IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1093
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 980 - 992
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 907 - 921
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 922 - 936
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 877 - 892
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 937 - 950
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1039 - 1054
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 893 - 906
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1071 - 1086
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1055 - 1070
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 993 - 1002
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 875 - 876
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1027 - 1038
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1003 - 1016
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1017 - 1026
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 951 - 963
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 964 - 979
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 5 > 1092