IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 46 - 58
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 35 - 45
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 19 - 34
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 59 - 73
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 200 - 214
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 126 - 140
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 74 - 85
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 188 - 199
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 141 - 153
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 154 - 162
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 86 - 99
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 163 - 175
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 114 - 125
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 100 - 113
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 176 - 187
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 5 - 18