1. Information security breaches survey : technical report.: technical report. (2015) Other Names: Great Britain., Department for Business, Innovation & Skills.; PricewaterhouseCoopers LLP.; Infosecurity Europe (Conference) Record Type: Journal Issue Extent: View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Information security breaches survey : technical report.: technical report. (2013) Other Names: Great Britain., Department for Business, Innovation & Skills.; PricewaterhouseCoopers LLP.; Infosecurity Europe (Conference) Record Type: Journal Issue Extent: View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Information security breaches survey : technical report.: technical report. (2014) Other Names: Great Britain., Department for Business, Innovation & Skills.; PricewaterhouseCoopers LLP.; Infosecurity Europe (Conference) Record Type: Journal Issue Extent: View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Information security breaches survey : technical report.: technical report. (2012) Other Names: Great Britain., Department for Business, Innovation & Skills.; PricewaterhouseCoopers LLP.; Infosecurity Europe (Conference) Record Type: Journal Issue Extent: View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Comment on 'Targeted Ciphers for Format‐Preserving Encryption' from Selected Areas in Cryptography 2018. (2nd May 2021) Authors: Wang, Dachao; Wang, Baocang; Ping, Yuan Journal: IET information security Issue: Volume 15:Number 5(2021) Page Start: 395 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Homomorphic signcryption with public plaintext‐result checkability. (2nd May 2021) Authors: Li, Shimin; Liang, Bei; Mitrokotsa, Aikaterini; Xue, Rui Journal: IET information security Issue: Volume 15:Number 5(2021) Page Start: 333 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Guest Editorial. Issue 5 (1st September 2016) Authors: Mentens, Nele; Sauveron, Damien; Sierra, José M.; Wang, Shiuh‐Jeng; Woungang, Isaac Journal: IET information security Issue: Volume 10:Issue 5(2016) Page Start: 223 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Towards practical intrusion detection system over encrypted traffic. (21st March 2021) Authors: Canard, Sébastien; Li, Chaoyun Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 231 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment. (1st April 2021) Authors: Shukla, Shivangi; Patel, Sankita J. Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 256 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes. (23rd March 2021) Authors: Mitchell, Chris J Journal: IET information security Issue: Volume 15:Number 3(2021) Page Start: 223 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗