1. Comment on 'Targeted Ciphers for Format‐Preserving Encryption' from Selected Areas in Cryptography 2018. (2nd May 2021) Authors: Wang, Dachao; Wang, Baocang; Ping, Yuan Journal: IET information security Issue: Volume 15:Number 5(2021) Page Start: 395 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Homomorphic signcryption with public plaintext‐result checkability. (2nd May 2021) Authors: Li, Shimin; Liang, Bei; Mitrokotsa, Aikaterini; Xue, Rui Journal: IET information security Issue: Volume 15:Number 5(2021) Page Start: 333 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Guest Editorial. Issue 5 (1st September 2016) Authors: Mentens, Nele; Sauveron, Damien; Sierra, José M.; Wang, Shiuh‐Jeng; Woungang, Isaac Journal: IET information security Issue: Volume 10:Issue 5(2016) Page Start: 223 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Towards practical intrusion detection system over encrypted traffic. (21st March 2021) Authors: Canard, Sébastien; Li, Chaoyun Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 231 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment. (1st April 2021) Authors: Shukla, Shivangi; Patel, Sankita J. Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 256 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes. (23rd March 2021) Authors: Mitchell, Chris J Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 223 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures. (10th April 2021) Authors: Baldimtsi, Foteini; Kiayias, Aggelos; Samari, Katerina Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 205 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC. (17th March 2021) Authors: Li, Manman; Chen, Shaozhen Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 247 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. User‐friendly XOR‐based visual secret sharing by random grid. (1st September 2018) Authors: Fan, Tzuo‐Yau; Chao, Her‐Chang Journal: IET information security Issue: Volume 12:Number 5(2018) Page Start: 398 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. (1st September 2018) Authors: Yang, Dong; Qi, Wen‐Feng; Chen, Hua‐Jin Journal: IET information security Issue: Volume 12:Number 5(2018) Page Start: 419 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗