IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 28 - 39
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 1 > 6 - 15
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 2 > 229 - 242
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 558 - 573
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 3 > 597 - 612
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 953 - 968
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 1025 - 1038
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 5 > 999 - 1009
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1250 - 1261
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 6 > 1151 - 1166
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1472 - 1485
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 7 > 1416 - 1431
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1678 - 1691
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 8 > 1764 - 1775
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1812 - 1823
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1824 - 1834
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1905 - 1917
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 9 > 1835 - 1849
IEEE Transactions on Information Forensics and Security > 2015 > 10 > 12 > 2605 - 2615