IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1355 - 1369
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1370 - 1381
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1223 - 1232
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1275 - 1286
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1259 - 1274
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1248 - 1258
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1404 - 1417
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1214 - 1222
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1432 - 1444
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1233 - 1247
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1382 - 1393
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1335 - 1345
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1394 - 1403
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1200 - 1213
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1185 - 1199
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1305 - 1314
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1418 - 1431
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1346 - 1354
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1315 - 1322
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1323 - 1334