IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 350 - 363
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 364 - 375
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 664 - 682
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 166 - 172
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 414 - 423
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 628 - 637
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 946 - 955
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 324 - 336
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 449 - 460
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 381 - 392
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 556 - 569
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 461 - 469
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 920 - 931
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 4 > 739 - 749
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 28 - 38
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 202 - 212
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 1 - 13
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 1 > 175 - 188
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 469 - 485
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 2 > 498 - 512