IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 290 - 303
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 223 - 233
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 273 - 289
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 234 - 246
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 213 - 222
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 317 - 330
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 137 - 152
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 203 - 212
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 259 - 272
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 304 - 316
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 183 - 191
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 192 - 202
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 153 - 165
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 331 - 338
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 166 - 172
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 247 - 258
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 173 - 182