Security techniques | IET Conference Publication | IEEE Xplore