Search results for: . .
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1299 - 1314
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1289 - 1298
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1262 - 1273
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 498 - 506
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 626 - 639
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 69 - 78
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 6 > 999 - 1014
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 9 > 1380 - 1393
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 12 > 2205 - 2219
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 4 > 645 - 652
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1541 - 1553
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 9 > 1469 - 1481
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 657 - 668
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 4 > 636 - 645
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 6 > 963 - 972
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 216 - 228
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 1 > 260 - 267
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 2 > 613 - 624
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 346 - 350
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 1-2 > 283 - 296