IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 376 - 390
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 311 - 320
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 462 - 467
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 331 - 340
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 559 - 569
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 664 - 682
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 683 - 696
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 38 - 51
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 1 - 15
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 16 - 28
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 137 - 152
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 259 - 272
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 153 - 165
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 441 - 455
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 466 - 474
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 347 - 358
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 207 - 216
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 284 - 292
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 3 > 302 - 317