other Names: Magli Enrico Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. (11th October 2010) Authors: Suthaharan, Shan Other Names: Goljan Miroslav Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Reversible Watermarking Techniques: An Overview and a Classification. (14th June 2010) Authors: Caldelli, Roberto; Filippini, Francesco; Becarelli, Rudy Other Names: Huang Jiwu W. Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Reversible Watermarking Techniques: An Overview and a Classification. (14th June 2010) Authors: Caldelli, Roberto; Filippini, Francesco; Becarelli, Rudy Other Names: Huang Jiwu W. Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. GUC100 Multisensor Fingerprint Database for In-House (Semipublic) Performance Test. (5th September 2010) Authors: Gafurov, Davrondzhon; Bours, Patrick; Yang, Bian; Busch, Christoph Other Names: Dorizzi Bernadette Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2010(2010) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Recoverable Privacy Protection for Video Content Distribution. (10th January 2010) Authors: Li, Guangzhen; Ito, Yoshimichi; Yu, Xiaoyi; Nitta, Naoko; Babaguchi, Noboru Other Names: Senior Andrew Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2009(2009) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Recoverable Privacy Protection for Video Content Distribution. (10th January 2010) Authors: Li, Guangzhen; Ito, Yoshimichi; Yu, Xiaoyi; Nitta, Naoko; Babaguchi, Noboru Other Names: Senior Andrew Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2009(2009) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Compression Independent Reversible Encryption for Privacy in Video Surveillance. (8th February 2010) Authors: Carrillo, Paula; Kalva, Hari; Magliveras, Spyros Other Names: Senior Andrew Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2009(2009) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗