1. Research of Spatial Domain Image Digital Watermarking Payload. (14th March 2011) Authors: Jia-Fa, Mao; Ru, Zhang; Xin-Xin, Niu; Yi-Xian, Yang; Lin-Na, Zhou Other Names: Steinebach Martin Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2011(2011) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions. (13th February 2011) Authors: Ntalianis, Klimis; Tsapatsoulis, Nicolas; Drigas, Athanasios Other Names: Vielhauer Claus Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2011(2011) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Binary Biometric Representation through Pairwise Adaptive Phase Quantization. (20th February 2011) Authors: Chen, Chun; Veldhuis, Raymond Other Names: Dorizzi Bernadette Academic Editor. Journal: EURASIP journal on information security Issue: Volume 2011(2011) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. Issue 2 (24th January 2011) Authors: Vossaert, Jan; Lapon, Jorn; De Decker, Bart; Naessens, Vincent Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 106 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. SCN‐SI‐021 achieving privacy and access control in pervasive computing environments. Issue 2 (8th February 2011) Authors: Magkos, Emmanouil; Kotzanikolaou, Panayiotis Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 94 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Steganography in IEEE 802.11 OFDM symbols1. Issue 2 (29th March 2011) Authors: Szczypiorski, Krzysztof; Mazurczyk, Wojciech Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 118 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Steganographic access control in data hiding using run‐length encoding and modulo‐operations. Issue 2 (16th June 2011) Authors: Lee, Chin‐Feng; Weng, Chi‐Yao; Sharma, Aneesh Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 139 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Optimizing resource and data security in shared sensor networks. Issue 2 (14th June 2011) Authors: Huygens, Christophe; Matthys, Nelson; Joosen, Wouter Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 149 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Privacy‐protected communication for location‐based services. Issue 2 (11th May 2011) Authors: Werner, Martin Journal: Security and communication networks Issue: Volume 9:Issue 2(2016) Page Start: 130 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. An Automated Signature Generation Approach for Polymorphic Worms Using Principal Component Analysis. Issue 2 (2011) Authors: Mohammed, Mohssen M. Z. E.; Chan, H. Anthony; Ventura, Neco Journal: International journal for information security research Issue: Volume 1:Issue 2(2011) Page Start: Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗