IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 190 - 199
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 200 - 212
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 142 - 151
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 152 - 167
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 118 - 131
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 178 - 189
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 168 - 177
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 132 - 141
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 69 - 78
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 79 - 89
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 104 - 117
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 28 - 39
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 16 - 27
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 6 - 15
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 40 - 54
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 90 - 103
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 55 - 68