IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 523 - 531
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 818 - 830
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 737 - 751
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 541 - 550
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 712 - 724
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 585 - 594
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 650 - 660
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 575 - 584
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 791 - 802
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 551 - 564
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 661 - 671
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 725 - 736
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 532 - 540
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 606 - 615
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 803 - 817
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 616 - 627
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 628 - 639
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 831 - 842