IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 3 > 350 - 359
IEEE Transactions on Information Forensics and Security > 2006 > 1 > 4 > 502 - 516
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 1 > 1 - 13
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 254 - 266
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 2 > 267 - 282
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-1 > 413 - 429
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 3-2 > 559 - 569
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 793 - 808
IEEE Transactions on Information Forensics and Security > 2007 > 2 > 4 > 664 - 682
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 1 > 29 - 37
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 2 > 183 - 191
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 345 - 346
IEEE Transactions on Information Forensics and Security > 2008 > 3 > 3 > 347 - 358
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 193 - 206
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 2 > 231 - 241
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-1 > 708 - 717
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 883 - 898
IEEE Transactions on Information Forensics and Security > 2009 > 4 > 4-2 > 911 - 927
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 591 - 606
IEEE Transactions on Information Forensics and Security > 2010 > 5 > 3 > 492 - 506