IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 381 - 392
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 606 - 615
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 640 - 649
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 3-1 > 703 - 711
IEEE Transactions on Information Forensics and Security > 2011 > 6 > 4 > 1346 - 1354
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1354 - 1367
IEEE Transactions on Information Forensics and Security > 2012 > 7 > 4 > 1278 - 1287
IEEE Transactions on Information Forensics and Security > 2013 > 8 > 11 > 1760 - 1774
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 5 > 801 - 813
IEEE Transactions on Information Forensics and Security > 2014 > 9 > 8 > 1240 - 1250
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1325 - 1335
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1617 - 1629
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 11 > 2424 - 2434
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 1 > 74 - 85
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 594 - 608
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1486 - 1499
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1453 - 1460
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 7 > 1515 - 1527
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1700 - 1711
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 8 > 1875 - 1887