IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 38 - 51
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 52 - 61
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 74 - 90
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 1 - 15
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 101 - 117
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 29 - 37
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 118 - 132
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 62 - 73
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 91 - 100
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 16 - 28
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 290 - 303
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 223 - 233
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 273 - 289