IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 350 - 363
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 391 - 401
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 402 - 412
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 331 - 340
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 491 - 502
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 503 - 512
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 734 - 743
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 758 - 768
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 101 - 117
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 234 - 246
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 192 - 202
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 331 - 338
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 173 - 182
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 475 - 487
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 569 - 572
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 98 - 110
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 123 - 139
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 59 - 69