IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 273 - 289
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 259 - 272
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 456 - 465
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 569 - 572
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 1 > 2 - 24
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 193 - 206
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 217 - 230
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 165 - 178
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 428 - 440
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 273 - 283
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 685 - 698
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 597 - 610
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 729 - 744
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 699 - 707
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 758 - 767
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 27 - 38
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 1 > 118 - 132
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 255 - 268
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 201 - 214
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 2 > 337 - 348