IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 255 - 268
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 240 - 254
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 201 - 214
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 288 - 299
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 349 - 353
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 324 - 336
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 354 - 358
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 215 - 224
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 225 - 239
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 337 - 348
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 280 - 287
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 269 - 279
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 300 - 313
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 314 - 323